Re: [openpgp] New fingerprint: which hash algo

Steve Pointer <spointer@humdai.net> Fri, 09 October 2015 15:48 UTC

Return-Path: <spointer@humdai.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 608971B44AB for <openpgp@ietfa.amsl.com>; Fri, 9 Oct 2015 08:48:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.801
X-Spam-Level:
X-Spam-Status: No, score=-0.801 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z1CRwdzPe7MA for <openpgp@ietfa.amsl.com>; Fri, 9 Oct 2015 08:48:21 -0700 (PDT)
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com [66.111.4.29]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 886561B449F for <openpgp@ietf.org>; Fri, 9 Oct 2015 08:48:21 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id ADFBB205F2 for <openpgp@ietf.org>; Fri, 9 Oct 2015 11:48:19 -0400 (EDT)
Received: from web2 ([10.202.2.212]) by compute1.internal (MEProxy); Fri, 09 Oct 2015 11:48:19 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=humdai.net; h= content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-sasl-enc :x-sasl-enc; s=mesmtp; bh=i0CVzDyEXcbPypbhC2Y0C3MGj54=; b=EXrFeh EWu0JvZdw8I/M8L8GTdXXXqMImSSUbdVmDeLzx1J9VIGfbqmzXpUBOMxFeNgQodN HGtQ5/dtvIlNnLBMT3QhGXyNMG6Ed9ayV5Ak0dZebd6So0ChAYS/hPEMO60w4j9d yc0w3KKb9XA3ldN5N1+hmVvK1KxPYPsA6ciQA=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-sasl-enc:x-sasl-enc; s=smtpout; bh=i0CVzDyEXcbPypb hC2Y0C3MGj54=; b=FqvznaH1gs/43eycnr5lyTDj/bjDvZIhpZUxn2bx7SJPFYz he0Zhj4GpkUHamq0IhpcDHWlE+G5uHlJk3ayVyonNEdahyYXqVlPnK8SLqBj7kZp h7k6KnmWuh2IK6vTL7kAyfITW4kltPM5f73QLdVW3iWOe1uy8vMfX/w+F58U=
Received: by web2.nyi.internal (Postfix, from userid 99) id 7380B5401AA; Fri, 9 Oct 2015 11:48:19 -0400 (EDT)
Message-Id: <1444405699.1451275.405969297.6A25C66E@webmail.messagingengine.com>
X-Sasl-Enc: egecA1DC1tfte7GcAZBmFeMxWCNC2msEcOjv6p1nCpvJ 1444405699
From: Steve Pointer <spointer@humdai.net>
To: openpgp@ietf.org
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain
X-Mailer: MessagingEngine.com Webmail Interface - ajax-3fc6701a
Date: Fri, 09 Oct 2015 16:48:19 +0100
In-Reply-To: <20151009143827.B928740186@smtp.hushmail.com>
References: <878u84zy4r.fsf@vigenere.g10code.de> <55FD7CF0.8030200@iang.org> <87io742kz7.fsf@latte.josefsson.org> <87mvw4ctv5.fsf_-_@vigenere.g10code.de> <CA+cU71n1OUq4TtmY+8S2yfu2bvjAr+=DwtN-4xRW4xitjDpFXg@mail.gmail.com> <20151006110330.38b38ea4@latte.josefsson.org> <5616F2AE.5050106@iang.org> <20151009143827.B928740186@smtp.hushmail.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/6SsM_hYxguJ8pA7m_HJnpK-ovqk>
Subject: Re: [openpgp] New fingerprint: which hash algo
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Oct 2015 15:48:23 -0000

> So if it's a new key version V5, may be it would be reasonable to go with a the new hash standard, SHA 3 (Keccak)

Surprised that nobody has mentioned Suite B:

https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml

Last updated a couple of months ago to advise:

"Use SHA-384 to protect up to TOP SECRET."

http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf 

--
Steve P