From mezzanine at Safe-mail.net Fri Dec 10 13:14:20 2010 From: mezzanine at Safe-mail.net (mezzanine at Safe-mail.net) Date: Fri, 10 Dec 2010 07:14:20 -0500 Subject: Revisions to the GNU Privacy Handbook Message-ID: The current issue of the GNU Privacy Handbook appears to date back to the year 1999. Out of interest, I obtained a copy of the handbook and edited it with the hope of making it somewhat more up-to-date. In particular, the revisions include such things as generating RSA keys (from what one remembers, in 1999 RSA encryption was subject to licensing restrictions that probably prevented it from being widely implemented in the GnuPG software), 2048-bit keys for public-key encryption (as opposed to 1024-bit keys), the deprecation of the SHA-1 hash algorithm, graphical front-ends for the GnuPG software, and the difference between fully valid and marginally valid keys (I am still not sure as to whether the path length limit of five steps applies in all cases.) Some URLs have also been updated. --Richard The diff output below may be useful for generating the revised version of the handbook from the current version (i.e. the version at the http://www.gnupg.org/gph/en/manual.html URL.) 33c33,34 < >

>
> Last modified on December 10, 2010 by Richard

gpg (GnuPG) 1.4.9; Copyright (C) 2008 Free Software Foundation, Inc. > This is free software: you are free to change and redistribute it. > There is NO WARRANTY, to the extent permitted by law. 459c459 < (1) DSA and ElGamal (default) --- > (1) DSA and Elgamal (default) 461c461 < (4) ElGamal (sign and encrypt) --- > (5) RSA (sign only) 473c473,477 < Option 4 Option 5 creates a single RSA > keypair usable only for making signatures. > In all cases it is possible to later add additional subkeys for encryption > and signing. > Note: Although it is not the default choice, the recommended choice for most circumstances is to create a signature-only RSA keypair via Option 5 and to afterwards add an RSA subordinate keypair for encryption creates a single ElGamal < keypair usable for both making signatures and performing encryption. < In all cases it is possible to later add additional subkeys for encryption < and signing. < For most users the default option is fine.

>.

key or an RSA key may be of any size. 493,497c493,494 < >About to generate a new ELG-E keypair. < minimum keysize is 768 bits < default keysize is 1024 bits < highest suggested keysize is 2048 bits < What keysize do you want? (1024) >RSA keys may be between 1024 and 4096 bits long. > What keysize do you want? (2048)[2]
>[3] HREF="http://www.schneier.com/" 1232c1229 < HREF="http://www.counterpane.com/applied.html" --- > HREF="http://www.schneier.com/book-applied.html" 1258c1255,1256 < Modern examples of symmetric ciphers include 3DES, Blowfish, and IDEA.

Modern examples of symmetric ciphers include 3DES, Blowfish, Rijndael, > and IDEA.

Blowfish, Rijndael, and IDEA 1310c1308,1310 < possible keys. --- > possible keys. 2 >128 > is 340,282,366,920,938,463,463,374,607,431,768,211,456 keys. 1313c1313,1314 < the universe to find the key.

the universe to find the key. (Some symmetric ciphers, such as Rijndael, > can also use keys that are greater in size than 128 bits.)

technology public keys with 2048 bits are recommended for most purposes.

[3] >[4] algorithm that works as just described.

>R > for an RSA key, CLASS="LITERAL" 1850,1851c1853,1854 < The subkey may be a DSA signing key, and encrypt-only ElGamal < key, or a sign-and-encrypt ElGamal key. --- > The subkey may be a DSA signing key, an encrypt-only ElGamal > key, a sign-only RSA key, or an encrypt-only RSA key. 2305c2308 < >[4] >[5] Formerly, a key was considered fully valid only if you signed it personally. 2341c2344 < > is considered valid --- > > is considered fully valid 2350c2353 < >it is signed by enough valid keys, meaning --- > >it is signed by enough fully valid keys, meaning 2365c2368 < >it has been signed by three marginally trusted keys; and

>it has been signed by at least three marginally trusted keys; and

A key CLASS="EMPHASIS" > >K > is marginally valid if it has been signed by at least one > but less than three fully valid keys that are marginally trusted. In such a case, the path of signed keys from CLASS="EMPHASIS" > >K > back to your own key is subject to the same length limit of five steps that was previously mentioned. A > key with only marginal validity, even if fully trusted, does not count as > a valid key for the purpose of signing other keys.

>

The path length, number of marginally trusted keys required, and number 2457c2469 < SRC="signatures.jpg" --- > SRC="signatures.jpg" 2751c2763 < Finally, as of 1999, laws regarding digital encryption, and in particular --- > Finally, as of 2010, laws regarding digital encryption, and in particular 2753c2765 < is currently being debated by many national governments.

are currently being debated by many national governments.

key will be a DSA key, and the subkeys will be ElGamal keys. Though it is not the default > option, an RSA master key is recommended as a more secure alternative to a DSA key NAME="AEN35" > HREF="#FTN.AEN35" > >[2] >.

ElGamal keys, on the other hand, may be of any size. --- > >ElGamal keys and RSA keys, on the other hand, may be of any size. 2856c2873 < 1024 bits is thus the recommended key size. --- > 2048 bits is thus the recommended key size. 3132c3149 < >[5] >[6] HREF="http://w4kwh.org/keysigning-party-guide/" 3212c3229 < HREF="http://cwis.kub.nl/~frw/people/koops/bertjaap.htm" --- > HREF="http://rechten.uvt.nl/koops/" 3218c3235 < HREF="http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm" --- > HREF="http://rechten.uvt.nl/koops/cryptolaw/" 3250c3267 < HREF="http://www.cs.cmu.edu/~alma" --- > HREF="http://www.gaudior.net/alma/" 3366c3383,3384 < >

>

>

If you are interested in graphical front-ends for GnuPG, the MacGPG and GPG4Win projects may be of interest. The home page for the MacGPG project is located at http://macgpg.sourceforge.net on the Web and the homepage for the GPG4Win project is located at http://gpg4win.org on the Web.

>[[1] >1, NAME="FTN.AEN35" > HREF="#AEN35" > >2 >]Option 3 is to generate an ElGamal keypair that is < not usable for making signatures.

>The DSA algorithm may use the SHA-1 hash function. Due to cryptographic weaknesses that have been found in SHA-1, RSA keys are a recommended alternative to DSA keys. It is also recommended that GnuPG be configured to prefer the SHA-256 hash function over SHA-1. For more information about this issue, please see the HOWTO prep for migration off of SHA-1 in OpenPGP <http://www.debian-administration.org/users/dkg/weblog/48> weblog entry at Debian Administration.

[2] >[3][3] >[4][4] >[5][5] >[6] \ No newline at end of file --- > >