<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-openpgp-crypto-refresh-07" category="std" consensus="true" submissionType="IETF" obsoletes="4880, 5581, 6637">

  <front>
    <title>OpenPGP Message Format</title>

    <author initials="P." surname="Wouters" fullname="Paul Wouters" role="editor">
      <organization>Aiven</organization>
      <address>
        <email>paul.wouters@aiven.io</email>
      </address>
    </author>
    <author initials="D." surname="Huigens" fullname="Daniel Huigens">
      <organization>Proton AG</organization>
      <address>
        <email>d.huigens@protonmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Winter" fullname="Justus Winter">
      <organization>Sequoia-PGP</organization>
      <address>
        <email>justus@sequoia-pgp.org</email>
      </address>
    </author>
    <author initials="Y." surname="Niibe" fullname="Yutaka Niibe">
      <organization>FSIJ</organization>
      <address>
        <email>gniibe@fsij.org</email>
      </address>
    </author>

    <date year="2022" month="October" day="23"/>

    <area>sec</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document specifies the message formats used in OpenPGP.
OpenPGP provides encryption with public-key or symmetric cryptographic algorithms, digital signatures, compression and key management.</t>

<t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.
It is not a step-by-step cookbook for writing an application.
It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.
It does not deal with storage and implementation questions.
It does, however, discuss implementation issues necessary to avoid security flaws.</t>

<t>This document obsoletes: RFC 4880 (OpenPGP), RFC 5581 (Camellia in OpenPGP) and RFC 6637 (Elliptic Curves in OpenPGP).</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document provides information on the message-exchange packet formats used by OpenPGP to provide encryption, decryption, signing, and key management functions.
It is a revision of RFC 4880, "OpenPGP Message Format", which is a revision of RFC 2440, which itself replaces RFC 1991, "PGP Message Exchange Formats" <xref target="RFC1991"/> <xref target="RFC2440"/> <xref target="RFC4880"/>.</t>

<t>This document obsoletes: RFC 4880 (OpenPGP), RFC 5581 (Camellia in OpenPGP) and RFC 6637 (Elliptic Curves in OpenPGP).</t>

<section anchor="terms"><name>Terms</name>

<t><list style="symbols">
  <t>OpenPGP - This is a term for security software that uses PGP 5 as a basis, formalized in this document.</t>
  <t>PGP - Pretty Good Privacy.
PGP is a family of software systems developed by Philip R. Zimmermann from which OpenPGP is based.</t>
  <t>PGP 2 - This version of PGP has many variants; where necessary a more detailed version number is used here.
PGP 2 uses only RSA, MD5, and IDEA for its cryptographic transforms.
An informational RFC, RFC 1991, was written describing this version of PGP.</t>
  <t>PGP 5 - This version of PGP is formerly known as "PGP 3" in the community.
It has new formats and corrects a number of problems in the PGP 2 design.
It is referred to here as PGP 5 because that software was the first release of the "PGP 3" code base.</t>
  <t>GnuPG - GNU Privacy Guard, also called GPG.
GnuPG is an OpenPGP implementation that avoids all encumbered algorithms.
Consequently, early versions of GnuPG did not include RSA public keys.</t>
</list></t>

<t>"PGP", "Pretty Good", and "Pretty Good Privacy" are trademarks of PGP Corporation and are used with permission.
The term "OpenPGP" refers to the protocol described in this and related documents.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL</bcp14>
NOT", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The key words "PRIVATE USE", "SPECIFICATION <bcp14>REQUIRED</bcp14>", and "RFC <bcp14>REQUIRED</bcp14>" that appear in this document when used to describe namespace allocation are to be interpreted as described in <xref target="RFC8126"/>.</t>

</section>
</section>
<section anchor="general-functions"><name>General functions</name>

<t>OpenPGP provides data integrity services for messages and data files by using these core technologies:</t>

<t><list style="symbols">
  <t>digital signatures</t>
  <t>encryption</t>
  <t>compression</t>
  <t>Radix-64 conversion</t>
</list></t>

<t>In addition, OpenPGP provides key management and certificate services, but many of these are beyond the scope of this document.</t>

<section anchor="confidentiality-via-encryption"><name>Confidentiality via Encryption</name>

<t>OpenPGP combines symmetric-key encryption and public-key encryption to provide confidentiality.
When made confidential, first the object is encrypted using a symmetric encryption algorithm.
Each symmetric key is used only once, for a single object.
A new "session key" is generated as a random number for each object (sometimes referred to as a session).
Since it is used only once, the session key is bound to the message and transmitted with it.
To protect the key, it is encrypted with the receiver's public key.
The sequence is as follows:</t>

<t><list style="numbers">
  <t>The sender creates a message.</t>
  <t>The sending OpenPGP generates a random number to be used as a session key for this message only.</t>
  <t>The session key is encrypted using each recipient's public key.
These "encrypted session keys" start the message.</t>
  <t>The sending OpenPGP encrypts the message using the session key, which forms the remainder of the message.</t>
  <t>The receiving OpenPGP decrypts the session key using the recipient's private key.</t>
  <t>The receiving OpenPGP decrypts the message using the session key.
If the message was compressed, it will be decompressed.</t>
</list></t>

<t>With symmetric-key encryption, an object may be encrypted with a symmetric key derived from a passphrase (or other shared secret), or a two-stage mechanism similar to the public-key method described above in which a session key is itself encrypted with a symmetric algorithm keyed from a shared secret.</t>

<t>Both digital signature and confidentiality services may be applied to the same message.
First, a signature is generated for the message and attached to the message.
Then the message plus signature is encrypted using a symmetric session key.
Finally, the session key is encrypted using public-key encryption and prefixed to the encrypted block.</t>

</section>
<section anchor="authentication-via-digital-signature"><name>Authentication via Digital Signature</name>

<t>The digital signature uses a hash code or message digest algorithm, and a public-key signature algorithm.
The sequence is as follows:</t>

<t><list style="numbers">
  <t>The sender creates a message.</t>
  <t>The sending software generates a hash code of the message.</t>
  <t>The sending software generates a signature from the hash code using the sender's private key.</t>
  <t>The binary signature is attached to the message.</t>
  <t>The receiving software keeps a copy of the message signature.</t>
  <t>The receiving software generates a new hash code for the received message and verifies it using the message's signature.
If the verification is successful, the message is accepted as authentic.</t>
</list></t>

</section>
<section anchor="compression"><name>Compression</name>

<t>If an implementation does not implement compression, its authors should be aware that most OpenPGP messages in the world are compressed.
Thus, it may even be wise for a space-constrained implementation to implement decompression, but not compression.</t>

</section>
<section anchor="conversion-to-radix-64"><name>Conversion to Radix-64</name>

<t>OpenPGP's underlying native representation for encrypted messages, signature certificates, and keys is a stream of arbitrary octets.
Some systems only permit the use of blocks consisting of seven-bit, printable text.
For transporting OpenPGP's native raw binary octets through channels that are not safe to raw binary data, a printable encoding of these binary octets is needed.
OpenPGP provides the service of converting the raw 8-bit binary octet stream to a stream of printable ASCII characters, called Radix-64 encoding or ASCII Armor.</t>

<t>Implementations <bcp14>SHOULD</bcp14> provide Radix-64 conversions.</t>

</section>
<section anchor="signature-only-applications"><name>Signature-Only Applications</name>

<t>OpenPGP is designed for applications that use both encryption and signatures, but there are a number of problems that are solved by a signature-only implementation.
Although this specification requires both encryption and signatures, it is reasonable for there to be subset implementations that are non-conformant only in that they omit encryption.</t>

</section>
</section>
<section anchor="data-element-formats"><name>Data Element Formats</name>

<t>This section describes the data elements used by OpenPGP.</t>

<section anchor="scalar-numbers"><name>Scalar Numbers</name>

<t>Scalar numbers are unsigned and are always stored in big-endian format.
Using n[k] to refer to the kth octet being interpreted, the value of a two-octet scalar is ((n[0] &lt;&lt; 8) + n[1]).
The value of a four-octet scalar is ((n[0] &lt;&lt; 24) + (n[1] &lt;&lt; 16) + (n[2] &lt;&lt; 8) + n[3]).</t>

</section>
<section anchor="mpi"><name>Multiprecision Integers</name>

<t>Multiprecision integers (also called MPIs) are unsigned integers used to hold large integers such as the ones used in cryptographic calculations.</t>

<t>An MPI consists of two pieces: a two-octet scalar that is the length of the MPI in bits followed by a string of octets that contain the actual integer.</t>

<t>These octets form a big-endian number; a big-endian number can be made into an MPI by prefixing it with the appropriate length.</t>

<t>Examples:</t>

<t>(all numbers are in hexadecimal)</t>

<t>The string of octets [00 00] forms an MPI with the value 0.
The string of octets [00 01 01] forms an MPI with the value 1.
The string [00 09 01 FF] forms an MPI with the value of 511.</t>

<t>Additional rules:</t>

<t>The size of an MPI is ((MPI.length + 7) / 8) + 2 octets.</t>

<t>The length field of an MPI describes the length starting from its most significant non-zero bit.
Thus, the MPI [00 02 01] is not formed correctly.
It should be [00 01 01].
When parsing an MPI in a v5 Key, Signature, or Public-Key Encrypted Session Key packet, the implementation <bcp14>MUST</bcp14> check that the encoded length matches the length starting from the most significant non-zero bit, and reject the packet as malformed if not.</t>

<t>Unused bits of an MPI <bcp14>MUST</bcp14> be zero.</t>

<t>Also note that when an MPI is encrypted, the length refers to the plaintext MPI.
It may be ill-formed in its ciphertext.</t>

<section anchor="using-mpis-to-encode-other-data"><name>Using MPIs to encode other data</name>

<t>Note that MPIs are used in some places used to encode non-integer data, such as an elliptic curve point (see <xref target="ec-point-wire-formats"/>, or an octet string of known, fixed length (see <xref target="ec-scalar-wire-formats"/>).
The wire representation is the same: two octets of length in bits counted from the first non-zero bit, followed by the smallest series of octets that can represent the value while stripping off any leading zero octets.</t>

</section>
</section>
<section anchor="key-ids"><name>Key IDs</name>

<t>A Key ID is an eight-octet scalar that identifies a key.
Implementations <bcp14>SHOULD NOT</bcp14> assume that Key IDs are unique.
<xref target="key-ids-fingerprints"/> describes how Key IDs are formed.</t>

</section>
<section anchor="text"><name>Text</name>

<t>Unless otherwise specified, the character set for text is the UTF-8 <xref target="RFC3629"/> encoding of Unicode <xref target="ISO10646"/>.</t>

</section>
<section anchor="time-fields"><name>Time Fields</name>

<t>A time field is an unsigned four-octet number containing the number of seconds elapsed since midnight, 1 January 1970 UTC.</t>

</section>
<section anchor="keyrings"><name>Keyrings</name>

<t>A keyring is a collection of one or more keys in a file or database.
Traditionally, a keyring is simply a sequential list of keys, but may be any suitable database.
It is beyond the scope of this standard to discuss the details of keyrings or other databases.</t>

</section>
<section anchor="string-to-key-s2k-specifiers"><name>String-to-Key (S2K) Specifiers</name>

<t>A string-to-key (S2K) specifier is used to convert a passphrase string into a symmetric-key encryption/decryption key.
They are used in two places, currently: to encrypt the secret part of private keys in the private keyring, and to convert passphrases to encryption keys for symmetrically encrypted messages.</t>

<section anchor="s2k-types"><name>String-to-Key (S2K) Specifier Types</name>

<t>There are four types of S2K specifiers currently supported, and some reserved values:</t>

<texttable title="S2K type registry">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>S2K Type</ttcol>
      <ttcol align='left'>Generate?</ttcol>
      <ttcol align='left'>S2K field size (octets)</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0</c>
      <c>Simple S2K</c>
      <c>N</c>
      <c>2</c>
      <c><xref target="s2k-simple"/></c>
      <c>1</c>
      <c>Salted S2K</c>
      <c>Only when string is high entropy</c>
      <c>10</c>
      <c><xref target="s2k-salted"/></c>
      <c>2</c>
      <c>Reserved value</c>
      <c>N</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>3</c>
      <c>Iterated and Salted S2K</c>
      <c>Y</c>
      <c>11</c>
      <c><xref target="s2k-iter-salted"/></c>
      <c>4</c>
      <c>Argon2</c>
      <c>Y</c>
      <c>20</c>
      <c><xref target="s2k-argon2"/></c>
      <c>100 to 110</c>
      <c>Private/Experimental S2K</c>
      <c>As appropriate</c>
      <c>&#160;</c>
      <c>&#160;</c>
</texttable>

<t>These are described in the subsections below.</t>

<section anchor="s2k-simple"><name>Simple S2K</name>

<t>This directly hashes the string to produce the key data.
See below for how this hashing is done.</t>

<figure><artwork><![CDATA[
  Octet 0:        0x00
  Octet 1:        hash algorithm
]]></artwork></figure>

<t>Simple S2K hashes the passphrase to produce the session key.
The manner in which this is done depends on the size of the session key (which will depend on the cipher used) and the size of the hash algorithm's output.
If the hash size is greater than the session key size, the high-order (leftmost) octets of the hash are used as the key.</t>

<t>If the hash size is less than the key size, multiple instances of the hash context are created --- enough to produce the required key data.
These instances are preloaded with 0, 1, 2, ...
octets of zeros (that is to say, the first instance has no preloading, the second gets preloaded with 1 octet of zero, the third is preloaded with two octets of zeros, and so forth).</t>

<t>As the data is hashed, it is given independently to each hash context.
Since the contexts have been initialized differently, they will each produce different hash output.
Once the passphrase is hashed, the output data from the multiple hashes is concatenated, first hash leftmost, to produce the key data, with any excess octets on the right discarded.</t>

</section>
<section anchor="s2k-salted"><name>Salted S2K</name>

<t>This includes a "salt" value in the S2K specifier --- some arbitrary data --- that gets hashed along with the passphrase string, to help prevent dictionary attacks.</t>

<figure><artwork><![CDATA[
  Octet 0:        0x01
  Octet 1:        hash algorithm
  Octets 2-9:     8-octet salt value
]]></artwork></figure>

<t>Salted S2K is exactly like Simple S2K, except that the input to the hash function(s) consists of the 8 octets of salt from the S2K specifier, followed by the passphrase.</t>

</section>
<section anchor="s2k-iter-salted"><name>Iterated and Salted S2K</name>

<t>This includes both a salt and an octet count.
The salt is combined with the passphrase and the resulting value is hashed repeatedly.
This further increases the amount of work an attacker must do to try dictionary attacks.</t>

<figure><artwork><![CDATA[
  Octet  0:        0x03
  Octet  1:        hash algorithm
  Octets 2-9:      8-octet salt value
  Octet  10:       count, a one-octet, coded value
]]></artwork></figure>

<t>The count is coded into a one-octet number using the following formula:</t>

<figure><artwork><![CDATA[
  #define EXPBIAS 6
      count = ((Int32)16 + (c & 15)) << ((c >> 4) + EXPBIAS);
]]></artwork></figure>

<t>The above formula is in C, where "Int32" is a type for a 32-bit integer, and the variable "c" is the coded count, Octet 10.</t>

