1

I just learned how to lookup a user's info on pgp.mit.edu. Is there some way to determine what algorithm the user is using?

5
  • 2
    This question appears to be off-topic because it does not handle cryptography itself, but rather asks about a "how to" related to the MIT PGP Public Key Server and software usage. (Hint: read the related documentation.)
    – e-sushi
    Commented Jan 25, 2014 at 4:38
  • @e-sushi Would superuser be a better place to ask?
    – trusktr
    Commented Jan 25, 2014 at 10:39
  • 1
    I think so, but to be honest - I'm not really sure. Since moderators also have the ability to move/migrate questions if it makes sense, I'll flag it for a moderator to look at it and decide if it makes sense to move it there or not. Could take a bit though, so you might want to be prepared for a little waiting time (yet... think in hours, not weeks).
    – e-sushi
    Commented Jan 25, 2014 at 13:50
  • Import the key into your GnuPG keyring and examine it. See the documentation of GnuPG.
    – sellibitze
    Commented Jan 25, 2014 at 20:52
  • 1
    This question appears to be off-topic, because it is about usage of specific cryptographic software (not its cryptographic internals). Such question may be more appropriate for Super User. Commented Jan 26, 2014 at 16:35

1 Answer 1

0

That's basically right. The details of what algorithm his key-pair is for is actually encoded as part of the public-key itself! That is the public-key is not really a raw key but instead it is packaged a bit to specify some details of the key (minimally the algorithm the key is for) as well as the key bit-string itself.

You can find more by reading about RSA PKCS#1 [published by IETF as RFC3447]: https://www.rfc-editor.org/rfc/rfc3447#section-3.1

1
  • I'm still don't fully understand. Is the following correct? When the recipient creates his key pair, he has chosen an algorithm for it. When the data on my side gets encrypted with the data encryption key, that will be using my algorithm of choice, and then the data encryption key gets encrypted with the recipient's public key and therefore with his chosen algorithm. He decrypts the data encryption key with the algorithm that matches with his private key, then he decrypts my final message with the algorithm I've used. Is that right?
    – trusktr
    Commented Feb 1, 2014 at 19:52

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .