Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

GPG and multiple recipients



Dan Ritter wrote:
> Don Levey wrote:
>> ...gpg generates its own key, encrypts the data with that, and then
>> the recipient's public key is used to encrypt the data key...
> 
> In fact, this is what always happens, one recipient (R)  or n recipients
> R0..Rn. GPG makes a random key K, encrypts your message M with K, then
> sends K(M) + R0(K) +... Rn(K).

Right...because public key encryption is expensive (CPU intensive), so
they use a symmetric cypher to encrypt the payload, and use PKI to
encrypt just the symmetric key.

 -Tom

-- 
Tom Metro
Venture Logic, Newton, MA, USA
"Enterprise solutions through open source."
Professional Profile: http://tmetro.venturelogic.com/






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org