<t>Iterated-Salted S2K hashes the passphrase and salt data multiple times.
The total number of octets to be hashed is specified in the encoded count in the S2K specifier.
Note that the resulting count value is an octet count of how many octets will be hashed, not an iteration count.</t>

<t>Initially, one or more hash contexts are set up as with the other S2K algorithms, depending on how many octets of key data are needed.
Then the salt, followed by the passphrase data, is repeatedly hashed until the number of octets specified by the octet count has been hashed.
The one exception is that if the octet count is less than the size of the salt plus passphrase, the full salt plus passphrase will be hashed even though that is greater than the octet count.
After the hashing is done, the data is unloaded from the hash context(s) as with the other S2K algorithms.</t>

</section>
<section anchor="s2k-argon2"><name>Argon2</name>

<t>This S2K method hashes the passphrase using Argon2, specified in <xref target="RFC9106"/>.
This provides memory-hardness, further protecting the passphrase against brute-force attacks.</t>

<figure><artwork><![CDATA[
  Octet  0:        0x04
  Octets 1-16:     16-octet salt value
  Octet  17:       one-octet number of passes t
  Octet  18:       one-octet degree of parallelism p
  Octet  19:       one-octet exponent indicating the memory size m
]]></artwork></figure>

<t>The salt <bcp14>SHOULD</bcp14> be unique for each password.</t>

<t>The number of passes t and the degree of parallelism p <bcp14>MUST</bcp14> be non-zero.</t>

<t>The memory size m is 2**encoded_m kibibytes of RAM, where "encoded_m" is the encoded memory size in Octet 19.
The encoded memory size <bcp14>MUST</bcp14> be a value from 3+ceil(log_2(p)) to 31, such that the decoded memory size m is a value from 8*p to 2**31.
Note that memory-hardness size is indicated in kibibytes (KiB), not octets.</t>

<t>Argon2 is invoked with the passphrase as P, the salt as S, the values of t, p and m as described above, the required key size as the tag length T, 0x13 as the version v, and Argon2id as the type.</t>

<t>For the recommended values of t, p and m, see Section 4 of <xref target="RFC9106"/>.
If the recommended value of m for a given application is not a power of 2, it is <bcp14>RECOMMENDED</bcp14> to round up to the next power of 2 if the resulting performance would be acceptable, and round down otherwise (keeping in mind that m must be at least 8*p).</t>

<t>As an example, with the first recommended option (t=1, p=4, m=2**21), the full S2K specifier would be:</t>

<figure><artwork><![CDATA[
  04 XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX
  XX 01 04 15
]]></artwork></figure>

<t>(where XX represents a random octet of salt).</t>

</section>
</section>
<section anchor="string-to-key-usage"><name>String-to-Key Usage</name>

<t>Simple S2K and Salted S2K specifiers can be brute-forced when used with a low-entropy string, such as those typically provided by users.
In addition, the usage of Simple S2K can lead to key and IV reuse (see <xref target="skesk"/>).
Therefore, when generating S2K specifiers, implementations <bcp14>MUST NOT</bcp14> use Simple S2K, and <bcp14>SHOULD NOT</bcp14> use Salted S2K unless the implementation knows that the string is high-entropy (for example, it generated the string itself using a known-good source of randomness).
It is <bcp14>RECOMMENDED</bcp14> that implementations use Argon2.</t>

<section anchor="secret-key-encryption"><name>Secret-Key Encryption</name>

<t>An S2K specifier can be stored in the secret keyring to specify how to convert the passphrase to a key that unlocks the secret data.
Older versions of PGP just stored a symmetric cipher algorithm octet preceding the secret data or a zero to indicate that the secret data was unencrypted.
The MD5 hash function was always used to convert the passphrase to a key for the specified cipher algorithm.</t>

<t>For compatibility, when an S2K specifier is used, the special value 253, 254, or 255 is stored in the position where the cipher algorithm octet would have been in the old data structure.
This is then followed immediately by a one-octet algorithm identifier, and other fields relevant to the type of encryption used.</t>

<t>Therefore, the first octet of the secret key material describes how the secret key data is presented.
The structures differ based on the version of the enclosing OpenPGP packet.
The tables below summarize the details described in <xref target="secret-key-packet-formats"/>.</t>

<t>In the tables below, <spanx style="verb">check(x)</spanx> means the "2-octet checksum" meaning the sum of all octets in x mod 65536.</t>

<texttable title="Version 4 Secret Key protection details" anchor="v4-secret-key-protection-details">
      <ttcol align='left'>First octet</ttcol>
      <ttcol align='left'>Encryption parameter fields</ttcol>
      <ttcol align='left'>Encryption</ttcol>
      <ttcol align='left'>Generate?</ttcol>
      <c>0</c>
      <c>-</c>
      <c>cleartext secrets || check(secrets)</c>
      <c>Yes</c>
      <c>Known symmetric cipher algo ID (see <xref target="symmetric-algos"/>)</c>
      <c>IV</c>
      <c>CFB(MD5(password), secrets || check(secrets))</c>
      <c>No</c>
      <c>253</c>
      <c>cipher-algo, AEAD-mode, S2K-specifier, nonce</c>
      <c>AEAD(S2K(password), secrets, pubkey)</c>
      <c>Yes</c>
      <c>254</c>
      <c>cipher-algo, S2K-specifier, IV</c>
      <c>CFB(S2K(password), secrets || SHA1(secrets))</c>
      <c>Yes</c>
      <c>255</c>
      <c>cipher-algo, S2K-specifier, IV</c>
      <c>CFB(S2K(password), secrets || check(secrets))</c>
      <c>No</c>
</texttable>

<t>Each row with "Generate?" marked as "No" is described for backward compatibility, and <bcp14>MUST NOT</bcp14> be generated.</t>

<t>A version 5 secret key that is cryptographically protected is stored with an additional pair of length counts, each of which is one octet wide:</t>

<texttable title="Version 5 Secret Key protection details" anchor="v5-secret-key-protection-details">
      <ttcol align='left'>First octet</ttcol>
      <ttcol align='left'>Encryption parameter fields</ttcol>
      <ttcol align='left'>Encryption</ttcol>
      <c>0</c>
      <c>-</c>
      <c>cleartext secrets || check(secrets)</c>
      <c>253</c>
      <c>params-length, cipher-algo, AEAD-mode, S2K-specifier-length, S2K-specifier, nonce</c>
      <c>AEAD(S2K(password), secrets, pubkey)</c>
      <c>254</c>
      <c>params-length, cipher-algo, S2K-specifier-length, S2K-specifier, IV</c>
      <c>CFB(S2K(password), secrets || SHA1(secrets))</c>
</texttable>

<t>An implementation <bcp14>MUST NOT</bcp14> create and <bcp14>MUST</bcp14> reject as malformed a secret key packet where the S2K usage octet is anything but 253 and the S2K specifier type is Argon2.</t>

</section>
<section anchor="symmetric-key-message-encryption"><name>Symmetric-Key Message Encryption</name>

<t>OpenPGP can create a Symmetric-key Encrypted Session Key (ESK) packet at the front of a message.
This is used to allow S2K specifiers to be used for the passphrase conversion or to create messages with a mix of symmetric-key ESKs and public-key ESKs.
This allows a message to be decrypted either with a passphrase or a public-key pair.</t>

<t>PGP 2 always used IDEA with Simple string-to-key conversion when encrypting a message with a symmetric algorithm.
See <xref target="sed"/>.
This <bcp14>MUST NOT</bcp14> be generated, but <bcp14>MAY</bcp14> be consumed for backward-compatibility.</t>

</section>
</section>
</section>
</section>
<section anchor="packet-syntax"><name>Packet Syntax</name>

<t>This section describes the packets used by OpenPGP.</t>

<section anchor="overview"><name>Overview</name>

<t>An OpenPGP message is constructed from a number of records that are traditionally called packets.
A packet is a chunk of data that has a tag specifying its meaning.
An OpenPGP message, keyring, certificate, and so forth consists of a number of packets.
Some of those packets may contain other OpenPGP packets (for example, a compressed data packet, when uncompressed, contains OpenPGP packets).</t>

<t>Each packet consists of a packet header, followed by the packet body.
The packet header is of variable length.</t>

<t>When handling a stream of packets, the length information in each packet header is the canonical source of packet boundaries.
An implementation handling a packet stream that wants to find the next packet <bcp14>MUST</bcp14> look for it at the precise offset indicated in the previous packet header.</t>

<t>Additionally, some packets contain internal length indicators (for example, a subfield within the packet).
In the event that a subfield length indicator within a packet implies inclusion of octets outside the range indicated in the packet header, a parser <bcp14>MUST</bcp14> truncate the subfield at the octet boundary indicated in the packet header.
Such a truncation renders the packet malformed and unusable.
An implementation <bcp14>MUST NOT</bcp14> interpret octets outside the range indicated in the packet header as part of the contents of the packet.</t>

</section>
<section anchor="packet-headers"><name>Packet Headers</name>

<t>The first octet of the packet header is called the "Packet Tag".
It determines the format of the header and denotes the packet contents.
The remainder of the packet header is the length of the packet.</t>

<t>There are two packet formats, the (current) OpenPGP packet format specified by this document and its predecessors and the Legacy packet format as used by PGP 2.x implementations.</t>

<t>Note that the most significant bit is the leftmost bit, called bit 7.
A mask for this bit is 0x80 in hexadecimal.</t>

<figure><artwork><![CDATA[
       ┌───────────────┐
  PTag │7 6 5 4 3 2 1 0│
       └───────────────┘
  Bit 7 -- Always one
  Bit 6 -- Always one (except for Legacy packet format)
]]></artwork></figure>

<t>The Legacy packet format <bcp14>MAY</bcp14> be used when consuming packets to facilitate interoperability with legacy implementations and accessing archived data.
The Legacy packet format <bcp14>SHOULD NOT</bcp14> be used to generate new data, unless the recipient is known to only support the Legacy packet format.</t>

<t>An implementation that consumes and re-distributes pre-existing OpenPGP data (such as Transferable Public Keys) may encounter packets framed with the Legacy packet format.
Such an implementation <bcp14>MAY</bcp14> either re-distribute these packets in their Legacy format, or transform them to the current OpenPGP packet format before re-distribution.</t>

<t>The current OpenPGP packet format packets contain:</t>

<figure><artwork><![CDATA[
  Bits 5 to 0 -- packet tag
]]></artwork></figure>

<t>Legacy packet format packets contain:</t>

<figure><artwork><![CDATA[
  Bits 5 to 2 -- packet tag
  Bits 1 to 0 -- length-type
]]></artwork></figure>

<section anchor="openpgp-packet-format"><name>OpenPGP Format Packet Lengths</name>

<t>OpenPGP format packets have four possible ways of encoding length:</t>

<t><list style="numbers">
  <t>A one-octet Body Length header encodes packet lengths of up to 191 octets.</t>
  <t>A two-octet Body Length header encodes packet lengths of 192 to 8383 octets.</t>
  <t>A five-octet Body Length header encodes packet lengths of up to 4,294,967,295 (0xFFFFFFFF) octets in length.
(This actually encodes a four-octet scalar number.)</t>
  <t>When the length of the packet body is not known in advance by the issuer, Partial Body Length headers encode a packet of indeterminate length, effectively making it a stream.</t>
</list></t>

<section anchor="one-octet-lengths"><name>One-Octet Lengths</name>

<t>A one-octet Body Length header encodes a length of 0 to 191 octets.
This type of length header is recognized because the one octet value is less than 192.
The body length is equal to:</t>

<figure><artwork><![CDATA[
  bodyLen = 1st_octet;
]]></artwork></figure>

</section>
<section anchor="two-octet-lengths"><name>Two-Octet Lengths</name>

<t>A two-octet Body Length header encodes a length of 192 to 8383 octets.
It is recognized because its first octet is in the range 192 to 223.
The body length is equal to:</t>

<figure><artwork><![CDATA[
  bodyLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192
]]></artwork></figure>

</section>
<section anchor="five-octet-lengths"><name>Five-Octet Lengths</name>

<t>A five-octet Body Length header consists of a single octet holding the value 255, followed by a four-octet scalar.
The body length is equal to:</t>

<figure><artwork><![CDATA[
  bodyLen = (2nd_octet << 24) | (3rd_octet << 16) |
            (4th_octet << 8)  | 5th_octet
]]></artwork></figure>

<t>This basic set of one, two, and five-octet lengths is also used internally to some packets.</t>

</section>
<section anchor="partial-body-lengths"><name>Partial Body Lengths</name>

<t>A Partial Body Length header is one octet long and encodes the length of only part of the data packet.
This length is a power of 2, from 1 to 1,073,741,824 (2 to the 30th power).
It is recognized by its one octet value that is greater than or equal to 224, and less than 255.
The Partial Body Length is equal to:</t>

<figure><artwork><![CDATA[
  partialBodyLen = 1 << (1st_octet & 0x1F);
]]></artwork></figure>

<t>Each Partial Body Length header is followed by a portion of the packet body data.
The Partial Body Length header specifies this portion's length.
Another length header (one octet, two-octet, five-octet, or partial) follows that portion.
The last length header in the packet <bcp14>MUST NOT</bcp14> be a Partial Body Length header.
Partial Body Length headers may only be used for the non-final parts of the packet.</t>

<t>Note also that the last Body Length header can be a zero-length header.</t>

<t>An implementation <bcp14>MAY</bcp14> use Partial Body Lengths for data packets, be they literal, compressed, or encrypted.
The first partial length <bcp14>MUST</bcp14> be at least 512 octets long.
Partial Body Lengths <bcp14>MUST NOT</bcp14> be used for any other packet types.</t>

</section>
</section>
<section anchor="legacy-packet-format"><name>Legacy Format Packet Lengths</name>

<t>The meaning of the length-type in Legacy format packets is:</t>

<dl>
  <dt>
0  </dt>
  <dd>
    <t>The packet has a one-octet length.
The header is 2 octets long.</t>
  </dd>
  <dt>
1  </dt>
  <dd>
    <t>The packet has a two-octet length.
The header is 3 octets long.</t>
  </dd>
  <dt>
2  </dt>
  <dd>
    <t>The packet has a four-octet length.
The header is 5 octets long.</t>
  </dd>
  <dt>
3  </dt>
  <dd>
    <t>The packet is of indeterminate length.
The header is 1 octet long, and the implementation must determine how long the packet is.
If the packet is in a file, this means that the packet extends until the end of the file.
The OpenPGP format headers have a mechanism for precisely encoding data of indeterminate length.
An implementation <bcp14>MUST NOT</bcp14> generate a Legacy format packet with indeterminate length.
An implementation <bcp14>MAY</bcp14> interpret an indeterminate length Legacy format packet in order to deal with historic data, or data generated by a legacy system.</t>
  </dd>
</dl>

</section>
<section anchor="packet-length-examples"><name>Packet Length Examples</name>

<t>These examples show ways that OpenPGP format packets might encode the packet lengths.</t>

<t>A packet with length 100 may have its length encoded in one octet: 0x64.
This is followed by 100 octets of data.</t>

<t>A packet with length 1723 may have its length encoded in two octets: 0xC5, 0xFB.
This header is followed by the 1723 octets of data.</t>

<t>A packet with length 100000 may have its length encoded in five octets: 0xFF, 0x00, 0x01, 0x86, 0xA0.</t>

<t>It might also be encoded in the following octet stream: 0xEF, first 32768 octets of data; 0xE1, next two octets of data; 0xE0, next one octet of data; 0xF0, next 65536 octets of data; 0xC5, 0xDD, last 1693 octets of data.
This is just one possible encoding, and many variations are possible on the size of the Partial Body Length headers, as long as a regular Body Length header encodes the last portion of the data.</t>

<t>Please note that in all of these explanations, the total length of the packet is the length of the header(s) plus the length of the body.</t>

</section>
</section>
<section anchor="packet-tags"><name>Packet Tags</name>

<t>The packet tag denotes what type of packet the body holds.
Note that Legacy format headers can only have tags less than 16, whereas OpenPGP format headers can have tags as great as 63.
The defined tags (in decimal) are as follows:</t>

<texttable title="Packet type registry" anchor="packet-type-registry">
      <ttcol align='right'>Tag</ttcol>
      <ttcol align='left'>Critical</ttcol>
      <ttcol align='left'>Packet Type</ttcol>
      <c>0</c>
      <c>yes</c>
      <c>Reserved - a packet tag <bcp14>MUST NOT</bcp14> have this value</c>
      <c>1</c>
      <c>yes</c>
      <c>Public-Key Encrypted Session Key Packet</c>
      <c>2</c>
      <c>yes</c>
      <c>Signature Packet</c>
      <c>3</c>
      <c>yes</c>
      <c>Symmetric-Key Encrypted Session Key Packet</c>
      <c>4</c>
      <c>yes</c>
      <c>One-Pass Signature Packet</c>
      <c>5</c>
      <c>yes</c>
      <c>Secret-Key Packet</c>
      <c>6</c>
      <c>yes</c>
      <c>Public-Key Packet</c>
      <c>7</c>
      <c>yes</c>
      <c>Secret-Subkey Packet</c>
      <c>8</c>
      <c>yes</c>
      <c>Compressed Data Packet</c>
      <c>9</c>
      <c>yes</c>
      <c>Symmetrically Encrypted Data Packet</c>
      <c>10</c>
      <c>yes</c>
      <c>Marker Packet</c>
      <c>11</c>
      <c>yes</c>
      <c>Literal Data Packet</c>
      <c>12</c>
      <c>yes</c>
      <c>Trust Packet</c>
      <c>13</c>
      <c>yes</c>
      <c>User ID Packet</c>
      <c>14</c>
      <c>yes</c>
      <c>Public-Subkey Packet</c>
      <c>17</c>
      <c>yes</c>
      <c>User Attribute Packet</c>
      <c>18</c>
      <c>yes</c>
      <c>Sym. Encrypted and Integrity Protected Data Packet</c>
      <c>19</c>
      <c>yes</c>
      <c>Reserved (formerly Modification Detection Code Packet)</c>
      <c>20</c>
      <c>yes</c>
      <c>Reserved (formerly AEAD Encrypted Data Packet)</c>
      <c>21</c>
      <c>yes</c>
      <c>Padding Packet</c>
      <c>22 to 39</c>
      <c>yes</c>
      <c>Unassigned Critical Packet</c>
      <c>40 to 59</c>
      <c>no</c>
      <c>Unassigned Non-Critical Packet</c>
      <c>60 to 63</c>
      <c>no</c>
      <c>Private or Experimental Values</c>
</texttable>

<section anchor="packet-criticality"><name>Packet Criticality</name>

<t>The Packet Tag space is partitioned into critical packets and non-critical packets.
If an implementation encounters a critical packet where the packet type is unknown in a Packet Sequence, it <bcp14>MUST</bcp14> reject the whole Packet Sequence (see <xref target="packet-composition"/>).
On the other hand, an unknown non-critical packet <bcp14>MUST</bcp14> be ignored.</t>

<t>Packet Tags from 0 to 39 are critical.
Packet Tags from 40 to 63 are non-critical.</t>

</section>
</section>
</section>
<section anchor="packet-types"><name>Packet Types</name>

<section anchor="pkesk"><name>Public-Key Encrypted Session Key Packets (Tag 1)</name>

<t>Zero or more Public-Key Encrypted Session Key (PKESK) packets and/or Symmetric-Key Encrypted Session Key packets (<xref target="skesk"/>) may precede an encryption container (that is, a Symmetrically Encrypted Integrity Protected Data packet or --- for historic data --- a Symmetrically Encrypted Data packet), which holds an encrypted message.
The message is encrypted with the session key, and the session key is itself encrypted and stored in the Encrypted Session Key packet(s).
The encryption container is preceded by one Public-Key Encrypted Session Key packet for each OpenPGP key to which the message is encrypted.
The recipient of the message finds a session key that is encrypted to their public key, decrypts the session key, and then uses the session key to decrypt the message.</t>

<t>The body of this packet starts with a one-octet number giving the version number of the packet type.
The currently defined versions are 3 and 5.
The remainder of the packet depends on the version.</t>

<t>The versions differ in how they identify the recipient key, and in what they encode.
The version of the PKESK packet must align with the version of the SEIPD packet (see <xref target="encrypted-message-versions"/>).</t>

<section anchor="v3-pkesk"><name>v3 PKESK</name>

<t>A version 3 Public-Key Encrypted Session Key (PKESK) packet precedes a version 1 Symmetrically Encrypted Integrity Protected Data (v1 SEIPD, see <xref target="version-one-seipd"/>) packet.
In historic data, it is sometimes found preceding a deprecated Symmetrically Encrypted Data packet (SED, see <xref target="sed"/>).
A v3 PKESK packet <bcp14>MUST NOT</bcp14> precede a v2 SEIPD packet (see <xref target="encrypted-message-versions"/>).</t>

<t>The v3 PKESK packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number with value 3.</t>
  <t>An eight-octet number that gives the Key ID of the public key to which the session key is encrypted.
If the session key is encrypted to a subkey, then the Key ID of this subkey is used here instead of the Key ID of the primary key.
The Key ID may also be all zeros, for an "anonymous recipient" (see <xref target="pkesk-notes"/>).</t>
  <t>A one-octet number giving the public-key algorithm used.</t>
  <t>A series of values comprising the encrypted session key.
This is algorithm-specific and described below.</t>
</list></t>

<t>When creating a v3 PKESK packet, the session key is first prefixed with a one-octet algorithm identifier that specifies the symmetric encryption algorithm used to encrypt the following encryption container.
Then a two-octet checksum is appended, which is equal to the sum of the preceding session key octets, not including the algorithm identifier, modulo 65536.</t>

<t>The resulting octet string (algorithm identifier, session key, and checksum) is encrypted according to the public-key algorithm used, as described below.</t>

</section>
<section anchor="v5-pkesk"><name>v5 PKESK</name>

<t>A version 5 Public-Key Encrypted Session Key (PKESK) packet precedes a version 2 Symmetrically Encrypted Integrity Protected Data (v2 SEIPD, see <xref target="version-two-seipd"/>) packet.
A v5 PKESK packet <bcp14>MUST NOT</bcp14> precede a v1 SEIPD packet or a deprecated Symmetrically Encrypted Data packet (see <xref target="encrypted-message-versions"/>).</t>

<t>The v5 PKESK packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number with value 5.</t>
  <t>A one octet key version number and N octets of the fingerprint of the public key or subkey to which the session key is encrypted.
Note that the length N of the fingerprint for a version 4 key is 20 octets; for a version 5 key N is 32.
The key version number may also be zero, and the fingerprint omitted (that is, the length N is zero in this case), for an "anonymous recipient" (see <xref target="pkesk-notes"/>).</t>
  <t>A one-octet number giving the public-key algorithm used.</t>
  <t>A series of values comprising the encrypted session key.
This is algorithm-specific and described below.</t>
</list></t>

<t>When creating a v5 PKESK packet, the symmetric encryption algorithm identifier is not included.
Before encrypting, a two-octet checksum is appended, which is equal to the sum of the preceding session key octets, modulo 65536.</t>

<t>The resulting octet string (session key and checksum) is encrypted according to the public-key algorithm used, as described below.</t>

</section>
<section anchor="pkesk-rsa"><name>Algorithm-Specific Fields for RSA encryption</name>

<t><list style="symbols">
  <t>Multiprecision integer (MPI) of RSA-encrypted value m**e mod n.</t>
</list></t>

<t>The value "m" in the above formula is the plaintext value described above, encoded in the PKCS#1 block encoding EME-PKCS1-v1_5 described in Section 7.2.1 of <xref target="RFC8017"/> (see also <xref target="pkcs-encoding"/>).
Note that when an implementation forms several PKESKs with one session key, forming a message that can be decrypted by several keys, the implementation <bcp14>MUST</bcp14> make a new PKCS#1 encoding for each key.</t>

</section>
<section anchor="pkesk-elgamal"><name>Algorithm-Specific Fields for Elgamal encryption</name>

<t><list style="symbols">
  <t>MPI of Elgamal (Diffie-Hellman) value g**k mod p.</t>
  <t>MPI of Elgamal (Diffie-Hellman) value m * y**k mod p.</t>
</list></t>

<t>The value "m" in the above formula is the plaintext value described above, encoded in the PKCS#1 block encoding EME-PKCS1-v1_5 described in Section 7.2.1 of <xref target="RFC8017"/> (see also <xref target="pkcs-encoding"/>).
Note that when an implementation forms several PKESKs with one session key, forming a message that can be decrypted by several keys, the implementation <bcp14>MUST</bcp14> make a new PKCS#1 encoding for each key.</t>

</section>
<section anchor="pkesk-ecdh"><name>Algorithm-Specific Fields for ECDH encryption</name>

<t><list style="symbols">
  <t>MPI of an EC point representing an ephemeral public key, in the point format associated with the curve as specified in <xref target="ec-curves"/>.</t>
  <t>A one-octet size, followed by a symmetric key encoded using the method described in <xref target="ecdh"/>.</t>
</list></t>

</section>
<section anchor="pkesk-notes"><name>Notes on PKESK</name>

<t>An implementation <bcp14>MAY</bcp14> accept or use a Key ID of all zeros, or a key version of zero and no key fingerprint, to hide the intended decryption key.
In this case, the receiving implementation would try all available private keys, checking for a valid decrypted session key.
This format helps reduce traffic analysis of messages.</t>

</section>
</section>
<section anchor="signature-packet"><name>Signature Packet (Tag 2)</name>

<t>A Signature packet describes a binding between some public key and some data.
The most common signatures are a signature of a file or a block of text, and a signature that is a certification of a User ID.</t>

<t>Three versions of Signature packets are defined.
Version 3 provides basic signature information, while versions 4 and 5 provide an expandable format with subpackets that can specify more information about the signature.</t>

<t>An implementation <bcp14>MUST</bcp14> generate a version 5 signature when signing with a version 5 key.
An implementation <bcp14>MUST</bcp14> generate a version 4 signature when signing with a version 4 key.
Implementations <bcp14>MUST NOT</bcp14> create version 3 signatures; they <bcp14>MAY</bcp14> accept version 3 signatures.</t>

<section anchor="signature-types"><name>Signature Types</name>

<t>There are a number of possible meanings for a signature, which are indicated in a signature type octet in any given signature.
Please note that the vagueness of these meanings is not a flaw, but a feature of the system.
Because OpenPGP places final authority for validity upon the receiver of a signature, it may be that one signer's casual act might be more rigorous than some other authority's positive act.
See <xref target="computing-signatures"/> for detailed information on how to compute and verify signatures of each type.</t>

<t>These meanings are as follows:</t>

<dl newline="true">
  <dt>
0x00: Signature of a binary document.  </dt>
  <dd>
    <t>This means the signer owns it, created it, or certifies that it has not been modified.</t>
  </dd>
  <dt>
0x01: Signature of a canonical text document.  </dt>
  <dd>
    <t>This means the signer owns it, created it, or certifies that it has not been modified.
The signature is calculated over the text data with its line endings converted to &lt;CR&gt;&lt;LF&gt;.</t>
  </dd>
  <dt>
0x02: Standalone signature.  </dt>
  <dd>
    <t>This signature is a signature of only its own subpacket contents.
It is calculated identically to a signature over a zero-length binary document.
V3 standalone signatures <bcp14>MUST NOT</bcp14> be generated and <bcp14>MUST</bcp14> be ignored.</t>
  </dd>
  <dt>
0x10: Generic certification of a User ID and Public-Key packet.  </dt>
  <dd>
    <t>The issuer of this certification does not make any particular assertion as to how well the certifier has checked that the owner of the key is in fact the person described by the User ID.</t>
  </dd>
  <dt>
0x11: Persona certification of a User ID and Public-Key packet.  </dt>
  <dd>
    <t>The issuer of this certification has not done any verification of the claim that the owner of this key is the User ID specified.</t>
  </dd>
  <dt>
0x12: Casual certification of a User ID and Public-Key packet.  </dt>
  <dd>
    <t>The issuer of this certification has done some casual verification of the claim of identity.</t>
  </dd>
  <dt>
0x13: Positive certification of a User ID and Public-Key packet.  </dt>
  <dd>
    <t>The issuer of this certification has done substantial verification of the claim of identity.
</t>

    <t>Most OpenPGP implementations make their "key signatures" as 0x10 certifications.
Some implementations can issue 0x11-0x13 certifications, but few differentiate between the types.</t>
  </dd>
  <dt>
0x18: Subkey Binding Signature.  </dt>
  <dd>
    <t>This signature is a statement by the top-level signing key that indicates that it owns the subkey.
This signature is calculated directly on the primary key and subkey, and not on any User ID or other packets.
A signature that binds a signing subkey <bcp14>MUST</bcp14> have an Embedded Signature subpacket in this binding signature that contains a 0x19 signature made by the signing subkey on the primary key and subkey.</t>
  </dd>
  <dt>
0x19: Primary Key Binding Signature.  </dt>
  <dd>
    <t>This signature is a statement by a signing subkey, indicating that it is owned by the primary key and subkey.
This signature is calculated the same way as a 0x18 signature: directly on the primary key and subkey, and not on any User ID or other packets.</t>
  </dd>
  <dt>
0x1F: Signature directly on a key.  </dt>
  <dd>
    <t>This signature is calculated directly on a key.
It binds the information in the Signature subpackets to the key, and is appropriate to be used for subpackets that provide information about the key, such as the Key Flags subpacket or (deprecated) Revocation Key.
It is also appropriate for statements that non-self certifiers want to make about the key itself, rather than the binding between a key and a name.</t>
  </dd>
  <dt>
0x20: Key revocation signature.  </dt>
  <dd>
    <t>The signature is calculated directly on the key being revoked.
A revoked key is not to be used.
Only revocation signatures by the key being revoked, or by a (deprecated) Revocation Key, should be considered valid revocation signatures.</t>
  </dd>
  <dt>
0x28: Subkey revocation signature.  </dt>
  <dd>
    <t>The signature is calculated directly on the subkey being revoked.
A revoked subkey is not to be used.
Only revocation signatures by the top-level signature key that is bound to this subkey, or by a (deprecated) Revocation Key, should be considered valid revocation signatures.</t>
  </dd>
  <dt>
0x30: Certification revocation signature.  </dt>
  <dd>
    <t>This signature revokes an earlier User ID certification signature (signature class 0x10 through 0x13) or direct-key signature (0x1F).
It should be issued by the same key that issued the revoked signature or by a (deprecated) Revocation Key.
The signature is computed over the same data as the certificate that it revokes, and should have a later creation date than that certificate.</t>
  </dd>
  <dt>
0x40: Timestamp signature.  </dt>
  <dd>
    <t>This signature is only meaningful for the timestamp contained in it.</t>
  </dd>
  <dt>
0x50: Third-Party Confirmation signature.  </dt>
  <dd>
    <t>This signature is a signature over some other OpenPGP Signature packet(s).
It is analogous to a notary seal on the signed data.
A third-party signature <bcp14>SHOULD</bcp14> include Signature Target subpacket(s) to give easy identification.
Note that we really do mean <bcp14>SHOULD</bcp14>.
There are plausible uses for this (such as a blind party that only sees the signature, not the key or source document) that cannot include a target subpacket.</t>
  </dd>
</dl>

