How to pass both passphrase and password in GPG signed symmetric encryption?

I am new to GPG so I may be going about this all wrong. I have some files I would like to encrypt symmetrically using AES256, but I want to sign them with my GPG key. I need to automate this process however so I’m using –batch and I pas… Continue reading How to pass both passphrase and password in GPG signed symmetric encryption?

What is the name of the crypto system used by ICANN’s DNS recovery system?

I once heard about a type of crypto system that behaves in the following way: I have x secret keys that work together to decrypt messages encrypted with a public key d. If I get at least n of the x secret keys together, I can decrypt messa… Continue reading What is the name of the crypto system used by ICANN’s DNS recovery system?

Can I use my own implementation of a widely used, supposedly secure cryptographic algorithm for securing data at rest?

I know you shouldn’t roll your own crypto and generally its not a good idea to implement (and then deploy) any extensively tested and recommended algorithms by yourself either.
I have already seen this question, and as far as I understand,… Continue reading Can I use my own implementation of a widely used, supposedly secure cryptographic algorithm for securing data at rest?