This file is indexed.

/usr/share/doc/gnupg-doc/pgp2x/pgp2x.html is in gnupg-doc 2003.04.06+dak1-1ubuntu1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN""http://www.w3.org/TR/html4/loose.dtd">
<HTML
><HEAD
><TITLE
>Replacing PGP 2.x with GnuPG</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.79"></HEAD
><BODY
CLASS="ARTICLE"
><DIV
CLASS="ARTICLE"
><DIV
CLASS="TITLEPAGE"
><H1
CLASS="TITLE"
><A
NAME="AEN2"
>Replacing PGP 2.x with GnuPG</A
></H1
><P
CLASS="COPYRIGHT"
>Copyright &copy; 1999 Kyle Hasselbacher</P
><HR></DIV
><BLOCKQUOTE
CLASS="ABSTRACT"
><DIV
CLASS="ABSTRACT"
><P
></P
><A
NAME="AEN7"
></A
><P
>This article is based on an earlier
<A
HREF="http://www.toehold.com/~kyle/pgp-compat.html"
TARGET="_top"
>PGP 2.x/GnuPG 
compatability guide</A
> written by Kyle Hasselbacher 
(<CODE
CLASS="EMAIL"
>&#60;<A
HREF="mailto:kyle@toehold.com"
>kyle@toehold.com</A
>&#62;</CODE
>).
Mike Ashley (<CODE
CLASS="EMAIL"
>&#60;<A
HREF="mailto:jashley@acm.org"
>jashley@acm.org</A
>&#62;</CODE
>) edited and expanded it.
Michael Fischer v. Mollard (<CODE
CLASS="EMAIL"
>&#60;<A
HREF="mailto:mfvm@gmx.de"
>mfvm@gmx.de</A
>&#62;</CODE
>) transformed the 
HTML source to DocBook SGML and also expanded it further.
Some of the details described here came from the 
<TT
CLASS="LITERAL"
>gnupg-devel</TT
> and <TT
CLASS="LITERAL"
>gnupg-user</TT
> mailing lists.
The workaround for both signing with and encrypting to an RSA key were
taken from 
<A
HREF="http://muppet.faveve.uni-stuttgart.de/~gero/gpg-2comp/changes.html"
TARGET="_top"
>Gero 
Treuner's compatability script</A
>.
Please direct questions, bug reports, or suggesstions to
the maintainer, Mike Ashley.</P
><P
>Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1
or any later version published by the Free Software Foundation;
with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts.
A copy of the license is included in the section entitled "GNU
Free Documentation License".</P
><P
></P
></DIV
></BLOCKQUOTE
><DIV
CLASS="SECT1"
><HR><H2
CLASS="SECT1"
><A
NAME="AEN17"
>Introduction</A
></H2
><P
>This document describes how to communicate with people still using
old versions of PGP 2.x
GnuPG can be used as a nearly complete replacement for
PGP 2.x.
You may encrypt and decrypt PGP 2.x messages using imported
old keys, but you cannot generate PGP 2.x keys.
This document demonstrates how to extend the standard distribution of
GnuPG to support PGP 2.x keys as well as what options must be used to
ensure inter-operation with PGP 2.x users.  
It also warns of anomalies
with the interoperation of PGP 2.x and GnuPG.  </P
><P
><SPAN
CLASS="emphasis"
><I
CLASS="EMPHASIS"
>Note:</I
></SPAN
> Using the extension modules
<TT
CLASS="FILENAME"
>idea.c</TT
> and <TT
CLASS="FILENAME"
>rsa.c</TT
> without
licensing the patented algorithms they implement may be illegal.
I do not recommend you use these modules.  
If you have PGP 2.x keys, I suggest you revoke them in favor of new keys and
encourage correspondents who use PGP 2.x keys to do the same.</P
></DIV
><DIV
CLASS="SECT1"
><HR><H2
CLASS="SECT1"
><A
NAME="AEN24"
>Extending GnuPG to support PGP 2.x keys</A
></H2
><P
>The standard distribution of GnuPG does not support PGP 2.x keys since
PGP 2.x uses IDEA as its symmetric cipher and RSA for its public key
cipher. 
These algorithms are patented<A
NAME="AEN27"
HREF="#FTN.AEN27"
><SPAN
CLASS="footnote"
>[1]</SPAN
></A
>
and may only be used under certain restrictions. 
It is a GNU policy not to use patented algorithms, since patents on
algorithms are a contradiction to the spirit of free software.
Employing these algorithms limits your freedom to use GnuPG as you wish.</P
><P
>It may or may not be legal to use RSA and IDEA without licensing
these algorithms.
RSA is only patented in the United States, so it is legal to build RSA
versions outside of the United States. 
The extension module for GnuPG is such a version and it may be 
legally used outside the United States, but it is illegal to use it 
in the United States.  
In the United States there exists a reference implementation for RSA 
called RSAREF, available at
<A
HREF="tp://ftp.funet.fi/pub/crypt/cryptography/asymmetric/rsa/rsaref2.tar.gz"
TARGET="_top"
>ftp.funet.fi</A
> or at 
<A
HREF=" ftp://non-us.debian.org/debian-non-US/dists/stable/non-US/source/rsaref_19930105.orig.tar.gz"
TARGET="_top"
>debian.org</A
>, 
that may be used legally without a charge in the USA for non commercial 