</section>
<section anchor="version-three-sig"><name>Version 3 Signature Packet Format</name>

<t>The body of a version 3 Signature Packet contains:</t>

<t><list style="symbols">
  <t>One-octet version number (3).</t>
  <t>One-octet length of following hashed material.
<bcp14>MUST</bcp14> be 5.  <list style="symbols">
      <t>One-octet signature type.</t>
      <t>Four-octet creation time.</t>
    </list></t>
  <t>Eight-octet Key ID of signer.</t>
  <t>One-octet public-key algorithm.</t>
  <t>One-octet hash algorithm.</t>
  <t>Two-octet field holding left 16 bits of signed hash value.</t>
  <t>One or more multiprecision integers comprising the signature.
This portion is algorithm-specific, as described below.</t>
</list></t>

<t>The concatenation of the data to be signed, the signature type, and creation time from the Signature packet (5 additional octets) is hashed.
The resulting hash value is used in the signature algorithm.
The high 16 bits (first two octets) of the hash are included in the Signature packet to provide a way to reject some invalid signatures without performing a signature verification.</t>

<t>Algorithm-Specific Fields for RSA signatures:</t>

<t><list style="symbols">
  <t>Multiprecision integer (MPI) of RSA signature value m**d mod n.</t>
</list></t>

<t>Algorithm-Specific Fields for DSA signatures:</t>

<t><list style="symbols">
  <t>MPI of DSA value r.</t>
  <t>MPI of DSA value s.</t>
</list></t>

<t>The signature calculation is based on a hash of the signed data, as described above.
The details of the calculation are different for DSA signatures than for RSA signatures.</t>

<t>With RSA signatures, the hash value is encoded using PKCS#1 encoding type EMSA-PKCS1-v1_5 as described in Section 9.2 of <xref target="RFC8017"/>.
This requires inserting the hash value as an octet string into an ASN.1 structure.
The object identifier for the type of hash being used is included in the structure.
The hexadecimal representations for the currently defined hash algorithms are as follows:</t>

<texttable title="Hash hexadecimal representations">
      <ttcol align='left'>algorithm</ttcol>
      <ttcol align='left'>hexadecimal representation</ttcol>
      <c>MD5</c>
      <c>0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05</c>
      <c>RIPEMD-160</c>
      <c>0x2B, 0x24, 0x03, 0x02, 0x01</c>
      <c>SHA-1</c>
      <c>0x2B, 0x0E, 0x03, 0x02, 0x1A</c>
      <c>SHA224</c>
      <c>0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04</c>
      <c>SHA256</c>
      <c>0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01</c>
      <c>SHA384</c>
      <c>0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02</c>
      <c>SHA512</c>
      <c>0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03</c>
</texttable>

<t>The ASN.1 Object Identifiers (OIDs) are as follows:</t>

<texttable title="Hash OIDs">
      <ttcol align='left'>algorithm</ttcol>
      <ttcol align='left'>OID</ttcol>
      <c>MD5</c>
      <c>1.2.840.113549.2.5</c>
      <c>RIPEMD-160</c>
      <c>1.3.36.3.2.1</c>
      <c>SHA-1</c>
      <c>1.3.14.3.2.26</c>
      <c>SHA224</c>
      <c>2.16.840.1.101.3.4.2.4</c>
      <c>SHA256</c>
      <c>2.16.840.1.101.3.4.2.1</c>
      <c>SHA384</c>
      <c>2.16.840.1.101.3.4.2.2</c>
      <c>SHA512</c>
      <c>2.16.840.1.101.3.4.2.3</c>
</texttable>

<t>The full hash prefixes for these are as follows:</t>

<texttable title="Hash hexadecimal prefixes">
      <ttcol align='left'>algorithm</ttcol>
      <ttcol align='left'>full hash prefix</ttcol>
      <c>MD5</c>
      <c>0x30, 0x20, 0x30, 0x0C, 0x06, 0x08, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, 0x05, 0x00, 0x04, 0x10</c>
      <c>RIPEMD-160</c>
      <c>0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x24, 0x03, 0x02, 0x01, 0x05, 0x00, 0x04, 0x14</c>
      <c>SHA-1</c>
      <c>0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14</c>
      <c>SHA224</c>
      <c>0x30, 0x2D, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C</c>
      <c>SHA256</c>
      <c>0x30, 0x31, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20</c>
      <c>SHA384</c>
      <c>0x30, 0x41, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30</c>
      <c>SHA512</c>
      <c>0x30, 0x51, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40</c>
</texttable>

<t>DSA signatures <bcp14>MUST</bcp14> use hashes that are equal in size to the number of bits of q, the group generated by the DSA key's generator value.</t>

<t>If the output size of the chosen hash is larger than the number of bits of q, the hash result is truncated to fit by taking the number of leftmost bits equal to the number of bits of q.
This (possibly truncated) hash function result is treated as a number and used directly in the DSA signature algorithm.</t>

</section>
<section anchor="version-4-and-5-signature-packet-formats"><name>Version 4 and 5 Signature Packet Formats</name>

<t>The body of a v4 or v5 Signature packet contains:</t>

<t><list style="symbols">
  <t>One-octet version number.
This is 4 for v4 signatures and 5 for v5 signatures.</t>
  <t>One-octet signature type.</t>
  <t>One-octet public-key algorithm.</t>
  <t>One-octet hash algorithm.</t>
  <t>A scalar octet count for following hashed subpacket data.
For a v4 signature, this is a two-octet field.
For a v5 signature, this is a four-octet field.
Note that this is the length in octets of all of the hashed subpackets; a pointer incremented by this number will skip over the hashed subpackets.</t>
  <t>Hashed subpacket data set (zero or more subpackets).</t>
  <t>A scalar octet count for the following unhashed subpacket data.
For a v4 signature, this is a two-octet field.
For a v5 signature, this is a four-octet field.
Note that this is the length in octets of all of the unhashed subpackets; a pointer incremented by this number will skip over the unhashed subpackets.</t>
  <t>Unhashed subpacket data set (zero or more subpackets).</t>
  <t>Two-octet field holding the left 16 bits of the signed hash value.</t>
  <t>Only for v5 signatures, a 16 octet field containing random values used as salt.</t>
  <t>One or more multiprecision integers comprising the signature.
This portion is algorithm-specific:</t>
</list></t>

<section anchor="sig-rsa"><name>Algorithm-Specific Fields for RSA signatures</name>

<t><list style="symbols">
  <t>Multiprecision integer (MPI) of RSA signature value m**d mod n.</t>
</list></t>

</section>
<section anchor="sig-dsa"><name>Algorithm-Specific Fields for DSA or ECDSA signatures</name>

<t><list style="symbols">
  <t>MPI of DSA or ECDSA value r.</t>
  <t>MPI of DSA or ECDSA value s.</t>
</list></t>

<t>A version 3 signature <bcp14>MUST NOT</bcp14> be created and <bcp14>MUST NOT</bcp14> be used with ECDSA.</t>

</section>
<section anchor="sig-eddsa"><name>Algorithm-Specific Fields for EdDSA signatures</name>

<t><list style="symbols">
  <t>Two MPI-encoded values, whose contents and formatting depend on the choice of curve used (see <xref target="curve-specific-formats"/>).</t>
</list></t>

<t>A version 3 signature <bcp14>MUST NOT</bcp14> be created and <bcp14>MUST NOT</bcp14> be used with EdDSA.</t>

<section anchor="algorithm-specific-fields-for-ed25519-signatures"><name>Algorithm-Specific Fields for Ed25519 signatures</name>

<t>The two MPIs for Ed25519 use octet strings R and S as described in <xref target="RFC8032"/>.</t>

<t><list style="symbols">
  <t>MPI of an EC point R, represented as a (non-prefixed) native (little-endian) octet string up to 32 octets.</t>
  <t>MPI of EdDSA value S, also in (non-prefixed) native little-endian format with a length up to 32 octets.</t>
</list></t>

</section>
<section anchor="algorithm-specific-fields-for-ed448-signatures"><name>Algorithm-Specific Fields for Ed448 signatures</name>

<t>For Ed448 signatures, the native signature format is used as described in <xref target="RFC8032"/>.
The two MPIs are composed as follows:</t>

<t><list style="symbols">
  <t>The first MPI has a body of 115 octets: a prefix 0x40 octet, followed by 114 octets of the native signature.</t>
  <t>The second MPI is set to 0 (this is a placeholder, and is unused).
Note that an MPI with a value of 0 is encoded on the wire as a pair of zero octets: <spanx style="verb">00 00</spanx>.</t>
</list></t>

</section>
</section>
<section anchor="notes-on-signatures"><name>Notes on Signatures</name>

<t>The concatenation of the data being signed and the signature data from the version number through the hashed subpacket data (inclusive) is hashed.
The resulting hash value is what is signed.
The high 16 bits (first two octets) of the hash are included in the Signature packet to provide a way to reject some invalid signatures without performing a signature verification.</t>

<t>There are two fields consisting of Signature subpackets.
The first field is hashed with the rest of the signature data, while the second is unhashed.
The second set of subpackets is not cryptographically protected by the signature and should include only advisory information.</t>

<t>The differences between a v4 and v5 signature are two-fold: first, a v5 signature increases the width of the size indicators for the signed data, making it more capable when signing large keys or messages.
Second, the hash is salted with 128 bit of random data (see <xref target="signature-salt-rationale"/>.</t>

<t>The algorithms for converting the hash function result to a signature are described in <xref target="computing-signatures"/>.</t>

</section>
<section anchor="signature-subpacket"><name>Signature Subpacket Specification</name>

<t>A subpacket data set consists of zero or more Signature subpackets.
In Signature packets, the subpacket data set is preceded by a two-octet (for v4 signatures) or four-octet (for v5 signatures) scalar count of the length in octets of all the subpackets.
A pointer incremented by this number will skip over the subpacket data set.</t>

<t>Each subpacket consists of a subpacket header and a body.
The header consists of:</t>

<t><list style="symbols">
  <t>the subpacket length (1, 2, or 5 octets),</t>
  <t>the subpacket type (1 octet),</t>
</list></t>

<t>and is followed by the subpacket-specific data.</t>

<t>The length includes the type octet but not this length.
Its format is similar to the "new" format packet header lengths, but cannot have Partial Body Lengths.
That is:</t>

<figure><artwork><![CDATA[
if the 1st octet <  192, then
    lengthOfLength = 1
    subpacketLen = 1st_octet

if the 1st octet >= 192 and < 255, then
    lengthOfLength = 2
    subpacketLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192

if the 1st octet = 255, then
    lengthOfLength = 5
    subpacket length = [four-octet scalar starting at 2nd_octet]
]]></artwork></figure>

<t>The value of the subpacket type octet may be:</t>

<texttable title="Subpacket type registry">
      <ttcol align='right'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>0</c>
      <c>Reserved</c>
      <c>1</c>
      <c>Reserved</c>
      <c>2</c>
      <c>Signature Creation Time</c>
      <c>3</c>
      <c>Signature Expiration Time</c>
      <c>4</c>
      <c>Exportable Certification</c>
      <c>5</c>
      <c>Trust Signature</c>
      <c>6</c>
      <c>Regular Expression</c>
      <c>7</c>
      <c>Revocable</c>
      <c>8</c>
      <c>Reserved</c>
      <c>9</c>
      <c>Key Expiration Time</c>
      <c>10</c>
      <c>Placeholder for backward compatibility</c>
      <c>11</c>
      <c>Preferred Symmetric Ciphers for v1 SEIPD</c>
      <c>12</c>
      <c>Revocation Key (deprecated)</c>
      <c>13 to 15</c>
      <c>Reserved</c>
      <c>16</c>
      <c>Issuer Key ID</c>
      <c>17 to 19</c>
      <c>Reserved</c>
      <c>20</c>
      <c>Notation Data</c>
      <c>21</c>
      <c>Preferred Hash Algorithms</c>
      <c>22</c>
      <c>Preferred Compression Algorithms</c>
      <c>23</c>
      <c>Key Server Preferences</c>
      <c>24</c>
      <c>Preferred Key Server</c>
      <c>25</c>
      <c>Primary User ID</c>
      <c>26</c>
      <c>Policy URI</c>
      <c>27</c>
      <c>Key Flags</c>
      <c>28</c>
      <c>Signer's User ID</c>
      <c>29</c>
      <c>Reason for Revocation</c>
      <c>30</c>
      <c>Features</c>
      <c>31</c>
      <c>Signature Target</c>
      <c>32</c>
      <c>Embedded Signature</c>
      <c>33</c>
      <c>Issuer Fingerprint</c>
      <c>34</c>
      <c>Reserved</c>
      <c>35</c>
      <c>Intended Recipient Fingerprint</c>
      <c>37</c>
      <c>Reserved (Attested Certifications)</c>
      <c>38</c>
      <c>Reserved (Key Block)</c>
      <c>39</c>
      <c>Preferred AEAD Ciphersuites</c>
      <c>100 to 110</c>
      <c>Private or experimental</c>
</texttable>

<t>An implementation <bcp14>SHOULD</bcp14> ignore any subpacket of a type that it does not recognize.</t>

<t>Bit 7 of the subpacket type is the "critical" bit.
If set, it denotes that the subpacket is one that is critical for the evaluator of the signature to recognize.
If a subpacket is encountered that is marked critical but is unknown to the evaluating software, the evaluator <bcp14>SHOULD</bcp14> consider the signature to be in error.</t>

<t>An evaluator may "recognize" a subpacket, but not implement it.
The purpose of the critical bit is to allow the signer to tell an evaluator that it would prefer a new, unknown feature to generate an error than be ignored.</t>

<t>Implementations <bcp14>SHOULD</bcp14> implement the four preferred algorithm subpackets (11, 21, 22, and 34), as well as the "Reason for Revocation" subpacket.
Note, however, that if an implementation chooses not to implement some of the preferences, it is required to behave in a polite manner to respect the wishes of those users who do implement these preferences.</t>

</section>
<section anchor="signature-subpacket-types"><name>Signature Subpacket Types</name>

