list of open-pgp objects // level of detail ?

<vedaal@hush.com> Thu, 03 August 2006 16:24 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G8fzq-0001qw-Kv for openpgp-archive@lists.ietf.org; Thu, 03 Aug 2006 12:24:30 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G8fzp-0008Tw-6u for openpgp-archive@lists.ietf.org; Thu, 03 Aug 2006 12:24:30 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k73FmSet002078; Thu, 3 Aug 2006 08:48:28 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k73FmSBc002077; Thu, 3 Aug 2006 08:48:28 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp3.hushmail.com (smtp3.hushmail.com [65.39.178.135]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k73FmNBB002055 for <ietf-openpgp@imc.org>; Thu, 3 Aug 2006 08:48:28 -0700 (MST) (envelope-from vedaal@hush.com)
Received: from smtp3.hushmail.com (localhost.hushmail.com [127.0.0.1]) by smtp3.hushmail.com (Postfix) with SMTP id 888F0A32B3 for <ietf-openpgp@imc.org>; Thu, 3 Aug 2006 08:48:22 -0700 (PDT)
Received: from mailserver7.hushmail.com (mailserver7.hushmail.com [65.39.178.62]) by smtp3.hushmail.com (Postfix) with ESMTP for <ietf-openpgp@imc.org>; Thu, 3 Aug 2006 08:48:20 -0700 (PDT)
Received: by mailserver7.hushmail.com (Postfix, from userid 65534) id 094FCDA81F; Thu, 3 Aug 2006 08:48:19 -0700 (PDT)
Date: Thu, 03 Aug 2006 11:48:18 -0400
To: <ietf-openpgp@imc.org>
Cc:
Subject: list of open-pgp objects // level of detail ?
From: <vedaal@hush.com>
Content-type: text/plain; charset="UTF-8"
Message-Id: <20060803154819.094FCDA81F@mailserver7.hushmail.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
X-Spam-Score: 0.2 (/)
X-Scan-Signature: c83ccb5cc10e751496398f1233ca9c3a

have been working on preparing a list of the open-pgp objects

am not sure how  'detailed'  it should be,
(i.e.  a zoo has an exhibit for a horse, 
but not really separate exhibits for mares, stallions, foals, brown 
horses, black horses, spotted horses, etc.)

here is a tentative list of the different open-pgp key examples:


I. Open-PGP keys:

first, 

A.  General categories of Key Types:

(1) RSA v3 		(Claude) 	(included for backward compatibilty)

(2) RSA v4 		(Alice)

(3) DH/elg		(Bob)

one key for each, 
to use for examples of the different open pgp message types,
(i.e. Claude sends a v3 signed message encrypted to Bob's key,
Bob sends a signed and encrypted message to Alice's key, etc.)

second,

B. Examples of the Different Types of Keys as Open-PGP objects:

[1] RSA v4, no subkey, primary sign only
[2] RSA v4, no subkey, primary sign and encrypt, 
(similar to v3 key usage)
[3] RSA v4, RSA v4 encrypting subkey
[4] RSA v4, RSA v4 signing subkey
[5] RSA v4, RSA v4 signing and encrypting subkey
[6] RSA v4, DH/Elg encrypting subkey
[7] RSA v4, DH signing subkey
[8] DH, no subkey, primary sign only
[9] DH, Elg encrypting subkey
[10] DH, DH signing subkey
[11] DH, RSA v4 encrypting subkey
[12] DH, RSA v4 signing subkey
[13] DH, RSA v4 signing and encrypting subkey


C. Different Ways of Generating the same Key 
(using RSA v4 as an example)

[1] simple s2k
[2] salted s2k
[3] iterated and salted s2k
[4] s2k with SHA-1 digest (usual case)
[5] s2k with SHA-256 digest
[6] s2k with SHA-512 digest
[7] s2k with RIPEMD-160 digest
[8] s2k with CAST-5 algo (usual case)
[9] s2k with 3-DES algo
[10] s2k with RIJNDAEL 256 algo
[11] s2k with TWOFISH 256 algo
[11] s2k with BLOWFISH algo


D. Different Features available with a Key:

[1] key with photo
[2] key with multiple user id's (one of them primary)
[3] key with comments
[4] key with expiration (never)
[5] key with fixed expiration date
[6] key with designated revoker 
[7] key disallowing a particular algorithm or algorithms
(currently only 3DES is a MUST)
[8] key allowing all algorithms, but with particular preferences
[9] keys with varying sizes of primary and subkeys (1024 - 16k)


is this too detailed,
or really the way it should be?

( the hard part is putting together the list,
once the list is made, generating the examples is relatively easy  
)

the level of specific details will determine the size of the list 
of Open PGP objects.
( the above tentative is list is only for Keys, 
there are still many other categories )

the size of the final collection of all the examples,
can range from about the size of the gpg.man pages 
to the size of the Handbook of Applied Cryptograhy  ;-)

so,
comments / suggestions / deletions / addtions / etc. /  ?


Thanks,

vedaal




Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485