aboutsummaryrefslogtreecommitdiffstats
path: root/doc/FAQ
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>1999-05-20 12:11:41 +0000
committerWerner Koch <[email protected]>1999-05-20 12:11:41 +0000
commit77d6309e2189254cf7a45884fb7ef6a415761988 (patch)
tree60da5c2556a5b7cb9c8d65dedd7a293eec2a35e8 /doc/FAQ
parentSee ChangeLog: Wed May 19 16:04:30 CEST 1999 Werner Koch (diff)
downloadgnupg-77d6309e2189254cf7a45884fb7ef6a415761988.tar.gz
gnupg-77d6309e2189254cf7a45884fb7ef6a415761988.zip
See ChangeLog: Thu May 20 14:04:08 CEST 1999 Werner Koch
Diffstat (limited to 'doc/FAQ')
-rw-r--r--doc/FAQ15
1 files changed, 9 insertions, 6 deletions
diff --git a/doc/FAQ b/doc/FAQ
index b008f2ce7..e22533e55 100644
--- a/doc/FAQ
+++ b/doc/FAQ
@@ -21,7 +21,7 @@
public key, and he would only be able to decrypt it by having the secret
key and putting in the password to use his secret key.
- GNUPG is also useful for signing things. Things that are encrypted with
+ GnuPG is also useful for signing things. Things that are encrypted with
the secret key can be decrypted with the public key. To sign something, a
hash is taken of the data, and then the hash is in some form encoded with
the secret key. If someone has your public key, they can verify that it
@@ -71,7 +71,7 @@
readable, just add the '-a' option. But the preferred method is to use
a MIME aware mail reader (Mutt, Pine and many more).
- There is a small security glitch in the OpenPGP (and therefor GNUPG) system;
+ There is a small security glitch in the OpenPGP (and therefore GnuPG) system;
to avoid this you should always sign and encrypt a message instead of only
encrypting it.
@@ -85,13 +85,13 @@
"gpg --fingerprint --fingerprint <user ID>".
Q: Why are some signatures with an ELG-E key valid?
- A: These are ElGamal Key generated by GNUPG in v3 (rfc1991)
+ A: These are ElGamal Key generated by GnuPG in v3 (rfc1991)
packets. The OpenPGP draft later changed the algorithm
identifier for ElGamal keys which are usable for signatures
- and encryption from 16 to 20. GNUPG now uses 20 when it
+ and encryption from 16 to 20. GnuPG now uses 20 when it
generates new ElGamal keys but still accept 16 (which is
according to OpenPGP "encryption only") if this key is in
- a v3 packet. GNUPG is the only program which had used
+ a v3 packet. GnuPG is the only program which had used
these v3 ElGamal keys - so this assumption is quite safe.
Q: Why is PGP 5.x not able to encrypt messages with some keys?
@@ -120,11 +120,14 @@
Q: How can I encrypt a message so that pgp 2.x is able to decrypt it?
A: You can't do that because pgp 2.x normally uses IDEA which is not
- supported by GNUPG because it is patented, but if you have a modified
+ supported by GnuPG because it is patented, but if you have a modified
version of PGP you can try this:
gpg --rfc1991 --cipher-algo 3des ...
+ Please don't pipe the data to encrypt to gpg but give it as a filename;
+ other wise, pgp 2 will not be able to handle it.
+
Q: How can I conventional encrypt a message, so that PGP can decrypt it?
A: You can't do this for PGP 2. For PGP 5 you should use this: