I just learned how to lookup a user's info on pgp.mit.edu. Is there some way to determine what algorithm the user is using?
-
2This question appears to be off-topic because it does not handle cryptography itself, but rather asks about a "how to" related to the MIT PGP Public Key Server and software usage. (Hint: read the related documentation.)– e-sushiCommented Jan 25, 2014 at 4:38
-
@e-sushi Would superuser be a better place to ask?– trusktrCommented Jan 25, 2014 at 10:39
-
1I think so, but to be honest - I'm not really sure. Since moderators also have the ability to move/migrate questions if it makes sense, I'll flag it for a moderator to look at it and decide if it makes sense to move it there or not. Could take a bit though, so you might want to be prepared for a little waiting time (yet... think in hours, not weeks).– e-sushiCommented Jan 25, 2014 at 13:50
-
Import the key into your GnuPG keyring and examine it. See the documentation of GnuPG.– sellibitzeCommented Jan 25, 2014 at 20:52
-
1This question appears to be off-topic, because it is about usage of specific cryptographic software (not its cryptographic internals). Such question may be more appropriate for Super User.– Ilmari KaronenCommented Jan 26, 2014 at 16:35
1 Answer
That's basically right. The details of what algorithm his key-pair is for is actually encoded as part of the public-key itself! That is the public-key is not really a raw key but instead it is packaged a bit to specify some details of the key (minimally the algorithm the key is for) as well as the key bit-string itself.
You can find more by reading about RSA PKCS#1 [published by IETF as RFC3447]: https://www.rfc-editor.org/rfc/rfc3447#section-3.1
-
I'm still don't fully understand. Is the following correct? When the recipient creates his key pair, he has chosen an algorithm for it. When the data on my side gets encrypted with the data encryption key, that will be using my algorithm of choice, and then the data encryption key gets encrypted with the recipient's public key and therefore with his chosen algorithm. He decrypts the data encryption key with the algorithm that matches with his private key, then he decrypts my final message with the algorithm I've used. Is that right?– trusktrCommented Feb 1, 2014 at 19:52