On Oct 6, 2008, at 10:54 AM, Kevin Hilton wrote:

When using gpg with the --symmetric flag (as when symmetrically
encrypting a file with a passphrase), is the passphrase salted and
hashed?

Yes.  Unless you change that safe default with --s2k-mode.

 Is so, how many times is it hashed, and what hashing
algorithm is used for this process?

By default, it's 65536 iterations. The hash algorithm is SHA-1, unless you change it with --s2k-digest-algo.

 Is this controlled by some
parameter in the gpg.conf file or command line flag?

--s2k-count is what you're looking for:

       --s2k-count n
Specify how many times the passphrase mangling is repeated. This value may range between 1024 and 65011712 inclusive, and the default is 65536. Note that not all values in the 1024-65011712 range are legal and if an illegal value is selected, GnuPG will round up to the nearest legal value. This
              option is only meaningful if --s2k-mode is 3.

As always, the defaults here are safe. Don't change them unless you know what you're doing.

David

_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to