use.
Due to export restrictions this code cannot be exported, so there
are two ways to integrate RSA into GnuPG: one for the USA and Canada, and
one for the rest of the world.</P
><P
>The situation for IDEA is simpler.
IDEA is patented in Europe and in the USA, and a patent for Japan is 
pending. 
The patent holder, Ascom, grants a non-commerical
<A
HREF="http://www.ascom.ch/infosec/idea/licensing.html"
TARGET="_top"
>license</A
>
for no charge, but the definition of non-commercial use is rather strict
You need to buy a license from Ascom if you want to use IDEA commercially.</P
><P
>To use the extension modules first obtain their source code,
<TT
CLASS="FILENAME"
>idea.c</TT
> and <TT
CLASS="FILENAME"
>rsa.c</TT
> or
<TT
CLASS="FILENAME"
>rsaref.c</TT
> from the directory of code 
<A
HREF="ftp://ftp.gnupg.org/pub/gcrypt/contrib/"
TARGET="_top"
>contributed</A
>
to GnuPG. 
Once you have the code, it must be compiled.
If you use <SPAN
CLASS="APPLICATION"
>gcc</SPAN
>, you would compile it as follows: </P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gcc -Wall -O2 -shared -fPIC -o idea idea.c</KBD
>  
[...]  
<SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gcc -Wall -O2 -shared -fPIC -o rsa rsa.c</KBD
>  
[...] # or
<SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gcc -Wall -O2 -shared -fPIC -o rsa rsaref.c /usr/lib/rsaref.a</KBD
>
 </PRE
></TD
></TR
></TABLE
><P
>The last argument <TT
CLASS="FILENAME"
>/usr/lib/rsaref.a</TT
> must be
replaced with the real location of the RSAREF library on your local machine.</P
><P
>Once compiled, GnuPG must be instructed to load it. 
This may be done using the option <CODE
CLASS="OPTION"
>load-extension</CODE
>, 
either on the command line or in the options file although typically it
is done in the options file.
For example, if you have put <TT
CLASS="FILENAME"
>idea</TT
>
and <TT
CLASS="FILENAME"
>rsa</TT
> in your <TT
CLASS="FILENAME"
>~/.gnupg</TT
>
directory, in the options file you may add</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
>load-extension ~/.gnupg/idea  
load-extension ~/.gnupg/rsa      </PRE
></TD
></TR
></TABLE
><P
>If you do not specify an explicit path, GnuPG searches the
extension modules in the default GnuPG module directory, which is
<TT
CLASS="FILENAME"
>/usr/local/lib/gnupg</TT
>. 
If you compiled GnuPG with a different install prefix using
<CODE
CLASS="OPTION"
>--prefix PREFIX</CODE
> when you configured
your GnuPG source, then the module directory is 
<TT
CLASS="FILENAME"
>PREFIX/lib/gnupg</TT
>.
Copy the two files `rsa' and `idea' into the module directory described
above.
Make sure everyone can read these files.
You do not have to make these files executable as these files are not
programs but shared modules.</P
></DIV
><DIV
CLASS="SECT1"
><HR><H2
CLASS="SECT1"
><A
NAME="AEN59"
>Importing PGP 2.x keys</A
></H2
><P
>Once the extensions are loaded it is straightforward to import a PGP 2.x
key pair using the option <CODE
CLASS="OPTION"
>import</CODE
>. 
There are two caveats, however.</P
><P
><P
></P
><UL
><LI
><P
>You must not export a private key from PGP 2.x as an ASCII-armored file.  
Because PGP 2.x predates the OpenPGP specification,
the armored message header PGP 2.x uses is not compliant with OpenPGP.
Because private key export is rare, GnuPG does not check for the
case when the ASCII-armored message is a private key.</P
></LI
><LI
><P
>GnuPG expects imported public keys to be self-signed
by the corresponding private key.
This is a prudent  precaution, and
both GnuPG and newer versions of PGP self-sign public keys when they
are first created.  
This is not done by PGP 2.x, however.
To solve this, you can first self-sign the public key before exporting
it from PGP 2.x.  
Alternatively, you can use the option
<CODE
CLASS="OPTION"
>allow-non-selfsigned-uid</CODE
> to force GnuPG to take the
key anyway.
It is recommended that you self-sign the key either
before exporting it or after you have imported it, though, since using
a non-self-signed key is a security risk.</P
></LI
></UL
></P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
><KBD
CLASS="USERINPUT"
> pgp -kx alice public.pgp</KBD
> 
Pretty Good Privacy(tm) 2.6.2 - Public-key encryption for the masses. 
[...]
Extracting from key ring: '/u/alice/.pgp/pubring.pgp', userid "alice". 
Key for user ID: Alice &lt;alice@cyb.org&#62; 
1024-bit key, Key ID 24E2C409, created 1999/09/18

Key extracted to file 'public.pgp'. 

<SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>pgp -kx alice private.pgp .pgp/secring.pgp</KBD
>
Pretty Good Privacy(tm) 2.6.2 - Public-key encryption for the masses.
[...] 

Extracting from key ring: '.pgp/secring.pgp', userid "alice".
Key for user ID: Alice &lt;alice@cyb.org&#62; 
1024-bit key, Key ID 24E2C409, created 1999/09/18 

Key extracted to file 'private.pgp'.

<SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
><SPAN
CLASS="APPLICATION"
>gpg</SPAN
> --import public.pgp</KBD
>
gpg: key 24E2C409: public key imported 
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1) 

<SAMP
CLASS="PROMPT"
>alice%</SAMP
><KBD
CLASS="USERINPUT"
><SPAN
CLASS="APPLICATION"
>gpg</SPAN
> --import private.pgp</KBD
> 
gpg: key 24E2C409: secret key imported 
gpg: Total number processed: 1 
gpg:       secret keys read: 1 
gpg:   secret keys imported: 1</PRE
></TD
></TR
></TABLE
></DIV
><DIV
CLASS="SECT1"
><HR><H2
CLASS="SECT1"
><A
NAME="AEN81"
>Using PGP 2.x keys</A
></H2
><P
>An imported public key can be used to encrypt documents to a PGP 2.x
private key holder and check signatures made using a PGP 2.x private
key. 
<SPAN
CLASS="emphasis"
><I
CLASS="EMPHASIS"
>It is important to realize that it is impossible to use a new OpenPGP
key to communicate with an PGP 2.x user, so you must import an old style
key if you want to communicate with a PGP 2.x user.</I
></SPAN
> </P
><DIV
CLASS="SECT2"
><HR><H3
CLASS="SECT2"
><A
NAME="AEN85"
>Encrypting a document to a PGP 2.x user</A
></H3
><P
>Encrypting a document uses several command-line options, and the
document to be encrypted must be specified as a file. </P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
><SPAN
CLASS="APPLICATION"
>gpg</SPAN
> --rfc1991 --cipher-algo idea --compress-algo 1 --encrypt --recipient alice secret</KBD
> 
gpg:
RSA keys are deprecated; please consider creating a new key and use this key in the future 
gpg: this cipher algorithm is depreciated; please use a more standard one!</PRE
></TD
></TR
></TABLE
><P
>Each of the command-line options are necessary.</P
><P
></P
><UL
><LI
><P
>The option <CODE
CLASS="OPTION"
>rfc1991</CODE
> is used to force
GnuPG to be more compliant with RFC 1991, which is the old PGP
specification implemented by PGP 2.x. 
If it is omitted, the output from GnuPG will be malformed and unusable 
by PGP 2.x.</P
></LI
><LI
><P
>The option <CODE
CLASS="OPTION"
>cipher-algo</CODE
> specifies the
symmetric cipher with which the document is to be encrypted. 
In the special case of encrypting to a PGP 2.x public key, the cipher specified
must be IDEA. 
If it is omitted, the document will usually be encrypted
using 3DES, an algorithm unsupported by PGP 2.x.</P
></LI
><LI
><P
>PGP 2.x's compression algorithm motivates how the rest of
the command is formed. 
The option <CODE
CLASS="OPTION"
>compress-algo</CODE
>
specifies that GnuPG must use the old zlib compression algorithm
used by PGP 2.x. 
Despite this, GnuPG uses partial length headers when
encrypting a stream of unknown size, and this is unsupported by PGP 2.x.
The document to be encrypted must therefore be in a file so that
GnuPG knows the total size of the document to be encrypted before
starting. 
So unfortunately, you cannot use pipes when using PGP 2.x keys.</P
></LI
></UL
></DIV
><DIV
CLASS="SECT2"
><HR><H3
CLASS="SECT2"
><A
NAME="AEN103"
>Signing a document for a PGP 2.x user</A
></H3
><P
>Signing a document is no different than when any other key is used.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
><SPAN
CLASS="APPLICATION"
>gpg</SPAN
> --local-user 0x24E2C409 --sign document</KBD
> 
You need a passphrase to unlock the secret key for 
user: "Alice &lt;alice@cyb.com&#62;" 
1024-bit RSA key, ID 24E2C409, created 1999-09-18 

