[149212] in cryptography@c2.net mail archive
Re: [Cryptography] Does PGP use sign-then-encrypt or
daemon@ATHENA.MIT.EDU (Werner Koch)
Thu Jan 23 12:51:44 2014
X-Original-To: cryptography@metzdowd.com
From: Werner Koch <wk@gnupg.org>
To: Ralf Senderek <crypto@senderek.ie>
Date: Thu, 23 Jan 2014 16:26:08 +0100
In-Reply-To: <alpine.LFD.2.11.1401221949050.2486@lap.senderek.ie> (Ralf
Senderek's message of "Wed, 22 Jan 2014 19:56:00 +0100 (CET)")
Cc: Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On Wed, 22 Jan 2014 19:56, crypto@senderek.ie said:
> To foil this attack do not sign some random document presented to you.
> Sign a one-way hash of the message instead.
In addition virtually nobody uses the same key for encryption and
signing. This is accomplished in OpenPGP using a set of keys instead of
just one key (By default a primary key for certification/signing and a
subkey for encryption).
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography