Tag: pgp

Found 475 results for 'pgp'.

1) pgp - libsodium vs gnupg curve25519 compatibility
2) public-key - Private key can't be traced (GPG)?
3) encryption - How to decrypt a PGP message with only the two primes and the public exponent?
4) authentication - OpenPGP/X.509 bridge: how to verify public key?
5) pgp - Multiple signatures on one OpenPGP key. How are they combined? Where are they stored in OpenPGP certificate?
6) public-key - Signing a GPG Public Key
7) hash - OpenPGP Signature Packet hashed data
8) hash - Manually creating a GPG Public Key
9) signature - Where can I find the standard definition for GPG ECDSA signature?
10) rsa - Weaknesses in vanity PGP keys
11) public-key - two public keys with same passphrase insecure? | can two hashes be compared?
12) encryption - Implementing forward secrecy in OpenPGP with public key authentication
13) symmetric - How to create and send a symmetric key using GPG
14) public-key - Pseudonymous publication of a series of texts online when a bad guy is expected to join in with fakes: will this approach to PGP verifiability work?
15) public-key - Encrypt symmetric session key with asymmetric or symmetric master key?
16) rsa - How can I determine the GPG/PGP key ID from the RSA modulus?
17) cryptography - Sharing RSA keys between PGP and SSH protocols: Does this pose a security risk?
18) authentication - What does Modification Detection Code (MDC) in OpenPGP do?
19) encryption - When is each key used when encrypting an email using OpenPGP?
20) pgp - Is it nescecary to wipe and reset the MBR when laptop changes owners even if full disk encryption is used?
21) pgp - I use full-disk encryption. Should I passphrase-encrypt my private key(s) anyway?
22) key-derivation - What is the key derivation function used in GnuPG, and how long may its input be?
23) encryption - GnuPG decryption not asking for passphrase
24) random-number-generator - gpg --gen-random quality level: is higher "better"?
25) public-key - Why are NIST curves still used?
26) elliptic-curves - Why is there the option to use NIST P-256 in GPG?
27) pgp - Chosen Ciphertext Attack on the Public Key in PGP
28) pgp - Automatically finding and fetching signature paths from own key to target
29) key-management - How can I convert my encypted PGP secret key for use performing SSH authentication?
30) rsa - Reverse engineering secret key in RSA encryption with the help of signature
31) public-key - Is it possible in PGP to provide verification/verify the ownership of a public key?
32) tls - Why did TLS 1.3 prohibit PGP authentication?
33) pgp - PGP signature on literal data packet
34) protocol-design - Why must we generate the signature before any compression being done at PGP?
35) public-key - Alice trusts Bob only when Bob trusts Alice
36) pgp - Can the passphrase of a PGP key be deduced from an old backup?
37) implementation - OpenPGP Public-Key Encrypted Session Key Packet Key ID generation
38) keys - How does GPG verify succesful decryption?
39) tls - Is encrypted e-mail sent over TLS 1.3 a form of "forward secrecy" (similar to something like Signal)?
40) authentication - Is PGP for user authentication a good idea?
41) rsa - Difference RSA keypair creation openSSL and openPGP?
42) pgp - AES 128 GCM - dynamic key with static IV/nonce
43) encryption - Is there a use for an MDC even when all messages are signed?
44) pgp - Is it possible that to sign a message with a PGP key in a way that leakes the key
45) public-key-infrastructure - Is PGP secure against a rogue keyserver?
46) encryption - Is compressing data prior to encryption necessary to reduce plaintext redundancy?
47) public-key - How do revocation certificates work in PGP?
48) public-key - Familiar key signing over video call
49) encryption - Is my identity exposed when publishing my public key or encrypting with PGP?
50) encryption - PGP multi-key encryption for large, dynamic groups viewing static documents