Question about history of hash and cipher collections

David Shaw dshaw at jabberwocky.com
Mon Jan 14 02:33:33 CET 2008


On Sun, Jan 13, 2008 at 05:39:01PM -0600, Kevin Hilton wrote:
> Here was I was able to find about the current hash and cipher choices with gpg
> 
>     Pref Code (n)  	Algorithm (name)  	PGP 2  	PGP 5  	PGP 6  	PGP 7
> 	PGP 6.5.8ckt  	GPG 1.0.6
>     s1 * 	IDEA 	X 	X 	X 	X 	X 	X *
>     s2 	3DES 	--- 	X 	X 	X 	X 	X
>     s3 	CAST5 	--- 	X 	X 	X 	X 	X
>     s4 	Blowfish 	--- 	--- 	--- 	-- 	X (03) 	X
>     s7 	AES (128) 	--- 	--- 	--- 	X (7.0.1) 	X (03) 	X
>     s8 	AES192 	--- 	--- 	--- 	X (7.0.1) 	X (03) 	X
>     s9 	AES256 	--- 	--- 	--- 	X (7.0.1) 	X (03) 	X
>     s10 	Twofish 	--- 	--- 	--- 	X 	X (03) 	X
>     s11  Camellia128
>     s12  Camellia256
> 
>     * only with IDEA module
> 
>     Digest (Hash) Algorithms
>     Pref Code (n) 	Algorithm (name) 	PGP 2 	PGP 5 	PGP 6 	PGP 7 	PGP
> 6.5.8ckt 	GPG 1.0.6
>     h1 	MD5 	X 	X 	X 	X 	X 	X
>     h2 	SHA1 	--- 	X 	X 	X 	X 	X
>     h3 	RIPEMD160 	--- 	X 	X 	X 	X 	X
>     h6 + 	TIGER192 	--- 	--- 	--- 	--- 	X (08) 	X +
>     h8 * 	SHA256 	--- 	--- 	--- 	--- 	X (07) 	X *
>     h9 * 	SHA384 	--- 	--- 	--- 	--- 	X (07) 	X *
>     h10 * 	SHA512 	--- 	--- 	--- 	--- 	X (07) 	X *
> 
> Just a few questions,
> 

I'm afraid the chart you made was somewhat eaten by word wrap, but it
seems basically sane.  Note that Camellia is not a standard algorithm,
and while it will probably be one eventually, it isn't today.

> #1 - How can I generate this list with newer versions of gpg -- is
> their an internal command that cross-references the s or h numbers
> with the specific ciphers/hashes that are compiled into the module --
> something I can type at the command line?

Yes.  "gpg -v --version" will give you the algorithm numbers along
with the algorithm names.  However, the algorithm numbers are not
really relevant to anything unless you're writing OpenPGP software.
For years now, all programs have referred to AES256 as "AES256" and
not "cipher 9".

> #2 Historically, what ciphers were eliminated -- For example what
> ciphers were in the s5, s6 slots?  Same with the hashes.  I believe
> the TIGER has was equal to s5.  What happened to that hash choice?

S5 was SAFER-SK128 and S6 was reserved for DES/SK.  SAFER was dropped
and nobody ever implemented it.  DES/SK was never even allocated.

You can see the history between RFC-2440 and RFC-4880.  A good number
of algorithms were cleaned up between the two: if it wasn't actually
being used, it got dropped.

David



More information about the Gnupg-users mailing list