<t>A number of subpackets are currently defined.
Some subpackets apply to the signature itself and some are attributes of the key.
Subpackets that are found on a self-signature are placed on a certification made by the key itself.
Note that a key may have more than one User ID, and thus may have more than one self-signature, and differing subpackets.</t>

<t>A subpacket may be found either in the hashed or unhashed subpacket sections of a signature.
If a subpacket is not hashed, then the information in it cannot be considered definitive because it is not part of the signature proper.</t>

</section>
<section anchor="self-sigs"><name>Notes on Self-Signatures</name>

<t>A self-signature is a binding signature made by the key to which the signature refers.
There are three types of self-signatures, the certification signatures (types 0x10-0x13), the direct-key signature (type 0x1F), and the subkey binding signature (type 0x18).
A cryptographically-valid self-signature should be accepted from any primary key, regardless of what Key Flags (<xref target="key-flags"/>) apply to the primary key.
In particular, a primary key does not need to have 0x01 set in the first octet of Key Flags order to make a valid self-signature.</t>

<t>For certification self-signatures, each User ID may have a self-signature, and thus different subpackets in those self-signatures.
For subkey binding signatures, each subkey in fact has a self-signature.
Subpackets that appear in a certification self-signature apply to the user name, and subpackets that appear in the subkey self-signature apply to the subkey.
Lastly, subpackets on the direct-key signature apply to the entire key.</t>

<t>Implementing software should interpret a self-signature's preference subpackets as narrowly as possible.
For example, suppose a key has two user names, Alice and Bob.
Suppose that Alice prefers the AEAD ciphersuite AES-256 with OCB, and Bob prefers Camellia-256 with GCM.
If the software locates this key via Alice's name, then the preferred AEAD ciphersuite is AES-256 with OCB; if software locates the key via Bob's name, then the preferred algorithm is Camellia-256 with GCM.
If the key is located by Key ID, the algorithm of the primary User ID of the key provides the preferred AEAD ciphersuite.</t>

<t>Revoking a self-signature or allowing it to expire has a semantic meaning that varies with the signature type.
Revoking the self-signature on a User ID effectively retires that user name.
The self-signature is a statement, "My name X is tied to my signing key K" and is corroborated by other users' certifications.
If another user revokes their certification, they are effectively saying that they no longer believe that name and that key are tied together.
Similarly, if the users themselves revoke their self-signature, then the users no longer go by that name, no longer have that email address, etc.
Revoking a binding signature effectively retires that subkey.
Revoking a direct-key signature cancels that signature.
Please see <xref target="reason-for-revocation"/> for more relevant detail.</t>

<t>Since a self-signature contains important information about the key's use, an implementation <bcp14>SHOULD</bcp14> allow the user to rewrite the self-signature, and important information in it, such as preferences and key expiration.</t>

<t>It is good practice to verify that a self-signature imported into an implementation doesn't advertise features that the implementation doesn't support, rewriting the signature as appropriate.</t>

<t>An implementation that encounters multiple self-signatures on the same object <bcp14>MUST</bcp14> select the most recent valid self-signature, and ignore all other self-signatures.</t>

<t>By convention, a version 4 key stores information about the primary Public-Key (key flags, key expiration, etc.) and the Transferable Public Key as a whole (features, algorithm preferences, etc.) in a User ID self-signature of type 0x10 or 0x13.
Some implementations require at least one User ID with a valid self-signature to be present to use a v4 key.
For this reason, it is <bcp14>RECOMMENDED</bcp14> to include at least one User ID with a self-signature in v4 keys.</t>

<t>For version 5 keys, it is <bcp14>RECOMMENDED</bcp14> to store information about the primary Public-Key as well as the Transferable Public Key as a whole (key flags, key expiration, features, algorithm preferences, etc.) in a direct-key signature (type 0x1F) over the Public-Key instead of placing that information in a User ID self-signature.
An implementation <bcp14>MUST</bcp14> ensure that a valid direct-key signature is present before using a v5 key.
This prevents certain attacks where an adversary strips a self-signature specifying a key expiration time or certain preferences.</t>

<t>An implementation <bcp14>SHOULD NOT</bcp14> require a User ID self-signature to be present in order to consume or use a key, unless the particular use is contingent on the keyholder identifying themselves with the textual label in the User ID.
For example, when refreshing a key to learn about changes in expiration, advertised features, algorithm preferences, revocation, subkey rotation, and so forth, there is no need to require a User ID self-signature.
On the other hand, when verifying a signature over an e-mail message, an implementation <bcp14>MAY</bcp14> choose to only accept a signature from a key that has a valid self-signature over a User ID that matches the message's From: header, as a way to avoid a signature transplant attack.</t>

</section>
<section anchor="signature-creation-time"><name>Signature Creation Time</name>

<t>(4-octet time field)</t>

<t>The time the signature was made.</t>

<t><bcp14>MUST</bcp14> be present in the hashed area.</t>

</section>
<section anchor="issuer-keyid-subpacket"><name>Issuer Key ID</name>

<t>(8-octet Key ID)</t>

<t>The OpenPGP Key ID of the key issuing the signature.
If the version of that key is greater than 4, this subpacket <bcp14>MUST NOT</bcp14> be included in the signature.
For these keys, consider the Issuer Fingerprint subpacket (<xref target="issuer-fingerprint-subpacket"/>) instead.</t>

<t>Note: in previous versions of this specification, this subpacket was simply known as the "Issuer" subpacket.</t>

</section>
<section anchor="key-expiration-time"><name>Key Expiration Time</name>

<t>(4-octet time field)</t>

<t>The validity period of the key.
This is the number of seconds after the key creation time that the key expires.
For a direct or certification self-signature, the key creation time is that of the primary key.
For a subkey binding signature, the key creation time is that of the subkey.
If this is not present or has a value of zero, the key never expires.
This is found only on a self-signature.</t>

</section>
<section anchor="preferred-v1-seipd"><name>Preferred Symmetric Ciphers for v1 SEIPD</name>

<t>(array of one-octet values)</t>

<t>A series of symmetric cipher algorithm identifiers indicating how the keyholder prefers to receive version 1 Symmetrically Encrypted Integrity Protected Data (<xref target="version-one-seipd"/>).
The subpacket body is an ordered list of octets with the most preferred listed first.
It is assumed that only algorithms listed are supported by the recipient's software.
Algorithm numbers are in <xref target="symmetric-algos"/>.
This is only found on a self-signature.</t>

<t>When generating a v2 SEIPD packet, this preference list is not relevant.
See <xref target="preferred-v2-seipd"/> instead.</t>

</section>
<section anchor="preferred-v2-seipd"><name>Preferred AEAD Ciphersuites</name>

<t>(array of pairs of octets indicating Symmetric Cipher and AEAD algorithms)</t>

<t>A series of paired algorithm identifiers indicating how the keyholder prefers to receive version 2 Symmetrically Encrypted Integrity Protected Data (<xref target="version-two-seipd"/>).
Each pair of octets indicates a combination of a symmetric cipher and an AEAD mode that the key holder prefers to use.
The symmetric cipher identifier precedes the AEAD identifier in each pair.
The subpacket body is an ordered list of pairs of octets with the most preferred algorithm combination listed first.</t>

<t>It is assumed that only the combinations of algorithms listed are supported by the recipient's software, with the exception of the mandatory-to-implement combination of AES-128 and OCB.
If AES-128 and OCB are not found in the subpacket, it is implicitly listed at the end.</t>

<t>AEAD algorithm numbers are listed in <xref target="aead-algorithms"/>.
Symmetric cipher algorithm numbers are listed in <xref target="symmetric-algos"/>.</t>

<t>For example, a subpacket with content of these six octets:</t>

<figure><artwork><![CDATA[
09 02 09 03 13 02
]]></artwork></figure>

<t>Indicates that the keyholder prefers to receive v2 SEIPD using AES-256 with OCB, then AES-256 with GCM, then Camellia-256 with OCB, and finally the implicit AES-128 with OCB.</t>

<t>Note that support for version 2 of the Symmetrically Encrypted Integrity Protected Data packet (<xref target="version-two-seipd"/>) in general is indicated by a Feature Flag (<xref target="features-subpacket"/>).</t>

<t>This subpacket is only found on a self-signature.</t>

<t>When generating a v1 SEIPD packet, this preference list is not relevant.
See <xref target="preferred-v1-seipd"/> instead.</t>

</section>
<section anchor="preferred-hash-algorithms"><name>Preferred Hash Algorithms</name>

<t>(array of one-octet values)</t>

<t>Message digest algorithm numbers that indicate which algorithms the key holder prefers to receive.
Like the preferred AEAD ciphersuites, the list is ordered.
Algorithm numbers are in <xref target="hash-algos"/>.
This is only found on a self-signature.</t>

</section>
<section anchor="preferred-compression-algorithms"><name>Preferred Compression Algorithms</name>

<t>(array of one-octet values)</t>

<t>Compression algorithm numbers that indicate which algorithms the key holder prefers to use.
Like the preferred AEAD ciphersuites, the list is ordered.
Algorithm numbers are in <xref target="compression-algos"/>.
A zero, or the absence of this subpacket, denotes that uncompressed data is preferred; the key holder's software might have no compression software in that implementation.
This is only found on a self-signature.</t>

</section>
<section anchor="signature-expiration-time"><name>Signature Expiration Time</name>

<t>(4-octet time field)</t>

<t>The validity period of the signature.
This is the number of seconds after the signature creation time that the signature expires.
If this is not present or has a value of zero, it never expires.</t>

</section>
<section anchor="exportable-certification"><name>Exportable Certification</name>

<t>(1 octet of exportability, 0 for not, 1 for exportable)</t>

<t>This subpacket denotes whether a certification signature is "exportable", to be used by other users than the signature's issuer.
The packet body contains a Boolean flag indicating whether the signature is exportable.
If this packet is not present, the certification is exportable; it is equivalent to a flag containing a 1.</t>

<t>Non-exportable, or "local", certifications are signatures made by a user to mark a key as valid within that user's implementation only.</t>

<t>Thus, when an implementation prepares a user's copy of a key for transport to another user (this is the process of "exporting" the key), any local certification signatures are deleted from the key.</t>

<t>The receiver of a transported key "imports" it, and likewise trims any local certifications.
In normal operation, there won't be any, assuming the import is performed on an exported key.
However, there are instances where this can reasonably happen.
For example, if an implementation allows keys to be imported from a key database in addition to an exported key, then this situation can arise.</t>

<t>Some implementations do not represent the interest of a single user (for example, a key server).
Such implementations always trim local certifications from any key they handle.</t>

</section>
<section anchor="revocable"><name>Revocable</name>

<t>(1 octet of revocability, 0 for not, 1 for revocable)</t>

<t>Signature's revocability status.
The packet body contains a Boolean flag indicating whether the signature is revocable.
Signatures that are not revocable have any later revocation signatures ignored.
They represent a commitment by the signer that he cannot revoke his signature for the life of his key.
If this packet is not present, the signature is revocable.</t>

</section>
<section anchor="trust-signature"><name>Trust Signature</name>

<t>(1 octet "level" (depth), 1 octet of trust amount)</t>

<t>Signer asserts that the key is not only valid but also trustworthy at the specified level.
Level 0 has the same meaning as an ordinary validity signature.
Level 1 means that the signed key is asserted to be a valid trusted introducer, with the 2nd octet of the body specifying the degree of trust.
Level 2 means that the signed key is asserted to be trusted to issue level 1 trust signatures; that is, the signed key is a "meta introducer".
Generally, a level n trust signature asserts that a key is trusted to issue level n-1 trust signatures.
The trust amount is in a range from 0-255, interpreted such that values less than 120 indicate partial trust and values of 120 or greater indicate complete trust.
Implementations <bcp14>SHOULD</bcp14> emit values of 60 for partial trust and 120 for complete trust.</t>

</section>
<section anchor="regular-expression"><name>Regular Expression</name>

<t>(null-terminated regular expression)</t>

<t>Used in conjunction with trust Signature packets (of level &gt; 0) to limit the scope of trust that is extended.
Only signatures by the target key on User IDs that match the regular expression in the body of this packet have trust extended by the trust Signature subpacket.
The regular expression uses the same syntax as the Henry Spencer's "almost public domain" regular expression <xref target="REGEX"/> package.
A description of the syntax is found in <xref target="regular-expressions"/>.</t>

</section>
<section anchor="revocation-key"><name>Revocation Key</name>

<t>(1 octet of class, 1 octet of public-key algorithm ID, 20 octets of v4 fingerprint)</t>

<t>This mechanism is deprecated.
Applications <bcp14>MUST NOT</bcp14> generate such a subpacket.</t>

<t>An application that wants the functionality of delegating revocation <bcp14>SHOULD</bcp14> instead use an escrowed Revocation Signature.
See <xref target="escrowed-revocations"/> for more details.</t>

<t>The remainder of this section describes how some implementations attempt to interpret this deprecated subpacket.</t>

<t>This packet was intended to authorize the specified key to issue revocation signatures for this key.
Class octet must have bit 0x80 set.
If the bit 0x40 is set, then this means that the revocation information is sensitive.
Other bits are for future expansion to other kinds of authorizations.
This is only found on a direct-key self-signature (type 0x1f).
The use on other types of self-signatures is unspecified.</t>

<t>If the "sensitive" flag is set, the keyholder feels this subpacket contains private trust information that describes a real-world sensitive relationship.
If this flag is set, implementations <bcp14>SHOULD NOT</bcp14> export this signature to other users except in cases where the data needs to be available: when the signature is being sent to the designated revoker, or when it is accompanied by a revocation signature from that revoker.
Note that it may be appropriate to isolate this subpacket within a separate signature so that it is not combined with other subpackets that need to be exported.</t>

</section>
<section anchor="notation-data"><name>Notation Data</name>

<t>(4 octets of flags, 2 octets of name length (M), 2 octets of value length (N), M octets of name data, N octets of value data)</t>

<t>This subpacket describes a "notation" on the signature that the issuer wishes to make.
The notation has a name and a value, each of which are strings of octets.
There may be more than one notation in a signature.
Notations can be used for any extension the issuer of the signature cares to make.
The "flags" field holds four octets of flags.</t>

<t>All undefined flags <bcp14>MUST</bcp14> be zero.
Defined flags are as follows:</t>

<texttable title="Signature Notation Data Subpacket Notation Flag registry">
      <ttcol align='left'>Flag</ttcol>
      <ttcol align='left'>Shorthand</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Security Recommended</ttcol>
      <ttcol align='left'>Interoperability Recommended</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0x80 0x00 0x00 0x00</c>
      <c>human-readable</c>
      <c>Notation value is text.</c>
      <c>No</c>
      <c>Yes</c>
      <c>This document</c>
</texttable>

<t>Notation names are arbitrary strings encoded in UTF-8.
They reside in two namespaces: The IETF namespace and the user namespace.</t>

<t>The IETF namespace is registered with IANA.
These names <bcp14>MUST NOT</bcp14> contain the "@" character (0x40).
This is a tag for the user namespace.</t>

<texttable title="Signature Notation Data Subpacket registry">
      <ttcol align='left'>Notation Name</ttcol>
      <ttcol align='left'>Data Type</ttcol>
      <ttcol align='left'>Allowed Values</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
</texttable>

