DSA2 test material

David Shaw <dshaw@jabberwocky.com> Tue, 06 June 2006 16:45 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FnegT-0005Em-O2 for openpgp-archive@lists.ietf.org; Tue, 06 Jun 2006 12:45:37 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FnegS-0008R1-5O for openpgp-archive@lists.ietf.org; Tue, 06 Jun 2006 12:45:37 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k56G9tbl067462; Tue, 6 Jun 2006 09:09:55 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k56G9tCt067461; Tue, 6 Jun 2006 09:09:55 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from foobar.cs.jhu.edu (foobar.cs.jhu.edu [128.220.13.173]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k56G9qGW067394 for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 09:09:55 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from walrus.hsd1.ma.comcast.net (walrus.hsd1.ma.comcast.net [24.60.132.70]) by foobar.cs.jhu.edu (8.11.6/8.11.6) with ESMTP id k56G9jk05434 for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 12:09:45 -0400
Received: from grover.jabberwocky.com (grover.jabberwocky.com [172.24.84.28]) by walrus.hsd1.ma.comcast.net (8.13.6/8.13.6) with ESMTP id k56GEMBS020459 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 12:14:22 -0400
Received: from grover.jabberwocky.com (grover.jabberwocky.com [127.0.0.1]) by grover.jabberwocky.com (8.13.1/8.13.1) with ESMTP id k56G9ddC010875 for <ietf-openpgp@imc.org>; Tue, 6 Jun 2006 12:09:39 -0400
Received: (from dshaw@localhost) by grover.jabberwocky.com (8.13.1/8.13.1/Submit) id k56G9d6p010874 for ietf-openpgp@imc.org; Tue, 6 Jun 2006 12:09:39 -0400
Date: Tue, 06 Jun 2006 12:09:39 -0400
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: DSA2 test material
Message-ID: <20060606160939.GC28850@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
OpenPGP: id=99242560; url=http://www.jabberwocky.com/david/keys.asc
User-Agent: Mutt/1.5.11
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 538aad3a3c4f01d8b6a6477ca4248793

I have put together some sample keys and signatures to help test DSA2
interoperability and posted the lot at
http://www.jabberwocky.com/openpgp/dsa2.tar.gz

Note that the current released version of GnuPG (1.4.3) can verify,
but will not generate a DSA2 signature or key.  The next version will
allow generation of DSA2 keys if the --enable-dsa2 option is given
(off by default to try and minimize the "Hey, neat, a bigger key.
What do you mean most of the world can't verify my signatures?"
factor).

The readme file:

This archive contains material to help verify interoperability to the
OpenPGP DSA2 design as implemented in GnuPG.

Keys are located in the keys directory.  Included are:

 1024 bits, 160 bit q size (i.e. regular old DSA)
 2048 bits, 224 bit q size
 3072 bits, 256 bit q size
 7680 bits, 384 bit q size
15360 bits, 512 bit q size

All secret keys have the passphrase "test".

Note the inclusion of 7680/384 and 15360/512 keys.  They're large,
inconvenient and absurdly slow.  GnuPG will accept any size key, but
will not generate DSA keys over 3072 bits.  I include these keys
mainly for be-liberal-in-what-you-accept testing.

There are are signatures issued by these keys in the sigs directory.
The filenames indicate the key used to make the signature, and the
number of bits of the hash.  In the case of the 1024-bit DSA key
(160-bit q size), there are 5 signatures using different hashes.  This
is to demonstrate hash truncation to fit in the 160-bit hash size of
that key.

File			Key size    Hash
----------------------  ----------  -------
dsa-1024-160-sign.gpg	 1024 bits  SHA-1
dsa-1024-224-sign.gpg	 1024 bits  SHA-224 (truncated to 160 bits)
dsa-1024-256-sign.gpg	 1024 bits  SHA-256 (truncated to 160 bits)
dsa-1024-384-sign.gpg	 1024 bits  SHA-384 (truncated to 160 bits)
dsa-1024-512-sign.gpg	 1024 bits  SHA-512 (truncated to 160 bits)
dsa-2048-224-sign.gpg	 2048 bits  SHA-224
dsa-3072-256-sign.gpg	 3072 bits  SHA-256
dsa-7680-384-sign.gpg	 7680 bits  SHA-384
dsa-15360-512-sign.gpg	15360 bits  SHA-512

David