private key protect cipher

David Shaw dshaw@jabberwocky.com
Fri Mar 28 05:49:02 2003


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, Mar 27, 2003 at 01:55:15PM -1000, Maxine Brandt wrote:
> On Thursday, March 27,2003 David Shaw replied:
> 
> | If you look at this end to end, then the weakest spot is still the
> | passphrase, but unless the attacker can get to your local system and
> | steal your private key, there is no way take advantage of this.
> |
> |
> OK. That's clear. Just two more questions.
> 1...Do I get any extra protection in using a password (random
> characters) longer than 128 bits?

If your secret key is encrypted with a cipher that can use more than
128 bits, yes.  Note that you would also want to use a hash algorithm
that can generate enough bits here as well.  The default (SHA1)
generates 160 bits.

Before you try and memorize a 256-bit passphrase, though, keep in mind
just how realistic this attack is - and that someone who can access
your computer to lift the encrypted secret key might be able to try
and install a key logger...

> 2...If I import keys created in PGP does GPG use the PGP cipher or does
> GPG convert to CAST5?

GnuPG will use whatever the imported key uses.  However, if you change
the passphrase, GnuPG will re-encrypt using CAST5.  You can change the
cipher GnuPG uses for secret keys with --s2k-cipher-algo.

Note that GnuPG also adds a SHA1 secret key checksum when
re-encrypting an imported secret key.  This protects against some key
modification attacks.

David
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2rc1 (GNU/Linux)
Comment: http://www.jabberwocky.com/david/keys.asc

iD8DBQE+g9RO4mZch0nhy8kRAgJdAJ9kM44+IDfztEhKp9ff67SfRwpeCwCeOwQN
sCu6rX64t8abtBK79WkKsSM=
=UIES
-----END PGP SIGNATURE-----