Session Key Questions
Kevin Hilton
kevhilton at gmail.com
Wed Sep 17 15:52:23 CEST 2008
Just some quick questions regarding the session key. Ive consulted
the RFC4880 docs, however am still slightly confused regarding the
session key.
1. How is the session key generated? How is its entropy randomness
determined? Is there a specific algorithm used to generate the key?
2. Once generated, Im confused how its used. When I use the gpg
--show-session-key option I receive:
gpg: session key:
`9:EB7DFF392EA4EDBC90A8836F82462CD0E0B5AB22D49141941CE252311ECD2D9C'
I believe 9 is referring to the symmetric cipher which the session key
is used as described by:
9.2. Symmetric-Key Algorithms
ID Algorithm
-- ---------
0 - Plaintext or unencrypted data
1 - IDEA [IDEA]
2 - TripleDES (DES-EDE, [SCHNEIER] [HAC] -
168 bit key derived from 192)
3 - CAST5 (128 bit key, as per [RFC2144])
4 - Blowfish (128 bit key, 16 rounds) [BLOWFISH]
5 - Reserved
6 - Reserved
7 - AES with 128-bit key [AES]
8 - AES with 192-bit key
9 - AES with 256-bit key
10 - Twofish with 256-bit key [TWOFISH]
100 to 110 - Private/Experimental algorithm
3. Is it possible to decrypt a gnupg encrypted message if I know the
decrypted session key? How could this be accomplished?
--
Kevin Hilton
More information about the Gnupg-users
mailing list