<t>Names in the user namespace consist of a UTF-8 string tag followed by "@" followed by a DNS domain name.
Note that the tag <bcp14>MUST NOT</bcp14> contain an "@" character.
For example, the "sample" tag used by Example Corporation could be "sample@example.com".</t>

<t>Names in a user space are owned and controlled by the owners of that domain.
Obviously, it's bad form to create a new name in a DNS space that you don't own.</t>

<t>Since the user namespace is in the form of an email address, implementers <bcp14>MAY</bcp14> wish to arrange for that address to reach a person who can be consulted about the use of the named tag.
Note that due to UTF-8 encoding, not all valid user space name tags are valid email addresses.</t>

<t>If there is a critical notation, the criticality applies to that specific notation and not to notations in general.</t>

</section>
<section anchor="key-server-preferences"><name>Key Server Preferences</name>

<t>(N octets of flags)</t>

<t>This is a list of one-bit flags that indicate preferences that the key holder has about how the key is handled on a key server.
All undefined flags <bcp14>MUST</bcp14> be zero.</t>

<t>First octet:</t>

<texttable title="Key server preferences flag registry (first octet)">
      <ttcol align='left'>flag</ttcol>
      <ttcol align='left'>shorthand</ttcol>
      <ttcol align='left'>definition</ttcol>
      <c>0x80</c>
      <c>No-modify</c>
      <c>The key holder requests that this key only be modified or updated by the key holder or an administrator of the key server.</c>
</texttable>

<t>This is found only on a self-signature.</t>

</section>
<section anchor="preferred-key-server"><name>Preferred Key Server</name>

<t>(String)</t>

<t>This is a URI of a key server that the key holder prefers be used for updates.
Note that keys with multiple User IDs can have a preferred key server for each User ID.
Note also that since this is a URI, the key server can actually be a copy of the key retrieved by ftp, http, finger, etc.</t>

</section>
<section anchor="primary-user-id"><name>Primary User ID</name>

<t>(1 octet, Boolean)</t>

<t>This is a flag in a User ID's self-signature that states whether this User ID is the main User ID for this key.
It is reasonable for an implementation to resolve ambiguities in preferences, etc.
by referring to the primary User ID.
If this flag is absent, its value is zero.
If more than one User ID in a key is marked as primary, the implementation may resolve the ambiguity in any way it sees fit, but it is <bcp14>RECOMMENDED</bcp14> that priority be given to the User ID with the most recent self-signature.</t>

<t>When appearing on a self-signature on a User ID packet, this subpacket applies only to User ID packets.
When appearing on a self-signature on a User Attribute packet, this subpacket applies only to User Attribute packets.
That is to say, there are two different and independent "primaries" --- one for User IDs, and one for User Attributes.</t>

</section>
<section anchor="policy-uri"><name>Policy URI</name>

<t>(String)</t>

<t>This subpacket contains a URI of a document that describes the policy under which the signature was issued.</t>

</section>
<section anchor="key-flags"><name>Key Flags</name>

<t>(N octets of flags)</t>

<t>This subpacket contains a list of binary flags that hold information about a key.
It is a string of octets, and an implementation <bcp14>MUST NOT</bcp14> assume a fixed size.
This is so it can grow over time.
If a list is shorter than an implementation expects, the unstated flags are considered to be zero.
The defined flags are as follows:</t>

<t>First octet:</t>

<texttable title="Key flags registry (first octet)">
      <ttcol align='left'>flag</ttcol>
      <ttcol align='left'>definition</ttcol>
      <c>0x01</c>
      <c>This key may be used to make User ID certifications (signature types 0x10-0x13) or direct-key signatures (signature type 0x1F) over other keys.</c>
      <c>0x02</c>
      <c>This key may be used to sign data.</c>
      <c>0x04</c>
      <c>This key may be used to encrypt communications.</c>
      <c>0x08</c>
      <c>This key may be used to encrypt storage.</c>
      <c>0x10</c>
      <c>The private component of this key may have been split by a secret-sharing mechanism.</c>
      <c>0x20</c>
      <c>This key may be used for authentication.</c>
      <c>0x80</c>
      <c>The private component of this key may be in the possession of more than one person.</c>
</texttable>

<t>Second octet:</t>

<texttable title="Key flags registry (second octet)">
      <ttcol align='left'>flag</ttcol>
      <ttcol align='left'>definition</ttcol>
      <c>0x04</c>
      <c>Reserved (ADSK).</c>
      <c>0x08</c>
      <c>Reserved (timestamping).</c>
</texttable>

<t>Usage notes:</t>

<t>The flags in this packet may appear in self-signatures or in certification signatures.
They mean different things depending on who is making the statement --- for example, a certification signature that has the "sign data" flag is stating that the certification is for that use.
On the other hand, the "communications encryption" flag in a self-signature is stating a preference that a given key be used for communications.
Note however, that it is a thorny issue to determine what is "communications" and what is "storage".
This decision is left wholly up to the implementation; the authors of this document do not claim any special wisdom on the issue and realize that accepted opinion may change.</t>

<t>The "split key" (0x10) and "group key" (0x80) flags are placed on a self-signature only; they are meaningless on a certification signature.
They <bcp14>SHOULD</bcp14> be placed only on a direct-key signature (type 0x1F) or a subkey signature (type 0x18), one that refers to the key the flag applies to.</t>

</section>
<section anchor="signers-user-id"><name>Signer's User ID</name>

<t>(String)</t>

<t>This subpacket allows a keyholder to state which User ID is responsible for the signing.
Many keyholders use a single key for different purposes, such as business communications as well as personal communications.
This subpacket allows such a keyholder to state which of their roles is making a signature.</t>

<t>This subpacket is not appropriate to use to refer to a User Attribute packet.</t>

</section>
<section anchor="reason-for-revocation"><name>Reason for Revocation</name>

<t>(1 octet of revocation code, N octets of reason string)</t>

<t>This subpacket is used only in key revocation and certification revocation signatures.
It describes the reason why the key or certificate was revoked.</t>

<t>The first octet contains a machine-readable code that denotes the reason for the revocation:</t>

<texttable title="Reasons for revocation">
      <ttcol align='right'>Code</ttcol>
      <ttcol align='left'>Reason</ttcol>
      <c>0</c>
      <c>No reason specified (key revocations or cert revocations)</c>
      <c>1</c>
      <c>Key is superseded (key revocations)</c>
      <c>2</c>
      <c>Key material has been compromised (key revocations)</c>
      <c>3</c>
      <c>Key is retired and no longer used (key revocations)</c>
      <c>32</c>
      <c>User ID information is no longer valid (cert revocations)</c>
      <c>100-110</c>
      <c>Private Use</c>
</texttable>

<t>Following the revocation code is a string of octets that gives information about the Reason for Revocation in human-readable form (UTF-8).
The string may be null (of zero length).
The length of the subpacket is the length of the reason string plus one.
An implementation <bcp14>SHOULD</bcp14> implement this subpacket, include it in all revocation signatures, and interpret revocations appropriately.
There are important semantic differences between the reasons, and there are thus important reasons for revoking signatures.</t>

<t>If a key has been revoked because of a compromise, all signatures created by that key are suspect.
However, if it was merely superseded or retired, old signatures are still valid.
If the revoked signature is the self-signature for certifying a User ID, a revocation denotes that that user name is no longer in use.
Such a revocation <bcp14>SHOULD</bcp14> include a 0x20 code.</t>

<t>Note that any signature may be revoked, including a certification on some other person's key.
There are many good reasons for revoking a certification signature, such as the case where the keyholder leaves the employ of a business with an email address.
A revoked certification is no longer a part of validity calculations.</t>

</section>
<section anchor="features-subpacket"><name>Features</name>

<t>(N octets of flags)</t>

<t>The Features subpacket denotes which advanced OpenPGP features a user's implementation supports.
This is so that as features are added to OpenPGP that cannot be backwards-compatible, a user can state that they can use that feature.
The flags are single bits that indicate that a given feature is supported.</t>

<t>This subpacket is similar to a preferences subpacket, and only appears in a self-signature.</t>

<t>An implementation <bcp14>SHOULD NOT</bcp14> use a feature listed when sending to a user who does not state that they can use it.</t>

<t>Defined features are as follows:</t>

<t>First octet:</t>

<texttable title="Features registry">
      <ttcol align='left'>Feature</ttcol>
      <ttcol align='left'>Definition</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>0x01</c>
      <c>Symmetrically Encrypted Integrity Protected Data packet version 1</c>
      <c><xref target="version-one-seipd"/></c>
      <c>0x02</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>0x04</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>0x08</c>
      <c>Symmetrically Encrypted Integrity Protected Data packet version 2</c>
      <c><xref target="version-two-seipd"/></c>
</texttable>

<t>If an implementation implements any of the defined features, it <bcp14>SHOULD</bcp14> implement the Features subpacket, too.</t>

<t>An implementation may freely infer features from other suitable implementation-dependent mechanisms.</t>

<t>See <xref target="ciphertext-malleability"/> for details about how to use the Features subpacket when generating encryption data.</t>

</section>
<section anchor="signature-target"><name>Signature Target</name>

<t>(1 octet public-key algorithm, 1 octet hash algorithm, N octets hash)</t>

<t>This subpacket identifies a specific target signature to which a signature refers.
For revocation signatures, this subpacket provides explicit designation of which signature is being revoked.
For a third-party or timestamp signature, this designates what signature is signed.
All arguments are an identifier of that target signature.</t>

<t>The N octets of hash data <bcp14>MUST</bcp14> be the size of the hash of the signature.
For example, a target signature with a SHA-1 hash <bcp14>MUST</bcp14> have 20 octets of hash data.</t>

</section>
<section anchor="embedded-signature"><name>Embedded Signature</name>

<t>(1 signature packet body)</t>

<t>This subpacket contains a complete Signature packet body as specified in <xref target="signature-packet"/>.
It is useful when one signature needs to refer to, or be incorporated in, another signature.</t>

</section>
<section anchor="issuer-fingerprint-subpacket"><name>Issuer Fingerprint</name>

<t>(1 octet key version number, N octets of fingerprint)</t>

<t>The OpenPGP Key fingerprint of the key issuing the signature.
This subpacket <bcp14>SHOULD</bcp14> be included in all signatures.
If the version of the issuing key is 4 and an Issuer Key ID subpacket (<xref target="issuer-keyid-subpacket"/>) is also included in the signature, the key ID of the Issuer Key ID subpacket <bcp14>MUST</bcp14> match the low 64 bits of the fingerprint.</t>

<t>Note that the length N of the fingerprint for a version 4 key is 20 octets; for a version 5 key N is 32.
Since the version of the signature is bound to the version of the key, the version octet here <bcp14>MUST</bcp14> match the version of the signature.
If the version octet does not match the signature version, the receiving implementation <bcp14>MUST</bcp14> treat it as a malformed signature (see <xref target="malformed-signatures"/>).</t>

</section>
<section anchor="intended-recipient-fingerprint"><name>Intended Recipient Fingerprint</name>

<t>(1 octet key version number, N octets of fingerprint)</t>

<t>The OpenPGP Key fingerprint of the intended recipient primary key.
If one or more subpackets of this type are included in a signature, it <bcp14>SHOULD</bcp14> be considered valid only in an encrypted context, where the key it was encrypted to is one of the indicated primary keys, or one of their subkeys.
This can be used to prevent forwarding a signature outside of its intended, encrypted context (see <xref target="surreptitious-forwarding"/>).</t>

<t>Note that the length N of the fingerprint for a version 4 key is 20 octets; for a version 5 key N is 32.</t>

<t>An implementation <bcp14>SHOULD</bcp14> generate this subpacket when creating a signed and encrypted message.</t>

</section>
</section>
<section anchor="computing-signatures"><name>Computing Signatures</name>

<t>All signatures are formed by producing a hash over the signature data, and then using the resulting hash in the signature algorithm.</t>

<t>When a v5 signature is made, the salt is hashed first.</t>

<t>For binary document signatures (type 0x00), the document data is hashed directly.
For text document signatures (type 0x01), the implementation <bcp14>MUST</bcp14> first canonicalize the document by converting line endings to &lt;CR&gt;&lt;LF&gt; and encoding it in UTF-8 (see <xref target="RFC3629"/>).
The resulting UTF-8 bytestream is hashed.</t>

<t>When a v4 signature is made over a key, the hash data starts with the octet 0x99, followed by a two-octet length of the key, and then body of the key packet.
When a v5 signature is made over a key, the hash data starts with the octet 0x9a, followed by a four-octet length of the key, and then body of the key packet.</t>

<t>A subkey binding signature (type 0x18) or primary key binding signature (type 0x19) then hashes the subkey using the same format as the main key (also using 0x99 or 0x9a as the first octet).
Primary key revocation signatures (type 0x20) hash only the key being revoked.
Subkey revocation signature (type 0x28) hash first the primary key and then the subkey being revoked.</t>

<t>A certification signature (type 0x10 through 0x13) hashes the User ID being bound to the key into the hash context after the above data.
A v3 certification hashes the contents of the User ID or attribute packet packet, without any header.
A v4 or v5 certification hashes the constant 0xB4 for User ID certifications or the constant 0xD1 for User Attribute certifications, followed by a four-octet number giving the length of the User ID or User Attribute data, and then the User ID or User Attribute data.</t>

<t>When a signature is made over a Signature packet (type 0x50, "Third-Party Confirmation signature"), the hash data starts with the octet 0x88, followed by the four-octet length of the signature, and then the body of the Signature packet.
(Note that this is a Legacy packet header for a Signature packet with the length-of-length field set to zero.) The unhashed subpacket data of the Signature packet being hashed is not included in the hash, and the unhashed subpacket data length value is set to zero.</t>

<t>Once the data body is hashed, then a trailer is hashed.
This trailer depends on the version of the signature.</t>

<t><list style="symbols">
  <t>A v3 signature hashes five octets of the packet body, starting from the signature type field.
This data is the signature type, followed by the four-octet signature time.</t>
  <t>A v4 or v5 signature hashes the packet body starting from its first field, the version number, through the end of the hashed subpacket data and a final extra trailer.
Thus, the hashed fields are:  <list style="symbols">
      <t>An octet indicating the signature version (0x04 for v4, 0x05 for v5),</t>
      <t>the signature type,</t>
      <t>the public-key algorithm,</t>
      <t>the hash algorithm,</t>
      <t>the hashed subpacket length,</t>
      <t>the hashed subpacket body,</t>
      <t>A second version octet (0x04 for v4, 0x05 for v5)</t>
      <t>A single octet 0xFF,</t>
      <t>A number representing the length of the hashed data from the Signature packet stopping right before the second version octet.
For a v4 signature, this is a four-octet big-endian number, considered to be an unsigned integer modulo 2**32.
For a v5 signature, this is an eight-octet big-endian number, considered to be an unsigned integer modulo 2**64.</t>
    </list></t>
</list></t>

<t>After all this has been hashed in a single hash context, the resulting hash field is used in the signature algorithm and placed at the end of the Signature packet.</t>

