40479
ID | S2K Type |
---|---|
0 | Simple S2K |
1 | Salted S2K |
2 | Reserved value |
3 | Iterated and Salted S2K |
100 to 110 | Private/Experimental S2K |
Tag | Packet Type |
---|---|
0 | Reserved - a packet tag MUST NOT have this value |
1 | Public-Key Encrypted Session Key Packet |
2 | Signature Packet |
3 | Symmetric-Key Encrypted Session Key Packet |
4 | One-Pass Signature Packet |
5 | Secret-Key Packet |
6 | Public-Key Packet |
7 | Secret-Subkey Packet |
8 | Compressed Data Packet |
9 | Symmetrically Encrypted Data Packet |
10 | Marker Packet |
11 | Literal Data Packet |
12 | Trust Packet |
13 | User ID Packet |
14 | Public-Subkey Packet |
17 | User Attribute Packet |
18 | Sym. Encrypted and Integrity Protected Data Packet |
19 | Modification Detection Code Packet |
20 | Reserved (AEAD Encrypted Data) |
60 to 63 | Private or Experimental Values |
algorithm | hexadecimal represenatation |
---|---|
MD5 | 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05 |
RIPEMD-160 | 0x2B, 0x24, 0x03, 0x02, 0x01 |
SHA-1 | 0x2B, 0x0E, 0x03, 0x02, 0x1A |
SHA224 | 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04 |
SHA256 | 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01 |
SHA384 | 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02 |
SHA512 | 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03 |
algorithm | OID |
---|---|
MD5 | 1.2.840.113549.2.5 |
RIPEMD-160 | 1.3.36.3.2.1 |
SHA-1 | 1.3.14.3.2.26 |
SHA224 | 2.16.840.1.101.3.4.2.4 |
SHA256 | 2.16.840.1.101.3.4.2.1 |
SHA384 | 2.16.840.1.101.3.4.2.2 |
SHA512 | 2.16.840.1.101.3.4.2.3 |
algorithm | full hash prefix |
---|---|
MD5 | 0x30, 0x20, 0x30, 0x0C, 0x06, 0x08, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, 0x05, 0x00, 0x04, 0x10 |
RIPEMD-160 | 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x24, 0x03, 0x02, 0x01, 0x05, 0x00, 0x04, 0x14 |
SHA-1 | 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14 |
SHA224 | 0x30, 0x2D, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C |
SHA256 | 0x30, 0x31, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20 |
SHA384 | 0x30, 0x41, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30 |
SHA512 | 0x30, 0x51, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40 |
Type | Description |
---|---|
0 | Reserved |
1 | Reserved |
2 | Signature Creation Time |
3 | Signature Expiration Time |
4 | Exportable Certification |
5 | Trust Signature |
6 | Regular Expression |
7 | Revocable |
8 | Reserved |
9 | Key Expiration Time |
10 | Placeholder for backward compatibility |
11 | Preferred Symmetric Algorithms |
12 | Revocation Key |
13 to 15 | Reserved |
16 | Issuer |
17 to 19 | Reserved |
20 | Notation Data |
21 | Preferred Hash Algorithms |
22 | Preferred Compression Algorithms |
23 | Key Server Preferences |
24 | Preferred Key Server |
25 | Primary User ID |
26 | Policy URI |
27 | Key Flags |
28 | Signer's User ID |
29 | Reason for Revocation |
30 | Features |
31 | Signature Target |
32 | Embedded Signature |
33 | Issuer Fingerprint |
34 | Reserved (Preferred AEAD Algorithms) |
35 | Reserved (Intended Recipient Fingerprint) |
37 | Reserved (Attested Certifications) |
38 | Reserved (Key Block) |
100 to 110 | Private or experimental |
flag | shorthand | definition |
---|---|---|
0x80 | human-readable | This note value is text. |
flag | shorthand | definition |
---|---|---|
0x80 | No-modify | The key holder requests that this key only be modified or updated by the key holder or an administrator of the key server. |
flag | definition |
---|---|
0x01 | This key may be used to certify other keys. |
0x02 | This key may be used to sign data. |
0x04 | This key may be used to encrypt communications. |
0x08 | This key may be used to encrypt storage. |
0x10 | The private component of this key may have been split by a secret-sharing mechanism. |
0x20 | This key may be used for authentication. |
0x80 | The private component of this key may be in the possession of more than one person. |
flag | definition |
---|---|
0x04 | Reserved (ADSK). |
0x08 | Reserved (timestamping). |
Code | Reason |
---|---|
0 | No reason specified (key revocations or cert revocations) |
1 | Key is superseded (key revocations) |
2 | Key material has been compromised (key revocations) |
3 | Key is retired and no longer used (key revocations) |
32 | User ID information is no longer valid (cert revocations) |
100-110 | Private Use |
feature | definition |
---|---|
0x01 | Modification Detection (packets 18 and 19) |
0x02 | Reserved (AEAD Data & v5 SKESK) |
0x04 | Version 5 Public-Key Packet format and corresponding new fingerprint format |
Type | Attribute Subpacket |
---|---|
1 | Image Attribute Subpacket |
100-110 | Private/Experimental Use |
Value | Encoding | Value | Encoding | Value | Encoding | Value | Encoding | |||
---|---|---|---|---|---|---|---|---|---|---|
0 | A | 17 | R | 34 | i | 51 | z | |||
1 | B | 18 | S | 35 | j | 52 | 0 | |||
2 | C | 19 | T | 36 | k | 53 | 1 | |||
3 | D | 20 | U | 37 | l | 54 | 2 | |||
4 | E | 21 | V | 38 | m | 55 | 3 | |||
5 | F | 22 | W | 39 | n | 56 | 4 | |||
6 | G | 23 | X | 40 | o | 57 | 5 | |||
7 | H | 24 | Y | 41 | p | 58 | 6 | |||
8 | I | 25 | Z | 42 | q | 59 | 7 | |||
9 | J | 26 | a | 43 | r | 60 | 8 | |||
10 | K | 27 | b | 44 | s | 61 | 9 | |||
11 | L | 28 | c | 45 | t | 62 | + | |||
12 | M | 29 | d | 46 | u | 63 | / | |||
13 | N | 30 | e | 47 | v | |||||
14 | O | 31 | f | 48 | w | (pad) | = | |||
15 | P | 32 | g | 49 | x | |||||
16 | Q | 33 | h | 50 | y |
ID | Algorithm |
---|---|
1 | RSA (Encrypt or Sign) |
2 | RSA Encrypt-Only |
3 | RSA Sign-Only |
16 | Elgamal (Encrypt-Only) |
17 | DSA (Digital Signature Algorithm) |
18 | ECDH public key algorithm |
19 | ECDSA public key algorithm |
20 | Reserved (formerly Elgamal Encrypt or Sign) |
21 | Reserved for Diffie-Hellman (X9.42, as defined for IETF-S/MIME) |
22 | EdDSA |
23 | Reserved (AEDH) |
24 | Reserved (AEDSA) |
100 to 110 | Private/Experimental algorithm |
ASN.1 Object Identifier | OID len | Curve OID bytes in hexadecimal representation | Curve name |
---|---|---|---|
1.2.840.10045.3.1.7 | 8 | 2A 86 48 CE 3D 03 01 07 | NIST P-256 |
1.3.132.0.34 | 5 | 2B 81 04 00 22 | NIST P-384 |
1.3.132.0.35 | 5 | 2B 81 04 00 23 | NIST P-521 |
1.3.6.1.4.1.11591.15.1 | 9 | 2B 06 01 04 01 DA 47 0F 01 | Ed25519 |
1.3.6.1.4.1.3029.1.5.1 | 10 | 2B 06 01 04 01 97 55 01 05 01 | Curve25519 |
ID | Algorithm |
---|---|
0 | Plaintext or unencrypted data |
1 | IDEA |
2 | TripleDES (DES-EDE, |
3 | CAST5 (128 bit key, as per |
4 | Blowfish (128 bit key, 16 rounds) |
5 | Reserved |
6 | Reserved |
7 | AES with 128-bit key |
8 | AES with 192-bit key |
9 | AES with 256-bit key |
10 | Twofish with 256-bit key |
11 | Camellia with 128-bit key |
12 | Camellia with 192-bit key |
13 | Camellia with 256-bit key |
100 to 110 | Private/Experimental algorithm |
ID | Algorithm |
---|---|
0 | Uncompressed |
1 | ZIP |
2 | ZLIB |
3 | BZip2 |
100 to 110 | Private/Experimental algorithm |
ID | Algorithm | Text Name |
---|---|---|
1 | MD5 |
"MD5" |
2 | SHA-1 |
"SHA1" |
3 | RIPE-MD/160 |
"RIPEMD160" |
4 | Reserved | |
5 | Reserved | |
6 | Reserved | |
7 | Reserved | |
8 | SHA2-256 |
"SHA256" |
9 | SHA2-384 |
"SHA384" |
10 | SHA2-512 |
"SHA512" |
11 | SHA2-224 |
"SHA224" |
12 | SHA3-256 |
"SHA3-256" |
13 | Reserved | |
14 | SHA3-512 |
"SHA3-512" |
100 to 110 | Private/Experimental algorithm |
ID | Algorithm | Reference |
---|---|---|
22 | EdDSA public key algorithm | This doc, |
ID | Algorithm | Reference |
---|---|---|
12 | SHA3-256 | This doc |
13 | Reserved | |
14 | SHA3-512 | This doc |
Asymmetric key size | Hash size | Symmetric key size |
---|---|---|
1024 | 160 | 80 |
2048 | 224 | 112 |
3072 | 256 | 128 |
7680 | 384 | 192 |
15360 | 512 | 256 |
Curve name | ECC | RSA strength | Hash size strength, informative | Symmetric key size |
---|---|---|---|---|
NIST P-256 | 256 | 3072 | 256 | 128 |
NIST P-384 | 384 | 7680 | 384 | 192 |
NIST P-521 | 521 | 15360 | 512 | 256 |
Curve name | Recommended KDF hash algorithm | Recommended KEK encryption algorithm |
---|---|---|
NIST P-256 | SHA2-256 | AES-128 |
NIST P-384 | SHA2-384 | AES-192 |
NIST P-521 | SHA2-512 | AES-256 |