gpg: RSA keys are deprecated; please consider creating a new key and use this 
key in the future </PRE
></TD
></TR
></TABLE
><P
>In this example, the option <CODE
CLASS="OPTION"
>local-user</CODE
> is used to
specify which private key to use for signing. 
Also, the output file is <TT
CLASS="FILENAME"
>document.gpg</TT
>. 
If the signature is to be verified
using PGP 2.x, it must be renamed to a filename with a
<TT
CLASS="FILENAME"
>.pgp</TT
> extension.</P
></DIV
><DIV
CLASS="SECT2"
><HR><H3
CLASS="SECT2"
><A
NAME="AEN114"
>Signing and encrypting a document for a PGP 2.x user</A
></H3
><P
>GnuPG does not have native support for both signing a document with
an RSA key and encrypting it to an RSA key.
GnuPG can be used in a workaround, however, that requires a few steps
to implement.
The process involves creating a detached signature and then using it
to build an encrypted file that can be decrypted and verified using
PGP 2.x.</P
><P
>There are four steps.
The first creates a detached signature</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gpg --detach-signature --recipient alice --local-user 0x24E2C409 document</KBD
> 

You need a passphrase to unlock the secret key for
user: "Alice &lt;alice@cyb.com&#62;"
1024-bit RSA key, ID 24E2C409, created 1999-09-18

gpg: RSA keys are deprecated; please consider creating a new key and use this
key in the future</PRE
></TD
></TR
></TABLE
><P
>The second step converts the document to an internal, literal format that is
unencrupted.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gpg --store -z 0 --output document.lit document</KBD
> </PRE
></TD
></TR
></TABLE
><P
>The third step combines the detached signature with the literal document.
This is what PGP 2.x uses to verify the signature after decryption.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>cat Notes.sig Notes.lit | gpg --no-options --no-literal --store --compress-algo 1 --output document.z</KBD
> 
gpg: NOTE: --no-literal is not for normal use!</PRE
></TD
></TR
></TABLE
><P
>The fourth and final step is to use GnuPG to encrypt the combined
signature and plaintext to yield an signed and encrypted document
that can be decrypted and verified using PGP 2.x.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gpg --rfc1991 --cipher-algo idea --no-literal --encrypt --recipient alice --output document.pgp document.z</KBD
> 
gpg: NOTE: --no-literal is not for normal use!
gpg: RSA keys are deprecated; please consider creating a new key and use this
key in the future
gpg: this cipher algorithm is depreciated; please use a more standard one!</PRE
></TD
></TR
></TABLE
><P
>The signed and encrypted document can also be ASCII-armored using the usual
options.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
>gpg --rfc1991 --cipher-algo idea --no-literal --encrypt --recipient alice --output document.asc --armor document.z</KBD
> 
gpg: NOTE: --no-literal is not for normal use!
gpg: RSA keys are deprecated; please consider creating a new key and use this
key in the future
gpg: this cipher algorithm is depreciated; please use a more standard one!</PRE
></TD
></TR
></TABLE
></DIV
><DIV
CLASS="SECT2"
><HR><H3
CLASS="SECT2"
><A
NAME="AEN137"
>Decrypting a PGP 2.x document</A
></H3
><P
>An imported private key may be used to decrypt documents encrypted to
the key as well as make signatures using the key. Decrypting a message
is no more difficult than when any other key is used.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
><SPAN
CLASS="APPLICATION"
>gpg</SPAN
> secret.pgp</KBD
> 

