- #Gnu privacy guard gpg install#
- #Gnu privacy guard gpg software#
- #Gnu privacy guard gpg license#
- #Gnu privacy guard gpg series#
- #Gnu privacy guard gpg windows#
from the 1.4 branch) along with any GnuPG 2.x version.
#Gnu privacy guard gpg install#
However, it is possible to install a "classic" GnuPG version (i.e. from the 2.2 and 2.0 branches) cannot be installed at the same time.
#Gnu privacy guard gpg windows#
The German Federal Ministry of Economics and Technology funded the documentation and the port to Microsoft Windows in 2000. The first production version, version 1.0.0, was released on September 7, 1999, almost two years after the first GnuPG release (version 0.0.0). GnuPG was initially developed by Werner Koch.
#Gnu privacy guard gpg series#
More recent releases of GnuPG 2.x ("modern" and the now deprecated "stable" series) expose most cryptographic functions and algorithms Libgcrypt (its cryptography library) provides, including support for elliptic curve cryptography (ECDH, ECDSA and EdDSA) in the "modern" series (i.e. Algorithms Īs of 2.2 versions, GnuPG supports the following algorithms: Public key RSA, ElGamal, DSA, ECDH, ECDSA, EdDSA Cipher 3DES, IDEA (since versions 1.4.13 and 2.0.20), CAST5, Blowfish, Twofish, AES-128, AES-192, AES-256, Camellia-128, -192 and -256 (since versions 1.4.10 and 2.0.12) Hash MD5, SHA-1, RIPEMD-160, SHA-256, SHA-384, SHA-512, SHA-224 Compression Uncompressed, ZIP, ZLIB, BZIP2 Support of IDEA is intended "to get rid of all the questions from folks either trying to decrypt old data or migrating keys from PGP to GnuPG", and hence is not recommended for regular use.
Starting with versions 1.4.13 and 2.0.20, GnuPG supports IDEA because the last patent of IDEA expired in 2012.
#Gnu privacy guard gpg license#
It was in fact possible to use IDEA in GnuPG by downloading a plugin for it, however, this might require a license for some uses in countries in which IDEA was patented. įor a long time, it did not support the IDEA encryption algorithm used in PGP. Instead, GnuPG uses a variety of other, non-patented algorithms.
#Gnu privacy guard gpg software#
GnuPG does not use patented or otherwise restricted software or algorithms. By default, GnuPG uses the AES symmetrical algorithm since version 2.1, CAST5 was used in earlier versions. GnuPG also supports symmetric encryption algorithms. It is also possible to add a cryptographic digital signature to a message, so the message integrity and sender can be verified, if a particular correspondence relied upon has not been corrupted. They must always be exchanged carefully to prevent identity spoofing by corrupting public key ↔ "owner" identity correspondences. The resulting public keys may be exchanged with other users in a variety of ways, such as Internet key servers. GnuPG encrypts messages using asymmetric key pairs individually generated by GnuPG users. The GnuPG 1.x series uses an integrated cryptographic library, while the GnuPG 2.x series replaces this with Libgcrypt. This mode of operation is part of the OpenPGP standard and has been part of PGP from its first version. GnuPG is a hybrid-encryption software program because it uses a combination of conventional symmetric-key cryptography for speed, and public-key cryptography for ease of secure key exchange, typically by using the recipient's public key to encrypt a session key which is used only once.