Re: choice of encryption algorithms

2012-06-21 Thread Johan Wevers
On 21-06-2012 7:47, Robert J. Hansen wrote: > No, because this is the sort of thing that usually goes in a gpg.conf > file. I can't think of a use case for default-preference-list on the > command line -- not saying none exist, mind you, but only that I can't > think of one. I have met one in pr

RE: "SHA1 Protection" from way to see what cipher/algo was used to create your key?

2012-06-21 Thread Sam Smith
when running the command: gpg --list-packets there is an outputted line that reads: "SHA1 protection" I did some looking online and saw that this line stays even when people change their hash algorithm to something else (like SHA2). If the "SHA1 protection" is not indicating the use of SHA1

Re: "SHA1 Protection" from way to see what cipher/algo was used to create your key?

2012-06-21 Thread Peter Lebbing
On 21/06/12 15:00, Sam Smith wrote: > when running the command: gpg --list-packets > > there is an outputted line that reads: "SHA1 protection" First of all, it seems you understand it, but let me emphasize this: the algorithms you get when using the inspection method vedaal showed you, are /no

Re: "SHA1 Protection" from way to see what cipher/algo was used to create your key?

2012-06-21 Thread David Shaw
On Jun 21, 2012, at 9:00 AM, Sam Smith wrote: > when running the command: gpg --list-packets > > there is an outputted line that reads: "SHA1 protection" > > I did some looking online and saw that this line stays even when people > change their hash algorithm to something else (like SHA2). >

Re: "SHA1 Protection" from way to see what cipher/algo was used to create your key?

2012-06-21 Thread Robert J. Hansen
On 06/21/2012 09:57 AM, Peter Lebbing wrote: > There is no cipher > or hashing involved in creating a key... This may or may not be true, depending on what method of random number generation is being used. ANSI X9.17, Yarrow and Fortuna are three examples of pseudorandom number generators that ar

RE: "SHA1 Protection" from way to see what cipher/algo was used to create your key?

2012-06-21 Thread Sam Smith
Thanks for this detailed explanation. I really appreciate it. I've read of theoretical attacks against SHA1. whenever I hear of such things I start to be leery when using such Hash. Seeing the advanced attack capabilities demonstrated by Flame/Stuxnet leads me to believe theoretical is only te

Re: choice of encryption algorithms

2012-06-21 Thread Daniel Kahn Gillmor
On 06/21/2012 12:52 AM, Robert J. Hansen wrote: > Please don't do this. It's error-prone. Those are machine-readable > numbers, not human-readable ones. Use the human-readable ones: for > instance, > > default-preference-list TWOFISH 3DES SHA256 SHA224 RIPEMD160 completely agreed. > Also, def

Re: choice of encryption algorithms

2012-06-21 Thread David Shaw
On Jun 21, 2012, at 12:39 PM, Daniel Kahn Gillmor wrote: > On 06/21/2012 12:52 AM, Robert J. Hansen wrote: >> Please don't do this. It's error-prone. Those are machine-readable >> numbers, not human-readable ones. Use the human-readable ones: for >> instance, >> >> default-preference-list TWOF

idea.dll

2012-06-21 Thread vedaal
Werner Koch wk at gnupg.org wrote on Wed Jun 20 10:29:28 CEST 2012 : >The next version of Libgcrypt will support IDEA and thus GnuPG 2.1 >will be able to decrypt old (i.e. PGP 2) files, directly. Will GnuPG 2.x then allow importation of v3 keys? (main reason I still prefer 1.4.x over 2.x) Th

idea.dll

2012-06-21 Thread vedaal
vedaal at nym.hush.com vedaal at nym.hush.com wrote on Thu Jun 21 19:05:06 CEST 2012 : >Will GnuPG 2.x then allow importation of v3 keys? >(main reason I still prefer 1.4.x over 2.x) Sorry, my mistake, gnupg 2.x does import v3 keys, haven't looked at this aspect for a while, as I couldn't use m

Re: choice of encryption algorithms

2012-06-21 Thread Robert J. Hansen
On 6/21/2012 12:39 PM, Daniel Kahn Gillmor wrote: > i don't think this is the case. You and David are completely right, and I have no idea what I was thinking. Thank you both for the correction! ___ Gnupg-users mailing list Gnupg-users@gnupg.org http:/

Re: idea.dll

2012-06-21 Thread Daniel Kahn Gillmor
On 06/21/2012 01:21 PM, ved...@nym.hush.com wrote: > vedaal at nym.hush.com vedaal at nym.hush.com wrote on > Thu Jun 21 19:05:06 CEST 2012 : > >> Will GnuPG 2.x then allow importation of v3 keys? >> (main reason I still prefer 1.4.x over 2.x) > > Sorry, > my mistake, gnupg 2.x does import v3 ke

Re: idea.dll

2012-06-21 Thread Robert J. Hansen
On 06/21/2012 04:38 PM, Daniel Kahn Gillmor wrote: > unfortunately, this is indeed the case. v3 keys have a serious > vulnerability in that their fingerprint mechanism is trivially gamable, > so long keyid collisions are easy. It's quite a bit worse than that, really. If I understand things corr