You need a passphrase to unlock the secret key for 
user: "Alice &lt;alice@cyb.org&#62;" 
1024-bit RSA key, ID 24E2C409, created 1999-09-18

gpg: NOTE: cipher algorithm 1 not found in preferences 
gpg: secret.pgp: unknown suffix 
Enter new filename [secret]: </PRE
></TD
></TR
></TABLE
><P
>Again, the file renaming dialog can be avoided by renaming the input
file with a <TT
CLASS="FILENAME"
>.gpg</TT
> extension. 
The note emitted by GnuPG regarding cipher algorithm 1 not found in
the preferences may be safely ignored if seen.</P
></DIV
><DIV
CLASS="SECT2"
><HR><H3
CLASS="SECT2"
><A
NAME="AEN146"
>Verifying a PGP 2.x signature</A
></H3
><P
>Verifying a signature made using a PGP 2.x key is straightforward.</P
><TABLE
BORDER="0"
BGCOLOR="#E0E0E0"
WIDTH="100%"
><TR
><TD
><PRE
CLASS="SCREEN"
><SAMP
CLASS="PROMPT"
>alice%</SAMP
> <KBD
CLASS="USERINPUT"
><SPAN
CLASS="APPLICATION"
>gpg</SPAN
> document.pgp</KBD
> 
gpg: document.pgp: unknown suffix
Enter new filename [document]:  
File `document' exists. Overwrite (y/N)? y 
gpg: old style (PGP 2.x) signature
gpg: Signature made Sat Sep 18 17:55:30 1999 EST using RSA key ID 24E2C409 
gpg: Good signature from "Alice &lt;alice@cyb.org&#62;"</PRE
></TD
></TR
></TABLE
><P
>The file renaming dialog can be avoided if the document being
verified is renamed with a <TT
CLASS="FILENAME"
>.gpg</TT
> extension before
invoking <SPAN
CLASS="APPLICATION"
>gpg</SPAN
>.</P
></DIV
></DIV
><DIV
CLASS="SECT1"
><HR><H2
CLASS="SECT1"
><A
NAME="CLEARTEXT"
>Working with clear-text signatures</A
></H2
><P
>As of GnuPG release 1.0, there are outstanding issues with respect
to passing clear-text signed documents between GnuPG and all versions
of PGP.
The difficulties appear to be due to implementation deviations from the
OpenPGP specification.
With respect to PGP 2.x, signatures made by PGP 2.x can be  verified using
GnuPG and signatures made with GnuPG can be verified using PGP 2.x.
The document output from the verification will in both cases differ,
however, from the original document.
These differences are limited to whitespace, so it should not affect
human readability of signed documents.
If it is important to maintain complete integrity of the document,
you should avoid clear-text signatures.</P
></DIV
></DIV
><H3
CLASS="FOOTNOTES"
>Notes</H3
><TABLE
BORDER="0"
CLASS="FOOTNOTES"
WIDTH="100%"
><TR
><TD
ALIGN="LEFT"
VALIGN="TOP"
WIDTH="5%"
><A
NAME="FTN.AEN27"
HREF="#AEN27"
><SPAN
CLASS="footnote"
>[1]</SPAN
></A
></TD
><TD
ALIGN="LEFT"
VALIGN="TOP"
WIDTH="95%"
><P
>The RSA patent expires in September 2000.
The IDEA patent expires in 2011.</P
></TD
></TR
></TABLE
></BODY
></HTML
>