All Questions
19
questions
0
votes
1
answer
258
views
How secure is a file encrypted with GnuPG, a strong passphrase, and the symmetric option?
Suppose I encrypt a file, of, say, 10 MB, with a secure, suitable passphrase, and the command:
gpg --symmetric my_file.txt
What level of expertise and hardware ...
1
vote
0
answers
909
views
0
votes
0
answers
52
views
Add setup to GPG symmetric
I use GPG symmetric, to encrypt text file.
Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions:
...
1
vote
1
answer
1k
views
Testing speed of symmetric vs asymmetric encryption and decryption using gpg
I'm aware that symmetric is faster than asymmetric.
I want to test this, but my (obviously incorrect) tests show the reverse.
Symmetric test:
...
1
vote
1
answer
459
views
Encrypt symmetric session key with asymmetric or symmetric master key?
Every day, I must backup my server's files, encrypt the backup, and upload it to untrusted cloud storage (dropbox, s3, etc.)
I've spent time on security.stackexchange where I discovered the typical ...
4
votes
1
answer
2k
views
How does gpg know what cipher algorithm is needed for decryption?
I am using gpg to make encrypt a tar.gz.
My first try uses --verbose --symmetric and then the decryption is done with ...
3
votes
1
answer
3k
views
In GnuPG, what's the difference between --s2k-cipher-algo and --cipher-algo? [duplicate]
I want to change some encryption options while using GnuPG to encrypt a file symmetrically.
1) However, for choosing the cipher algorithm, GnuPG has two commands and I don't know which one to use.
...
7
votes
1
answer
16k
views
How Secure is gpg Command Using Symmetric AES-256 From Being Cracked
How secure is any data encrypted using the following command:
gpg -o *encrypted_output_file_name* --symmetric --cipher-algo AES256 *file_to_be_encrypted*
Can ...
0
votes
1
answer
436
views
Format of hybrid crypto envelope structure?
From posts including the accepted answer to
How to encrypt file with RSA and AES that anyone with RSA key can decrypt them?
hybrid crypto (AKA envelope encryption) a GPG-encrypted file has an element ...
0
votes
1
answer
118
views
Send content to owner of gpg public key, nested content symmetric encryption
If I want to encrypt a text content file using a symmetric algorithm like AES,
is there a standard format gpg will expect, where it can detect a symmetric key (encrypted with recipient gpg public key ...
12
votes
1
answer
933
views
What was the BassOmatic cipher, and what made it so weak?
According to Wikipedia, this homebrew cipher was originally used in PGP, before Phil Zimmermann replaced it with IDEA. Supposedly, insecurities in the algorithm were pointed out to him, leading to ...
8
votes
2
answers
5k
views
What exactly does s2k do in gpg
So I recently discovered the --s2k mode in gpg.
Sadly it is not very well-documented. I mean, what is ...
2
votes
3
answers
6k
views
How to create and send a symmetric key using GPG
I want to communicate with a friend (he lives in another country so we can't exchange fingerprints or keys physically, I could post him a USB disk but I'm sure I can do it through the web).
I'm ...
4
votes
1
answer
372
views
Centralized storing of private RSA key
I working on multiuser project, where users can share data. The data that users upload to the server will be encrypted before it leaves the client with a symmetric cipher, and then the symmentric key ...
0
votes
1
answer
1k
views
GPG & Mcrypt - difference?
in short I'm learning GUI programming in python and thought it could be interesting to make a small GUI for symmetric encryption. Not being mad/mathematical/experienced (take your pick) enough to try ...