list of open-pgp objects // level of detail ?
<vedaal@hush.com> Thu, 03 August 2006 16:24 UTC
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G8fzq-0001qw-Kv for openpgp-archive@lists.ietf.org; Thu, 03 Aug 2006 12:24:30 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G8fzp-0008Tw-6u for openpgp-archive@lists.ietf.org; Thu, 03 Aug 2006 12:24:30 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k73FmSet002078; Thu, 3 Aug 2006 08:48:28 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k73FmSBc002077; Thu, 3 Aug 2006 08:48:28 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp3.hushmail.com (smtp3.hushmail.com [65.39.178.135]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k73FmNBB002055 for <ietf-openpgp@imc.org>; Thu, 3 Aug 2006 08:48:28 -0700 (MST) (envelope-from vedaal@hush.com)
Received: from smtp3.hushmail.com (localhost.hushmail.com [127.0.0.1]) by smtp3.hushmail.com (Postfix) with SMTP id 888F0A32B3 for <ietf-openpgp@imc.org>; Thu, 3 Aug 2006 08:48:22 -0700 (PDT)
Received: from mailserver7.hushmail.com (mailserver7.hushmail.com [65.39.178.62]) by smtp3.hushmail.com (Postfix) with ESMTP for <ietf-openpgp@imc.org>; Thu, 3 Aug 2006 08:48:20 -0700 (PDT)
Received: by mailserver7.hushmail.com (Postfix, from userid 65534) id 094FCDA81F; Thu, 3 Aug 2006 08:48:19 -0700 (PDT)
Date: Thu, 03 Aug 2006 11:48:18 -0400
To: ietf-openpgp@imc.org
Cc:
Subject: list of open-pgp objects // level of detail ?
From: vedaal@hush.com
Content-type: text/plain; charset="UTF-8"
Message-Id: <20060803154819.094FCDA81F@mailserver7.hushmail.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
X-Spam-Score: 0.2 (/)
X-Scan-Signature: c83ccb5cc10e751496398f1233ca9c3a
have been working on preparing a list of the open-pgp objects am not sure how 'detailed' it should be, (i.e. a zoo has an exhibit for a horse, but not really separate exhibits for mares, stallions, foals, brown horses, black horses, spotted horses, etc.) here is a tentative list of the different open-pgp key examples: I. Open-PGP keys: first, A. General categories of Key Types: (1) RSA v3 (Claude) (included for backward compatibilty) (2) RSA v4 (Alice) (3) DH/elg (Bob) one key for each, to use for examples of the different open pgp message types, (i.e. Claude sends a v3 signed message encrypted to Bob's key, Bob sends a signed and encrypted message to Alice's key, etc.) second, B. Examples of the Different Types of Keys as Open-PGP objects: [1] RSA v4, no subkey, primary sign only [2] RSA v4, no subkey, primary sign and encrypt, (similar to v3 key usage) [3] RSA v4, RSA v4 encrypting subkey [4] RSA v4, RSA v4 signing subkey [5] RSA v4, RSA v4 signing and encrypting subkey [6] RSA v4, DH/Elg encrypting subkey [7] RSA v4, DH signing subkey [8] DH, no subkey, primary sign only [9] DH, Elg encrypting subkey [10] DH, DH signing subkey [11] DH, RSA v4 encrypting subkey [12] DH, RSA v4 signing subkey [13] DH, RSA v4 signing and encrypting subkey C. Different Ways of Generating the same Key (using RSA v4 as an example) [1] simple s2k [2] salted s2k [3] iterated and salted s2k [4] s2k with SHA-1 digest (usual case) [5] s2k with SHA-256 digest [6] s2k with SHA-512 digest [7] s2k with RIPEMD-160 digest [8] s2k with CAST-5 algo (usual case) [9] s2k with 3-DES algo [10] s2k with RIJNDAEL 256 algo [11] s2k with TWOFISH 256 algo [11] s2k with BLOWFISH algo D. Different Features available with a Key: [1] key with photo [2] key with multiple user id's (one of them primary) [3] key with comments [4] key with expiration (never) [5] key with fixed expiration date [6] key with designated revoker [7] key disallowing a particular algorithm or algorithms (currently only 3DES is a MUST) [8] key allowing all algorithms, but with particular preferences [9] keys with varying sizes of primary and subkeys (1024 - 16k) is this too detailed, or really the way it should be? ( the hard part is putting together the list, once the list is made, generating the examples is relatively easy ) the level of specific details will determine the size of the list of Open PGP objects. ( the above tentative is list is only for Keys, there are still many other categories ) the size of the final collection of all the examples, can range from about the size of the gpg.man pages to the size of the Handbook of Applied Cryptograhy ;-) so, comments / suggestions / deletions / addtions / etc. / ? Thanks, vedaal Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485