[149212] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Does PGP use sign-then-encrypt or

daemon@ATHENA.MIT.EDU (Werner Koch)
Thu Jan 23 12:51:44 2014

X-Original-To: cryptography@metzdowd.com
From: Werner Koch <wk@gnupg.org>
To: Ralf Senderek <crypto@senderek.ie>
Date: Thu, 23 Jan 2014 16:26:08 +0100
In-Reply-To: <alpine.LFD.2.11.1401221949050.2486@lap.senderek.ie> (Ralf
	Senderek's message of "Wed, 22 Jan 2014 19:56:00 +0100 (CET)")
Cc: Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Wed, 22 Jan 2014 19:56, crypto@senderek.ie said:

>    To foil this attack do not sign some random document presented to you.
>    Sign a one-way hash of the message instead.

In addition virtually nobody uses the same key for encryption and
signing.  This is accomplished in OpenPGP using a set of keys instead of
just one key (By default a primary key for certification/signing and a
subkey for encryption).


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post