Stephen Paul Weber singpolyma at
Fri Jan 4 22:37:14 CET 2013

The manpage for gpg sez:

> Secret  keys  are  integrity protected by using a SHA-1 checksum. This 
> method is part of the upcoming enhanced OpenPGP specification  but GnuPG 
> already uses it as a countermeasure against certain attacks.  Old  
> applications  don't  under‐ stand this new format, so this
> option may be used to switch back to the old behaviour. Using this option 
> bears a security risk.

Does anyone know what the actual security risk is?  Using a weaker checksum 
obviously makes it easier to forge data, but in this case the data being 
forged is just the secret parts of a secret key.  What are the attack 
vectors there?

Stephen Paul Weber, @singpolyma
See <> for how I prefer to be contacted
edition right joseph
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: </pipermail/attachments/20130104/6ec3dbd4/attachment.pgp>

More information about the Gnupg-users mailing list