Compatibility

L. Sassaman rabbi@quickie.net
Fri, 14 Apr 2000 02:23:16 -0700 (PDT)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Fri, 14 Apr 2000, Werner Koch wrote:


> On Thu, 13 Apr 2000, John Saylor wrote:
>
> > It's a long story. Blowfish is a fast and secure [so far]
> > algorithm. You'd have to ask NAI why they don't implement it.
>
> For encryption it is relly simple: If you encrypt for a key, an
> OpenPGP implemenation does an intersection between the list of
> algorithm it implements and the ones foun in the key of the recipient.
> This intersection will never be empty becuase 3DES is implicty
> available.
>
> So, if you created a key with a preference including Blowfish, any
> OpenPGP implemenation may decide to use Blowfish for encryption.
Remember, though, that creating a key with the preferences of one OpenPGP implementation may cause you some trouble if you then use that key with an OpenPGP implementation that doesn't support some of those ciphers you had specified as accepted in the key. And example: Key is generated with GnuPG. Blowfish is preferred. Key is then moved to system using PGP. Public key is given to someone using GnuPG. Message is sent, using Blowfish (on account of the prefs). The recipient cannot view the message, because PGP doesn't have Blowfish. This seems to be a FAQ on this and the PGP-Users lists. As it doesn't look like Blowfish is going to be implemented in PGP, I'd like to see GnuPG give the option to exclude it from the preferences when keys are generated in GnuPG. - --Len. __ L. Sassaman System Administrator | "All of the chaos Technology Consultant | Makes perfect sense..." icq.. 10735603 | pgp.. finger://ns.quickie.net/rabbi | --Joe Diffie -----BEGIN PGP SIGNATURE----- Comment: For info see http://www.gnupg.org iEYEARECAAYFAjj2440ACgkQPYrxsgmsCmqPXACeKsSMKXuUhxNXoN48R6Z6v/f5 DC0AoK3b9f4aYzkLdO0e+PVrzeSuwC5S =n9zV -----END PGP SIGNATURE-----