On 29-07-2012 6:48, David Shaw wrote: > To combat this, OpenPGP has two "quick check" bytes in the encrypted data packet. > Basically, they're a repetition of two random bytes from earlier in the message. Does this not lead to a possible known-plaintext attack on gpg? -- ir. J.C.A. Wevers PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html