Thank you for the response tdb, but it was a little more technical than I have the capacity to understand at this point. Also, I apologize for not getting back sooner, but I've been very busy lately with other things...
Perhaps I'm a bit confused about the technical details and differences between a symmetric cipher and a hash function. I'll read up on it some more whenever I can to see if I can figure it out, but for right now, these are my questions.
The following is output from pref and showpref commands when invoking gpg with --edit-key (keyid/uid):
Code: Select all
Command> pref
pub 1024D/XXXXXXXX created: 2005-02-22 expires: never usage: CS
trust: ultimate validity: ultimate
[ultimate] (1). (My Name] <mymail@mymail.com>
S9 S8 S7 S3 S2 S1 H2 H3 Z2 Z1 [mdc] [no-ks-modify]
Command> showpref
pub 1024D/XXXXXXXX created: 2005-02-22 expires: never usage: CS
trust: ultimate validity: ultimate
[ultimate] (1). (My Name] <mymail@mymail.com>
Cipher: AES256, AES192, AES, CAST5, 3DES, IDEA
Digest: SHA1, RIPEMD160
Compression: ZLIB, ZIP, Uncompressed
Features: MDC, Keyserver no-modify
Command>
But this is what I see when I run gpg --version:
Code: Select all
gpg (GnuPG) 1.4.0
[Copyright, etc.]
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512
Compression: Uncompressed, ZIP, ZLIB
- Why do these commands show different available algorithms? Do I have to edit a .conf file somewhere to show all the options when I run pref or showpref?
- I'm guessing the SX, HX, and ZX (where X is a number) correspond to the cipher, digest (hash), and compression options, respectively. Is this correct? Is your AES356 note a typo and supposed to be AES256?
- Which of the ciphers, hashes, and/or compression types above, if any, is PGP not compatible with? I would like to be as compatible as possible with PGP, except for older versions that cannot do SHA256, of course.
- What do you mean by "That will set your key to use AES 356, then Twofish for symmetric cipher?"
I'm new to encryption and I am not sure how AES356 (or AES256?) and Twofish create a symmetric cipher or how GPG uses such a cipher. To be completely honest, all I know is that there is a private key used to for digital signatures and decryption, and public keys used for encryption and signature verification. Is this much right at least?
I'll do my best to try and sort this out myself, and I'll key everyone updated in case anyone is curious. Does anyone know of a good yet quick tutorial that is not too technically detailed that can explain all of this for me?
Thanks again.