way to see what cipher/algo was used to create your key?

vedaal at nym.hush.com vedaal at nym.hush.com
Tue Jun 19 19:50:47 CEST 2012

Sam Smith smickson at hotmail.com wrote on:
Tue Jun 19 01:30:44 CEST 2012 

>a way to learn what cipher & hash was used to create the secret 

export your secret key as seckey.asc
then do gpg --list-packets seckey.asc

here is an example of one of mine:

V:\z\>gpg --list-packets v:\seckey.asc
gpg: armor header: Version: GnuPG v1.4.12 (MingW32) 
gpg: armor header: Comment: Acts of Kindness better the World, and 
protect the Soul
:secret key packet:
        version 4, algo 1, created 1201031494, expires 0
        skey[0]: [4096 bits]
        skey[1]: [17 bits]
        iter+salt S2K, algo: 10, SHA1 protection, hash: 8, salt: 

'version 4'  describes the key-version 
(all current gnupg keys are v4, older keys from pgp were v3,  maybe 
when elliptic curve crypto gets done, there might be a v5 ;-) )

'algo 1' describes the 'type' of key (RSA, ELG, DSA, etc.) and the 
refers to RSA

the line beginning 'iter+salt' describes the algorithm used to 
encrypt the secret key, and the hash used.

'algo: 10' is Twofish
'hash 8' is SHA256

(not the 'defaults')  
your key will probably show 'algo: 9' (AES256) and 'hash: 2' (SHA1)

(btw, Should a listing explaining these things be in the FAQ ? )


More information about the Gnupg-users mailing list