Hi all,
I have successfully followed all the steps in the loop-AES readme file.
Since I couldn't find any reference to this, I would like to know whether
the step in which one creates the 65 random keys
head -c 2925 /dev/random | uuencode -m - | head -n 66 | tail -n 65 \
| gpg --symmetric -a >/a/usbstick/keyfile.gpg
needs any modification for use in AES256 mode. Or is it enough to replace
all occurrences of AES128 with AES256 as one follows the README file?
Thanks for any help
Marv
_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar ? get it now!
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/