Başar Alabay wrote the following on 1/26/11 9:10 AM:
> Hello,
> 
> is it possible to change my RIPEMD160 to SHA512? As in following header it is 
> SHA256? ¬
> 
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA256
> 
> I had read somewhere that this hash thing is the weak point.
> 
> These are my gpg prefs:
> H10 H9 H8 H3 H2
> S10 S9 S8 S7
> Z3 Z2 Z1
> 
> My key is 1024 DSA, and I'm thinking if I should make a new key, maybe with 
> 4096. Or would 2048 be enough? Funny is, my old, revoked first key was 2048. 
> But I'm not sure if everything will work fine. I haven't found out yet how to 
> import a revocation certificate into the GPG key manager, e. g.
> 
> This whole hash, cipher. etc. stuff should be in a central place, I think. It 
> is really very intransparent, what should be configured how.
> 
> Greets,
> B. Alabay

This is how the key you used for signing your e-mail looks like in Terminal:
===========
$ gpg --edit-key 7991C875
gpg (GnuPG) 1.4.11; Copyright (C) 2010 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.


This key may be revoked by DSA key 835DE1F5 [?]
pub 1024D/7991C875 created: 2005-01-04  expires: never       usage: SC
                     trust:       validity:
sub 2048g/7E97A4F7 created: 2005-01-04  expires: never       usage: E
 (1). Basar Alabay <[email protected]>
 (2)  Basar Alabay <[email protected]>
 (3)  Basar Alabay <[email protected]>
 (4)  Basar Alabay <[email protected]>
 (5)  Basar Alabay <[email protected]>

gpg> showpref
(1). Basar Alabay <[email protected]>
     Cipher: AES256, AES192, AES, CAST5, 3DES, TWOFISH
     Digest: SHA1
     Compression: ZIP, Uncompressed
(2)  Basar Alabay <[email protected]>
     Cipher: AES256, AES192, AES, CAST5, 3DES, TWOFISH
     Digest: SHA1
     Compression: ZIP, Uncompressed
(3)  Basar Alabay <[email protected]>
     Cipher: AES256, AES192, AES, CAST5, 3DES, TWOFISH
     Digest: SHA1
     Compression: ZIP, Uncompressed
(4)  Basar Alabay <[email protected]>
     Cipher: AES256, AES192, AES, CAST5, 3DES, [1]
     Digest: SHA1, RIPEMD160
     Compression: ZLIB, ZIP, Uncompressed
     Features: MDC, Keyserver no-modify
(5)  Basar Alabay <[email protected]>

===========

According to the above information, your signing key is your primary key:
1024D/7991C875 created: 2005-01-04  expires: never       usage: SC

If I am not wrong, with a 1024 bit DSA key, you cannot use SHA 256,  SHA512.

If you want to keep this key (and not generate a new one, {which is not
necessary), you can add a sign only subkey, RSA 2048 bits, that will
give you the possibility of using SHA512.

As an example, this is how my own key A57A8EFA looks like in Terminal:
===========
pub 1024D/A57A8EFA  created: 2002-02-11  expires: never    usage: SCA
                     trust: ultimate      validity: ultimate
sub  2048g/CE3A0945  created: 2002-02-11  expires: never   usage: E
sub  2048R/855B83EF  created: 2005-11-20  expires: never   usage: S
===========
As you can see, the primary key was generated on February 11, 2002.
The sign only subkey RSA2048 was added on November 20, 2005:
sub  2048R/855B83EF  created: 2005-11-20  expires: never   usage: S
I am currently using SHA256, enabled in ~/.gnupg/gpg.conf with the
following option:
personal-digest-preferences SHA256


If you are interested in adding such a subkey, and configuring your
gpg.conf to use SHA512, please let me know, I'll try to walk you through
the process in Terminal.

Charly

_______________________________________________
gpgtools-users mailing list
[email protected]
Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users
Unsubscribe: 
http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1

This email sent to: [email protected]

Reply via email to