DSA2 test material
David Shaw <dshaw@jabberwocky.com> Tue, 06 June 2006 16:45 UTC
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FnegT-0005Em-O2 for openpgp-archive@lists.ietf.org; Tue, 06 Jun 2006 12:45:37 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FnegS-0008R1-5O for openpgp-archive@lists.ietf.org; Tue, 06 Jun 2006 12:45:37 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k56G9tbl067462; Tue, 6 Jun 2006 09:09:55 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k56G9tCt067461; Tue, 6 Jun 2006 09:09:55 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from foobar.cs.jhu.edu (foobar.cs.jhu.edu [128.220.13.173]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k56G9qGW067394 for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 09:09:55 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from walrus.hsd1.ma.comcast.net (walrus.hsd1.ma.comcast.net [24.60.132.70]) by foobar.cs.jhu.edu (8.11.6/8.11.6) with ESMTP id k56G9jk05434 for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 12:09:45 -0400
Received: from grover.jabberwocky.com (grover.jabberwocky.com [172.24.84.28]) by walrus.hsd1.ma.comcast.net (8.13.6/8.13.6) with ESMTP id k56GEMBS020459 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 12:14:22 -0400
Received: from grover.jabberwocky.com (grover.jabberwocky.com [127.0.0.1]) by grover.jabberwocky.com (8.13.1/8.13.1) with ESMTP id k56G9ddC010875 for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 12:09:39 -0400
Received: (from dshaw@localhost) by grover.jabberwocky.com (8.13.1/8.13.1/Submit) id k56G9d6p010874 for ietf-openpgp@imc.org; Tue, 6 Jun 2006 12:09:39 -0400
Date: Tue, 06 Jun 2006 12:09:39 -0400
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: DSA2 test material
Message-ID: <20060606160939.GC28850@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
OpenPGP: id=99242560; url=http://www.jabberwocky.com/david/keys.asc
User-Agent: Mutt/1.5.11
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 538aad3a3c4f01d8b6a6477ca4248793
I have put together some sample keys and signatures to help test DSA2 interoperability and posted the lot at http://www.jabberwocky.com/openpgp/dsa2.tar.gz Note that the current released version of GnuPG (1.4.3) can verify, but will not generate a DSA2 signature or key. The next version will allow generation of DSA2 keys if the --enable-dsa2 option is given (off by default to try and minimize the "Hey, neat, a bigger key. What do you mean most of the world can't verify my signatures?" factor). The readme file: This archive contains material to help verify interoperability to the OpenPGP DSA2 design as implemented in GnuPG. Keys are located in the keys directory. Included are: 1024 bits, 160 bit q size (i.e. regular old DSA) 2048 bits, 224 bit q size 3072 bits, 256 bit q size 7680 bits, 384 bit q size 15360 bits, 512 bit q size All secret keys have the passphrase "test". Note the inclusion of 7680/384 and 15360/512 keys. They're large, inconvenient and absurdly slow. GnuPG will accept any size key, but will not generate DSA keys over 3072 bits. I include these keys mainly for be-liberal-in-what-you-accept testing. There are are signatures issued by these keys in the sigs directory. The filenames indicate the key used to make the signature, and the number of bits of the hash. In the case of the 1024-bit DSA key (160-bit q size), there are 5 signatures using different hashes. This is to demonstrate hash truncation to fit in the 160-bit hash size of that key. File Key size Hash ---------------------- ---------- ------- dsa-1024-160-sign.gpg 1024 bits SHA-1 dsa-1024-224-sign.gpg 1024 bits SHA-224 (truncated to 160 bits) dsa-1024-256-sign.gpg 1024 bits SHA-256 (truncated to 160 bits) dsa-1024-384-sign.gpg 1024 bits SHA-384 (truncated to 160 bits) dsa-1024-512-sign.gpg 1024 bits SHA-512 (truncated to 160 bits) dsa-2048-224-sign.gpg 2048 bits SHA-224 dsa-3072-256-sign.gpg 3072 bits SHA-256 dsa-7680-384-sign.gpg 7680 bits SHA-384 dsa-15360-512-sign.gpg 15360 bits SHA-512 David
- DSA2 test material David Shaw
- Re: DSA2 test material vedaal
- Re: DSA2 test material David Shaw