From 3914cb9e8012b8400836a0d129a5cc6322fa1eb6 Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Thu, 25 Jun 1998 11:08:10 +0000 Subject: 0.3 ready --- README | 34 ++++++++++++++++------------------ 1 file changed, 16 insertions(+), 18 deletions(-) (limited to 'README') diff --git a/README b/README index 18f8b9ac..aeec18eb 100644 --- a/README +++ b/README @@ -1,8 +1,12 @@ GNUPG - The GNU Privacy Guard ------------------------------- + Version 0.3 - THIS IS ALPHA SOFTWARE, YOU MAY ENCOUNTER SOME BUGS. + + As you can see from the version number, the program may have some + bugs and some features may not work at all - please report this to + the mailing list. On a Linux box (version 2.x.x, alpha or x86 CPU) it should work reliably. You may create your key on such a machine and @@ -21,27 +25,22 @@ Please subscribe to g10@net.lut.ac.uk by sending a mail with the word "subscribe" in the body to "g10-request@net.lut.ac.uk". + This mailing is closed (only subscribers can post) to avoid spam. See the file COPYING for copyright and warranty information. Due to the fact that GNUPG does not use use any patented algorithm, it cannot be compatible with old PGP versions, because those use IDEA (which is patented worldwide) and RSA (which is patented in - the United States until Sep 20, 2000). I'm sorry about this, but - this is the world we have created (e.g. by using proprietary software). + the United States until Sep 20, 2000). - Because the OpenPGP standard is still a draft, GNUPG now interoperates - with it and PGP 5. The MUA Mutt will soon support GNUPG; it has a - mode to fallback to another program if the received message has been - created with RSA or IDEA. + GNUPG is in most aspects compatible with other OpenPGP implementations. - The default algorithms used by GNUPG are ElGamal for public-key - encryption and signing; Blowfish with a 128 bit key for protecting - the secret-key components, conventional and session encryption; - RIPE MD-160 to create message digest. DSA, SHA-1, CAST and TIGER are - also implemented, but not used by default. I decided not - to use DSA as the default signing algorithm, because it allows only - for 1024 bit keys and this may not be enough in a couple of years. + The default algorithms are now DSA and ELGamal. ELGamal for signing + is still available, but due to the larger size of such signatures it + is depreciated (Please note that the GNUPG implementation of ElGamal + signatures is *not* insecure). Symmetric algorithms are: Blowfish + and CAST5, Digest algorithms are MD5, RIPEMD160, SHA1 and TIGER/192. @@ -321,8 +320,6 @@ ----------- This is work in progress, so you may find duplicated code fragments, ugly data structures, weird usage of filenames and other things. - I will run "indent" over the source when making a real distribution, - but for now I stick to my own formatting rules. The primary FTP site is "ftp://ftp.guug.de/pub/gcrypt/" The primary WWW page is "http://www.d.shuttle.de/isil/crypt/gnupg.html" @@ -330,7 +327,8 @@ If you like, send your keys to ; use "gpg --export --armor | mail gnupg-keys@isil.d.shuttle.de" to do this. - Please direct bug reports to or better - post them to the mailing list . + Please direct bug reports to or better + post them to the mailing list (this is a closed list, + please subscribe before posting). -- cgit v1.2.1