On 9/14/2025 1:25 AM, Borden via Gnupg-users wrote:
The FAQ *does* recommend a couple of good ciphers. There is a recurriing line in the FAQ,
words to the effect of "unless you know what you're doing and why, just use the
defaults."
My point exactly. So why not streamline the documentation to explaining the
defaults and offloading everything else to somewhere where keeners can go down
the rabbit hole?
I can't answer that -- "best" is inherently subjective -- but I can give brief
breakdowns on the different ciphers. And I was asked to do this often
enough that I just threw it in the FAQ.
Fair. Which is why I suggest consolidating it all into one question that goes to the
effect of "The 'best' cyphers are the ones we set to the defaults."
I think the question people mean to ask - as it's one I often have - is "What's the difference
between them?" or "What's the best for _my_ situation?"
If people are anything like me (and fortunately almost all of them aren't), I
think they come from believing that if one algorithm were universally the best,
everyone would use it. But since we have different algorithms, there surely
must be some reason why people went through all that extra effort.
Again, advising to offload discussion onto other sources, I think the best response to
that FAQ is to provide a layman's difference between them. Something to the effect of
"Algo X is faster than Y, but Y produces more compact hashes than Z, but Z has
higher resistance to side attacks than X, etc."
Wikipedia has comparison pages that, often in a tabular format, summarise the
differences in whatever - like database engines or text editors. A table like
that should shut most people up (if they bother to read it). If Wikipedia, or
somewhere else, has a page comparing cyphers, so much the better. Link to it
and save some typing.
20+ years ago, the cryptographic community had some very reliable
pages for each algorithm category called "lounges", each maintained
by an expert in the field. Pages like "the hash function lounge" by
P. Barreto (Now gone, used to be at
http://www.larc.usp.br/~pbarreto/hflounge.html )
Back then, the world was in a phase of algorithm transitions due to
the introduction of 128 bit block ciphers by the AES competition.
Nowadays, the biggest transition is the need to think about
quantum attacks on stored files, such as intercepted GPG-encrypted
mails.
Enjoy
Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users