<section anchor="subpacket-hints"><name>Subpacket Hints</name>

<t>It is certainly possible for a signature to contain conflicting information in subpackets.
For example, a signature may contain multiple copies of a preference or multiple expiration times.
In most cases, an implementation <bcp14>SHOULD</bcp14> use the last subpacket in the signature, but <bcp14>MAY</bcp14> use any conflict resolution scheme that makes more sense.
Please note that we are intentionally leaving conflict resolution to the implementer; most conflicts are simply syntax errors, and the wishy-washy language here allows a receiver to be generous in what they accept, while putting pressure on a creator to be stingy in what they generate.</t>

<t>Some apparent conflicts may actually make sense --- for example, suppose a keyholder has a v3 key and a v4 key that share the same RSA key material.
Either of these keys can verify a signature created by the other, and it may be reasonable for a signature to contain an Issuer Key ID subpacket (<xref target="issuer-keyid-subpacket"/>) for each key, as a way of explicitly tying those keys to the signature.</t>

</section>
</section>
<section anchor="malformed-signatures"><name>Malformed and Unknown Signatures</name>

<t>In some cases, a signature packet (or its corresponding One-Pass Signature Packet, see <xref target="one-pass-sig"/>) may be malformed or unknown.
For example, it might encounter any of the following problems (this is not an exhaustive list):</t>

<t><list style="symbols">
  <t>an unknown signature type</t>
  <t>an unknown signature version</t>
  <t>an unsupported signature version</t>
  <t>an unknown "critical" subpacket (see <xref target="signature-subpacket"/>) in the hashed area</t>
  <t>a subpacket with a length that diverges from the expected length</t>
  <t>a hashed subpacket area with length that exceeds the length of the signature packet itself</t>
  <t>a known-weak hash algorithm (e.g. MD5)</t>
</list></t>

<t>When an implementation encounters such a malformed or unknown signature, it <bcp14>MUST</bcp14> ignore the signature for validation purposes.
It <bcp14>MUST NOT</bcp14> indicate a successful signature validation for such a signature.
At the same time, it <bcp14>MUST NOT</bcp14> halt processing on the packet stream or reject other signatures in the same packet stream just because an unknown or invalid signature exists.</t>

<t>This requirement is necessary for forward-compatibility.
Producing an output that indicates that no successful signatures were found is preferable to aborting processing entirely.</t>

</section>
</section>
<section anchor="skesk"><name>Symmetric-Key Encrypted Session Key Packets (Tag 3)</name>

<t>The Symmetric-Key Encrypted Session Key (SKESK) packet holds the symmetric-key encryption of a session key used to encrypt a message.
Zero or more Public-Key Encrypted Session Key packets (<xref target="pkesk"/>) and/or Symmetric-Key Encrypted Session Key packets may precede a an encryption container (that is, a Symmetrically Encrypted Integrity Protected Data packet or --- for historic data --- a Symmetrically Encrypted Data packet) that holds an encrypted message.
The message is encrypted with a session key, and the session key is itself encrypted and stored in the Encrypted Session Key packet(s).</t>

<t>If the encryption container is preceded by one or more Symmetric-Key Encrypted Session Key packets, each specifies a passphrase that may be used to decrypt the message.
This allows a message to be encrypted to a number of public keys, and also to one or more passphrases.</t>

<t>The body of this packet starts with a one-octet number giving the version number of the packet type.
The currently defined versions are 4 and 5.
The remainder of the packet depends on the version.</t>

<t>The versions differ in how they encrypt the session key with the password, and in what they encode.
The version of the SKESK packet must align with the version of the SEIPD packet (see <xref target="encrypted-message-versions"/>).</t>

<section anchor="v4-skesk"><name>v4 SKESK</name>

<t>A version 4 Symmetric-Key Encrypted Session Key (SKESK) packet precedes a version 1 Symmetrically Encrypted Integrity Protected Data (v1 SEIPD, see <xref target="version-one-seipd"/>) packet.
In historic data, it is sometimes found preceding a deprecated Symmetrically Encrypted Data packet (SED, see <xref target="sed"/>).
A v4 SKESK packet <bcp14>MUST NOT</bcp14> precede a v2 SEIPD packet (see <xref target="encrypted-message-versions"/>).</t>

<t>A version 4 Symmetric-Key Encrypted Session Key packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number with value 4.</t>
  <t>A one-octet number describing the symmetric algorithm used.</t>
  <t>A string-to-key (S2K) specifier.
The length of the string-to-key specifier depends on its type (see <xref target="s2k-types"/>).</t>
  <t>Optionally, the encrypted session key itself, which is decrypted with the string-to-key object.</t>
</list></t>

<t>If the encrypted session key is not present (which can be detected on the basis of packet length and S2K specifier size), then the S2K algorithm applied to the passphrase produces the session key for decrypting the message, using the symmetric cipher algorithm from the Symmetric-Key Encrypted Session Key packet.</t>

<t>If the encrypted session key is present, the result of applying the S2K algorithm to the passphrase is used to decrypt just that encrypted session key field, using CFB mode with an IV of all zeros.
The decryption result consists of a one-octet algorithm identifier that specifies the symmetric-key encryption algorithm used to encrypt the following encryption container, followed by the session key octets themselves.</t>

<t>Note: because an all-zero IV is used for this decryption, the S2K specifier <bcp14>MUST</bcp14> use a salt value, either a Salted S2K, an Iterated-Salted S2K, or Argon2.
The salt value will ensure that the decryption key is not repeated even if the passphrase is reused.</t>

</section>
<section anchor="v5-skesk"><name>v5 SKESK</name>

<t>A version 5 Symmetric-Key Encrypted Session Key (SKESK) packet precedes a version 2 Symmetrically Encrypted Integrity Protected Data (v2 SEIPD, see <xref target="version-two-seipd"/>) packet.
A v5 SKESK packet <bcp14>MUST NOT</bcp14> precede a v1 SEIPD packet or a deprecated Symmetrically Encrypted Data packet (see <xref target="encrypted-message-versions"/>).</t>

<t>A version 5 Symmetric-Key Encrypted Session Key packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number with value 5.</t>
  <t>A one-octet scalar octet count of the following 5 fields.</t>
  <t>A one-octet symmetric cipher algorithm identifier.</t>
  <t>A one-octet AEAD algorithm identifier.</t>
  <t>A one-octet scalar octet count of the following field.</t>
  <t>A string-to-key (S2K) specifier.
The length of the string-to-key specifier depends on its type (see <xref target="s2k-types"/>).</t>
  <t>A starting initialization vector of size specified by the AEAD algorithm.</t>
  <t>The encrypted session key itself.</t>
  <t>An authentication tag for the AEAD mode.</t>
</list></t>

<t>HKDF is used with SHA256 as hash algorithm, the key derived from S2K as Initial Keying Material (IKM), no salt, and the Packet Tag in new format encoding (bits 7 and 6 set, bits 5-0 carry the packet tag), the packet version, and the cipher-algo and AEAD-mode used to encrypt the key material, are used as info parameter.
Then, the session key is encrypted using the resulting key, with the AEAD algorithm specified for version 2 of the Symmetrically Encrypted Integrity Protected Data packet.
Note that no chunks are used and that there is only one authentication tag.
The Packet Tag in OpenPGP format encoding (bits 7 and 6 set, bits 5-0 carry the packet tag), the packet version number, the cipher algorithm octet, and the AEAD algorithm octet are given as additional data.
For example, the additional data used with AES-128 with OCB consists of the octets 0xC3, 0x05, 0x07, and 0x02.</t>

</section>
</section>
<section anchor="one-pass-sig"><name>One-Pass Signature Packets (Tag 4)</name>

<t>The One-Pass Signature packet precedes the signed data and contains enough information to allow the receiver to begin calculating any hashes needed to verify the signature.
It allows the Signature packet to be placed at the end of the message, so that the signer can compute the entire signed message in one pass.</t>

<t>The body of this packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number.
The currently defined versions are 3 and 5.</t>
  <t>A one-octet signature type.
Signature types are described in <xref target="signature-types"/>.</t>
  <t>A one-octet number describing the hash algorithm used.</t>
  <t>A one-octet number describing the public-key algorithm used.</t>
  <t>Only for v5 packets, a 16 octet field containing random values used as salt.
The value must match the salt field of the corresponding Signature packet.</t>
  <t>Only for v3 packets, an eight-octet number holding the Key ID of the signing key.</t>
  <t>Only for v5 packets, a one octet key version number and N octets of the fingerprint of the signing key.
Note that the length N of the fingerprint for a version 5 key is 32.
Since a v5 signature can only be made by a v5 key, the key version number <bcp14>MUST</bcp14> be 5.
An application that encounters a v5 One-Pass Signature packet where the key version number is not 5 <bcp14>MUST</bcp14> treat the signature as invalid (see <xref target="malformed-signatures"/>).</t>
  <t>A one-octet number holding a flag showing whether the signature is nested.
A zero value indicates that the next packet is another One-Pass Signature packet that describes another signature to be applied to the same message data.</t>
</list></t>

<t>When generating a one-pass signature, the OPS packet version <bcp14>MUST</bcp14> correspond to the version of the associated signature packet, except for the historical accident that v4 keys use a v3 one-pass signature packet (there is no v4 OPS):</t>

<texttable title="Versions of packets used in a one-pass signature">
      <ttcol align='left'>Signing key version</ttcol>
      <ttcol align='left'>OPS packet version</ttcol>
      <ttcol align='left'>Signature packet version</ttcol>
      <c>4</c>
      <c>3</c>
      <c>4</c>
      <c>5</c>
      <c>5</c>
      <c>5</c>
</texttable>

<t>Note that if a message contains more than one one-pass signature, then the Signature packets bracket the message; that is, the first Signature packet after the message corresponds to the last one-pass packet and the final Signature packet corresponds to the first one-pass packet.</t>

</section>
<section anchor="key-material-packet"><name>Key Material Packet</name>

<t>A key material packet contains all the information about a public or private key.
There are four variants of this packet type, and two major versions.
Consequently, this section is complex.</t>

<section anchor="key-packet-variants"><name>Key Packet Variants</name>

<section anchor="public-key-packet-tag-6"><name>Public-Key Packet (Tag 6)</name>

<t>A Public-Key packet starts a series of packets that forms an OpenPGP key (sometimes called an OpenPGP certificate).</t>

</section>
<section anchor="public-subkey-packet-tag-14"><name>Public-Subkey Packet (Tag 14)</name>

<t>A Public-Subkey packet (tag 14) has exactly the same format as a Public-Key packet, but denotes a subkey.
One or more subkeys may be associated with a top-level key.
By convention, the top-level key provides signature services, and the subkeys provide encryption services.</t>

</section>
<section anchor="secret-key-packet-tag-5"><name>Secret-Key Packet (Tag 5)</name>

<t>A Secret-Key packet contains all the information that is found in a Public-Key packet, including the public-key material, but also includes the secret-key material after all the public-key fields.</t>

</section>
<section anchor="secret-subkey-packet-tag-7"><name>Secret-Subkey Packet (Tag 7)</name>

<t>A Secret-Subkey packet (tag 7) is the subkey analog of the Secret Key packet and has exactly the same format.</t>

</section>
</section>
<section anchor="public-key-packet-formats"><name>Public-Key Packet Formats</name>

<t>There are three versions of key-material packets.</t>

<t>OpenPGP implementations <bcp14>SHOULD</bcp14> create keys with version 5 format.
V4 keys are deprecated; an implementation <bcp14>SHOULD NOT</bcp14> generate a v4 key, but <bcp14>SHOULD</bcp14> accept it.
V3 keys are deprecated; an implementation <bcp14>MUST NOT</bcp14> generate a v3 key, but <bcp14>MAY</bcp14> accept it.
V2 keys are deprecated; an implementation <bcp14>MUST NOT</bcp14> generate a v2 key, but <bcp14>MAY</bcp14> accept it.</t>

<t>A version 3 public key or public-subkey packet contains:</t>

<t><list style="symbols">
  <t>A one-octet version number (3).</t>
  <t>A four-octet number denoting the time that the key was created.</t>
  <t>A two-octet number denoting the time in days that this key is valid.
If this number is zero, then it does not expire.</t>
  <t>A one-octet number denoting the public-key algorithm of this key.</t>
  <t>A series of multiprecision integers comprising the key material:  <list style="symbols">
      <t>a multiprecision integer (MPI) of RSA public modulus n;</t>
      <t>an MPI of RSA public encryption exponent e.</t>
    </list></t>
</list></t>

<t>V3 keys are deprecated.
They contain three weaknesses.
First, it is relatively easy to construct a v3 key that has the same Key ID as any other key because the Key ID is simply the low 64 bits of the public modulus.
Secondly, because the fingerprint of a v3 key hashes the key material, but not its length, there is an increased opportunity for fingerprint collisions.
Third, there are weaknesses in the MD5 hash algorithm that make developers prefer other algorithms.
See <xref target="key-ids-fingerprints"/> for a fuller discussion of Key IDs and fingerprints.</t>

<t>V2 keys are identical to the deprecated v3 keys except for the version number.</t>

<t>The version 4 format is similar to the version 3 format except for the absence of a validity period.
This has been moved to the Signature packet.
In addition, fingerprints of version 4 keys are calculated differently from version 3 keys, as described in <xref target="key-ids-fingerprints"/>.</t>

<t>A version 4 packet contains:</t>

<t><list style="symbols">
  <t>A one-octet version number (4).</t>
  <t>A four-octet number denoting the time that the key was created.</t>
  <t>A one-octet number denoting the public-key algorithm of this key.</t>
  <t>A series of values comprising the key material.
This is algorithm-specific and described in <xref target="algorithm-specific-parts-of-keys"/>.</t>
</list></t>

<t>The version 5 format is similar to the version 4 format except for the addition of a count for the key material.
This count helps parsing secret key packets (which are an extension of the public key packet format) in the case of an unknown algorithm.
In addition, fingerprints of version 5 keys are calculated differently from version 4 keys, as described in <xref target="key-ids-fingerprints"/>.</t>

<t>A version 5 packet contains:</t>

<t><list style="symbols">
  <t>A one-octet version number (5).</t>
  <t>A four-octet number denoting the time that the key was created.</t>
  <t>A one-octet number denoting the public-key algorithm of this key.</t>
  <t>A four-octet scalar octet count for the following public key material.</t>
  <t>A series of values comprising the public key material.
This is algorithm-specific and described in <xref target="algorithm-specific-parts-of-keys"/>.</t>
</list></t>

</section>
<section anchor="secret-key-packet-formats"><name>Secret-Key Packet Formats</name>

<t>The Secret-Key and Secret-Subkey packets contain all the data of the Public-Key and Public-Subkey packets, with additional algorithm-specific secret-key data appended, usually in encrypted form.</t>

