home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:4500 alt.security.pgp:86
- Path: sparky!uunet!mcsun!uknet!doc.ic.ac.uk!clss1.bangor.ac.uk!sol!mather
- From: mather@sees.bangor.ac.uk (Paul Mather)
- Newsgroups: sci.crypt,alt.security.pgp
- Subject: Re: PGP secret key on multiuser system (again) (was: Risks of keeping...)
- Message-ID: <BxGIoz.32n@clss1.bangor.ac.uk>
- Date: 9 Nov 92 16:19:47 GMT
- References: <1992Nov9.105706.7027@pollux.lu.se>
- Sender: news@clss1.bangor.ac.uk
- Organization: University of Wales, Bangor
- Lines: 24
- X-Newsreader: Tin 1.1 PL5
-
- Magnus Olsson (magnus@thep.lu.se) asks:
- > In short: How secure is the pass phrase mechanism of PGP 2.0?
-
- As far as I'm aware, it's as secure as the algorithm used to actually
- encrypt the files one sends using PGP (because it is the same
- algorithm).
-
- For efficiency reasons, PGP uses a "quick" but secure secret-key
- encryption algorithm (IDEA) to encrypt the actual body of a message sent
- using PGP. The "RSA" portion of PGP is confined to communicating the
- random session key used for the IDEA-encrypted body of the message.
-
- As far as I'm aware, IDEA is used to encrypt the pass phrases for secret
- keys. Ergo, if you don't trust IDEA, don't use PGP.
-
- I seem to remember the user manual goes into this in more detail.
-
- Cheers,
-
- Paul.
- --
- e-mail: p.mather@sees.bangor.ac.uk
-
- If your mailer can't reach me, I'm obviously not worth talking to.
-