Displaying 5 results from an estimated 5 matches for "elgam".
Did you mean:
elam
2003 Nov 27
0
[Announce] GnuPG's ElGamal signing keys compromised
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
GnuPG's ElGamal signing keys compromised
==========================================
Summary
=======
Phong Nguyen identified a severe bug in the way GnuPG creates and uses
ElGamal keys for signing. This is a significant security failure
which can lead to a compromise of almost all ElGamal keys used...
2003 Dec 02
2
GnuPG 1.2.3 vulnerable?
Hi there,
Is the gpg FreeBSD port vulnerable to ElGamal signing
key disclosure problem?
Info:
http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html
Thank you,
/Dorin.
__________________________________
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
http://companion.yahoo.com/
2002 Dec 21
0
[Announce]Libgcrypt 1.1.11 released
...nd licensed under the GNU Lesser General Public License.
It provides functions for all cryptograhic building blocks: symmetric
ciphers (AES,DES,Blowfish,CAST5,Twofish,Arcfour), hash algorithms
(MD4, MD5, RIPE-MD160, SHA-1, TIGER-192), MACs (HMAC for all hash
algorithms), public key algorithms (RSA, ElGamal, DSA), large integer
functions, random numbers and a lot of supporting functions.
Available at the usual places, e.g.:
ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.11.tar.gz (680k)
ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.11.tar.gz.sig
Please check the signature f...
2015 Jun 12
2
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
On Fri 2015-06-12 01:52:54 -0400, Mark D. Baushke wrote:
> I have communicated with Allen Roginsky on this topic and I have been given permission to post his response.
>
> In this message below, the 'vendor' was Darren Tucker's generated prime
> that used a generator value of 5.
>
> -- Mark
>
> From: "Roginsky, Allen" <allen.roginsky at
2004 May 17
4
Multi-User Security
Hello list.
I would like to get your opinion on what is a safe multi-user environment.
The scenario:
We would like to offer to some customers of ours some sort of network
backup/archive. They would put daily or weekly backups from their local
machine on our server using rsync and SSH. Therefore, they all have a user
account on our server. However, we must ensure that they would absolutely
not be