OpenPGP Message Format
draft-ietf-openpgp-rfc2440bis-22

The information below is for an old version of the document that is already published as an RFC
Document Type RFC Internet-Draft (openpgp WG)
Authors Hal Finney  , Lutz Donnerhacke  , Jon Callas  , Rodney Thayer  , David Shaw 
Last updated 2020-01-21 (latest revision 2007-04-25)
Stream Internet Engineering Task Force (IETF)
Formats pdf htmlized (tools) htmlized bibtex
Reviews
Stream WG state (None)
Document shepherd No shepherd assigned
IESG IESG state RFC 4880 (Proposed Standard)
Consensus Boilerplate Unknown
Telechat date
Responsible AD Sam Hartman
Send notices to <derek@ihtfp.com>
Network Working Group                                        Jon Callas
Internet-Draft                                          PGP Corporation
Intended status: Standards Track
Expires October 2007                                   Lutz Donnerhacke
Apr 2007

Obsoletes: 1991, 2440                                        Hal Finney
                                                         PGP Corporation

                                                              David Shaw

                                                           Rodney Thayer

                          OpenPGP Message Format
                    draft-ietf-openpgp-rfc2440bis-22

Status of this Memo

    By submitting this Internet-Draft, each author represents that any
    applicable patent or other IPR claims of which he or she is aware
    have been or will be disclosed, and any of which he or she becomes
    aware will be disclosed, in accordance with Section 6 of BCP 79.

    Internet-Drafts are working documents of the Internet Engineering
    Task Force (IETF), its areas, and its working groups. Note that
    other groups may also distribute working documents as
    Internet-Drafts.

    Internet-Drafts are draft documents valid for a maximum of six
    months and may be updated, replaced, or obsoleted by other documents
    at any time. It is inappropriate to use Internet-Drafts as reference
    material or to cite them other than as "work in progress."

    The list of current Internet-Drafts can be accessed at
    http://www.ietf.org/1id-abstracts.html

    The list of Internet-Draft Shadow Directories can be accessed at
    http://www.ietf.org/shadow.html

Copyright Notice

    Copyright (C) The IETF Trust (2007).

Abstract

    This document is maintained in order to publish all necessary
    information needed to develop interoperable applications based on
    the OpenPGP format. It is not a step-by-step cookbook for writing an
    application. It describes only the format and methods needed to
    read, check, generate, and write conforming packets crossing any
    network. It does not deal with storage and implementation questions.
    It does, however, discuss implementation issues necessary to avoid
    security flaws.

Callas, et al.          Expires Oct 24, 2007                   [Page 1]

INTERNET-DRAFT          OpenPGP Message Format             Apr 24, 2007

    OpenPGP software uses a combination of strong public-key and
    symmetric cryptography to provide security services for electronic
    communications and data storage. These services include
    confidentiality, key management, authentication, and digital
    signatures. This document specifies the message formats used in
    OpenPGP.

Callas, et al.          Expires Oct 24, 2007                   [Page 2]

INTERNET-DRAFT          OpenPGP Message Format             Apr 24, 2007

Table of Contents

             Status of this Memo                                       1
             Copyright Notice                                          1
             Abstract                                                  1
             Table of Contents                                         3
    1.       Introduction                                              7
    1.1.     Terms                                                     7
    2.       General functions                                         7
    2.1.     Confidentiality via Encryption                            8
    2.2.     Authentication via Digital signature                      9
    2.3.     Compression                                               9
    2.4.     Conversion to Radix-64                                    9
    2.5.     Signature-Only Applications                              10
    3.       Data Element Formats                                     10
    3.1.     Scalar numbers                                           10
    3.2.     Multiprecision Integers                                  10
    3.3.     Key IDs                                                  11
    3.4.     Text                                                     11
    3.5.     Time fields                                              11
    3.6.     Keyrings                                                 11
    3.7.     String-to-key (S2K) specifiers                           11
    3.7.1.   String-to-key (S2K) specifier types                      11
    3.7.1.1. Simple S2K                                               12
    3.7.1.2. Salted S2K                                               12
    3.7.1.3. Iterated and Salted S2K                                  12
    3.7.2.   String-to-key usage                                      13
    3.7.2.1. Secret key encryption                                    13
    3.7.2.2. Symmetric-key message encryption                         14
    4.       Packet Syntax                                            14
    4.1.     Overview                                                 14
Show full document text