<t>The packet contains:</t>

<t><list style="symbols">
  <t>The fields of a Public-Key or Public-Subkey packet, as described above.</t>
  <t>One octet indicating string-to-key usage conventions.
Zero indicates that the secret-key data is not encrypted.
255, 254, or 253 indicates that a string-to-key specifier is being given.
Any other value is a symmetric-key encryption algorithm identifier.
A version 5 packet <bcp14>MUST NOT</bcp14> use the value 255.</t>
  <t>Only for a version 5 packet where the secret key material is encrypted (that is, where the previous octet is not zero), a one-octet scalar octet count of the cumulative length of all the following optional string-to-key parameter fields.</t>
  <t>[Optional] If string-to-key usage octet was 255, 254, or 253, a one-octet symmetric encryption algorithm.</t>
  <t>[Optional] If string-to-key usage octet was 253, a one-octet AEAD algorithm.</t>
  <t>[Optional] Only for a version 5 packet, and if string-to-key usage octet was 255, 254, or 253, an one-octet count of the following field.</t>
  <t>[Optional] If string-to-key usage octet was 255, 254, or 253, a string-to-key (S2K) specifier.
The length of the string-to-key specifier depends on its type (see <xref target="s2k-types"/>).</t>
  <t>[Optional] If string-to-key usage octet was 253 (that is, the secret data is AEAD-encrypted), an initialization vector (IV) of size specified by the AEAD algorithm (see <xref target="version-two-seipd"/>), which is used as the nonce for the AEAD algorithm.</t>
  <t>[Optional] If string-to-key usage octet was 255, 254, or a cipher algorithm identifier (that is, the secret data is CFB-encrypted), an initialization vector (IV) of the same length as the cipher's block size.</t>
  <t>Plain or encrypted multiprecision integers comprising the secret key data.
This is algorithm-specific and described in <xref target="algorithm-specific-parts-of-keys"/>.
If the string-to-key usage octet is 253, then an AEAD authentication tag is part of that data.
If the string-to-key usage octet is 254, a 20-octet SHA-1 hash of the plaintext of the algorithm-specific portion is appended to plaintext and encrypted with it.
If the string-to-key usage octet is 255 or another nonzero value (that is, a symmetric-key encryption algorithm identifier), a two-octet checksum of the plaintext of the algorithm-specific portion (sum of all octets, mod 65536) is appended to plaintext and encrypted with it.
(This is deprecated and <bcp14>SHOULD NOT</bcp14> be used, see below.)</t>
  <t>If the string-to-key usage octet is zero, then a two-octet checksum of the algorithm-specific portion (sum of all octets, mod 65536).</t>
</list></t>

<t>The details about storing algorithm-specific secrets above are summarized in <xref target="secret-key-encryption"/>.</t>

<t>Note that the version 5 packet format adds two count values to help parsing packets with unknown S2K or public key algorithms.</t>

<t>Secret MPI values can be encrypted using a passphrase.
If a string-to-key specifier is given, that describes the algorithm for converting the passphrase to a key, else a simple MD5 hash of the passphrase is used.
Implementations <bcp14>MUST</bcp14> use a string-to-key specifier; the simple hash is for backward compatibility and is deprecated, though implementations <bcp14>MAY</bcp14> continue to use existing private keys in the old format.
The cipher for encrypting the MPIs is specified in the Secret-Key packet.</t>

<t>Encryption/decryption of the secret data is done using the key created from the passphrase and the initialization vector from the packet.
If the string-to-key usage octet is not 253, CFB mode is used.
A different mode is used with v3 keys (which are only RSA) than with other key formats.
With v3 keys, the MPI bit count prefix (that is, the first two octets) is not encrypted.
Only the MPI non-prefix data is encrypted.
Furthermore, the CFB state is resynchronized at the beginning of each new MPI value, so that the CFB block boundary is aligned with the start of the MPI data.</t>

<t>With v4 and v5 keys, a simpler method is used.
All secret MPI values are encrypted, including the MPI bitcount prefix.</t>

<t>If the string-to-key usage octet is 253, the key encryption key is derived using HKDF (see <xref target="RFC5869"/>) to provide key separation.
HKDF is used with SHA256 as hash algorithm, the key derived from S2K as Initial Keying Material (IKM), no salt, and the Packet Tag in OpenPGP format encoding (bits 7 and 6 set, bits 5-0 carry the packet tag), the packet version, and the cipher-algo and AEAD-mode used to encrypt the key material, are used as info parameter.
Then, the encrypted MPI values are encrypted as one combined plaintext using one of the AEAD algorithms specified for version 2 of the Symmetrically Encrypted Integrity Protected Data packet.
Note that no chunks are used and that there is only one authentication tag.
As additional data, the Packet Tag in OpenPGP format encoding (bits 7 and 6 set, bits 5-0 carry the packet tag), followed by the public key packet fields, starting with the packet version number, are passed to the AEAD algorithm.
For example, the additional data used with a Secret-Key Packet of version 4 consists of the octets 0xC5, 0x04, followed by four octets of creation time, one octet denoting the public-key algorithm, and the algorithm-specific public-key parameters.
For a Secret-Subkey Packet, the first octet would be 0xC7.
For a version 5 key packet, the second octet would be 0x05, and the four-octet octet count of the public key material would be included as well (see <xref target="public-key-packet-formats"/>).</t>

<t>The two-octet checksum that follows the algorithm-specific portion is the algebraic sum, mod 65536, of the plaintext of all the algorithm-specific octets (including MPI prefix and data).
With v3 keys, the checksum is stored in the clear.
With v4 keys, the checksum is encrypted like the algorithm-specific data.
This value is used to check that the passphrase was correct.
However, this checksum is deprecated; an implementation <bcp14>SHOULD NOT</bcp14> use it, but should rather use the SHA-1 hash denoted with a usage octet of 254.
The reason for this is that there are some attacks that involve undetectably modifying the secret key.
If the string-to-key usage octet is 253 no checksum or SHA-1 hash is used but the authentication tag of the AEAD algorithm follows.</t>

<t>When decrypting the secret key material using any of these schemes (that is, where the usage octet is non-zero), the resulting cleartext octet stream <bcp14>MUST</bcp14> be well-formed.
In particular, an implementation <bcp14>MUST NOT</bcp14> interpret octets beyond the unwrapped cleartext octet stream as part of any of the unwrapped MPI objects.
Furthermore, an implementation <bcp14>MUST</bcp14> reject as unusable any secret key material whose cleartext length does not align with the lengths of the unwrapped MPI objects.</t>

</section>
<section anchor="key-ids-fingerprints"><name>Key IDs and Fingerprints</name>

<t>For a v3 key, the eight-octet Key ID consists of the low 64 bits of the public modulus of the RSA key.</t>

<t>The fingerprint of a v3 key is formed by hashing the body (but not the two-octet length) of the MPIs that form the key material (public modulus n, followed by exponent e) with MD5.
Note that both v3 keys and MD5 are deprecated.</t>

<t>A v4 fingerprint is the 160-bit SHA-1 hash of the octet 0x99, followed by the two-octet packet length, followed by the entire Public-Key packet starting with the version field.
The Key ID is the low-order 64 bits of the fingerprint.
Here are the fields of the hash material, with the example of an EdDSA key:</t>

<t>a.1) 0x99 (1 octet)</t>

<t>a.2) two-octet, big-endian scalar octet count of (b)-(e)</t>

<t>b) version number = 4 (1 octet);</t>

<t>c) timestamp of key creation (4 octets);</t>

<t>d) algorithm (1 octet): 22 = EdDSA (example);</t>

<t>e) Algorithm-specific fields.</t>

<t>Algorithm-Specific Fields for EdDSA keys (example):</t>

<t>e.1) A one-octet size of the following field;</t>

<t>e.2) The octets representing a curve OID, defined in <xref target="ec-curves"/>;</t>

<t>e.3) An MPI of an EC point representing a public key Q in prefixed native form (see <xref target="ec-point-prefixed-native"/>).</t>

<t>A v5 fingerprint is the 256-bit SHA2-256 hash of the octet 0x9A, followed by the four-octet packet length, followed by the entire Public-Key packet starting with the version field.
The Key ID is the high-order 64 bits of the fingerprint.
Here are the fields of the hash material, with the example of an EdDSA key:</t>

<t>a.1) 0x9A (1 octet)</t>

<t>a.2) four-octet scalar octet count of (b)-(f)</t>

<t>b) version number = 5 (1 octet);</t>

<t>c) timestamp of key creation (4 octets);</t>

<t>d) algorithm (1 octet): 22 = EdDSA (example);</t>

<t>e) four-octet scalar octet count for the following key material;</t>

<t>f) algorithm-specific fields.</t>

<t>Algorithm-Specific Fields for EdDSA keys (example):</t>

<t>f.1) A one-octet size of the following field;</t>

<t>f.2) The octets representing a curve OID, defined in <xref target="ec-curves"/>;</t>

<t>f.3) An MPI of an EC point representing a public key Q in prefixed native form (see <xref target="ec-point-prefixed-native"/>).</t>

<t>Note that it is possible for there to be collisions of Key IDs --- two different keys with the same Key ID.
Note that there is a much smaller, but still non-zero, probability that two different keys have the same fingerprint.</t>

<t>Also note that if v3, v4, and v5 format keys share the same RSA key material, they will have different Key IDs as well as different fingerprints.</t>

<t>Finally, the Key ID and fingerprint of a subkey are calculated in the same way as for a primary key, including the 0x99 (v4 key) or 0x9A (v5 key) as the first octet (even though this is not a valid packet ID for a public subkey).</t>

</section>
<section anchor="algorithm-specific-parts-of-keys"><name>Algorithm-specific Parts of Keys</name>

<t>The public and secret key format specifies algorithm-specific parts of a key.
The following sections describe them in detail.</t>

<section anchor="key-rsa"><name>Algorithm-Specific Part for RSA Keys</name>

<t>The public key is this series of multiprecision integers:</t>

<t><list style="symbols">
  <t>MPI of RSA public modulus n;</t>
  <t>MPI of RSA public encryption exponent e.</t>
</list></t>

<t>The secret key is this series of multiprecision integers:</t>

<t><list style="symbols">
  <t>MPI of RSA secret exponent d;</t>
  <t>MPI of RSA secret prime value p;</t>
  <t>MPI of RSA secret prime value q (p &lt; q);</t>
  <t>MPI of u, the multiplicative inverse of p, mod q.</t>
</list></t>

</section>
<section anchor="key-dsa"><name>Algorithm-Specific Part for DSA Keys</name>

<t>The public key is this series of multiprecision integers:</t>

<t><list style="symbols">
  <t>MPI of DSA prime p;</t>
  <t>MPI of DSA group order q (q is a prime divisor of p-1);</t>
  <t>MPI of DSA group generator g;</t>
  <t>MPI of DSA public-key value y (= g**x mod p where x is secret).</t>
</list></t>

<t>The secret key is this single multiprecision integer:</t>

<t><list style="symbols">
  <t>MPI of DSA secret exponent x.</t>
</list></t>

</section>
<section anchor="key-elgamal"><name>Algorithm-Specific Part for Elgamal Keys</name>

<t>The public key is this series of multiprecision integers:</t>

<t><list style="symbols">
  <t>MPI of Elgamal prime p;</t>
  <t>MPI of Elgamal group generator g;</t>
  <t>MPI of Elgamal public key value y (= g**x mod p where x is secret).</t>
</list></t>

<t>The secret key is this single multiprecision integer:</t>

<t><list style="symbols">
  <t>MPI of Elgamal secret exponent x.</t>
</list></t>

</section>
<section anchor="key-ecdsa"><name>Algorithm-Specific Part for ECDSA Keys</name>

<t>The public key is this series of values:</t>

<t><list style="symbols">
  <t>A variable-length field containing a curve OID, which is formatted as follows:  <list style="symbols">
      <t>A one-octet size of the following field; values 0 and 0xFF are reserved for future extensions,</t>
      <t>The octets representing a curve OID (defined in <xref target="ec-curves"/>);</t>
    </list></t>
  <t>MPI of an EC point representing a public key.</t>
</list></t>

<t>The secret key is this single multiprecision integer:</t>

<t><list style="symbols">
  <t>MPI of an integer representing the secret key, which is a scalar of the public EC point.</t>
</list></t>

</section>
<section anchor="key-eddsa"><name>Algorithm-Specific Part for EdDSA Keys</name>

<t>The public key is this series of values:</t>

<t><list style="symbols">
  <t>A variable-length field containing a curve OID, formatted as follows:  <list style="symbols">
      <t>A one-octet size of the following field; values 0 and 0xFF are reserved for future extensions,</t>
      <t>The octets representing a curve OID, defined in <xref target="ec-curves"/>;</t>
    </list></t>
  <t>An MPI of an EC point representing a public key Q in prefixed native form (see <xref target="ec-point-prefixed-native"/>).</t>
</list></t>

<t>The secret key is this single multiprecision integer:</t>

<t><list style="symbols">
  <t>An MPI-encoded octet string representing the native form of the secret key, in the curve-specific format described in <xref target="curve-specific-formats"/>.</t>
</list></t>

<t>Note that the native form for an EdDSA secret key is a fixed-width sequence of unstructured random octets, with size corresponding to the specific curve.
That sequence of random octets is used with a cryptographic digest to produce both a curve-specific secret scalar and a prefix used when making a signature.
See <xref target="RFC8032"/> for more details about how to use the native octet strings (section 5.1.5 for Ed25519 and 5.2.5 for Ed448).
The value stored in an OpenPGP EdDSA secret key packet is the original sequence of random octets.</t>

<t>Note that a ECDH secret key over the equivalent curve instead stores the curve-specific secret scalar itself, rather than the sequence of random octets stored in an EdDSA secret key.</t>

</section>
<section anchor="key-ecdh"><name>Algorithm-Specific Part for ECDH Keys</name>

<t>The public key is this series of values:</t>

<t><list style="symbols">
  <t>A variable-length field containing a curve OID, which is formatted as follows:  <list style="symbols">
      <t>A one-octet size of the following field; values 0 and 0xFF are reserved for future extensions,</t>
      <t>Octets representing a curve OID, defined in <xref target="ec-curves"/>;</t>
    </list></t>
  <t>MPI of an EC point representing a public key, in the point format associated with the curve as specified in <xref target="curve-specific-formats"/></t>
  <t>A variable-length field containing KDF parameters, which is formatted as follows:  <list style="symbols">
      <t>A one-octet size of the following fields; values 0 and 0xFF are reserved for future extensions,</t>
      <t>A one-octet value 1, reserved for future extensions,</t>
      <t>A one-octet hash function ID used with a KDF,</t>
      <t>A one-octet algorithm ID for the symmetric algorithm used to wrap the symmetric key used for the message encryption; see <xref target="ecdh"/> for details.</t>
    </list></t>
</list></t>

<t>The secret key is this single multiprecision integer:</t>

<t><list style="symbols">
  <t>An MPI representing the secret key, in the curve-specific format described in <xref target="curve-specific-formats"/>.</t>
</list></t>

<section anchor="ecdh-secret-key-material"><name>ECDH Secret Key Material</name>

<t>When curve NIST P-256, NIST P-384, NIST P-521, brainpoolP256r1, brainpoolP384r1, or brainpoolP512r1 are used in ECDH, their secret keys are represented as a simple integer in standard MPI form.
Other curves are presented on the wire differently (though still as a single MPI), as described below and in <xref target="curve-specific-formats"/>.</t>

<section anchor="curve25519-secrets"><name>Curve25519 ECDH Secret Key Material</name>

<t>A Curve25519 secret key is stored as a standard integer in big-endian MPI form.
Note that this form is in reverse octet order from the little-endian "native" form found in <xref target="RFC7748"/>.</t>

<t>Note also that the integer for a Curve25519 secret key for OpenPGP <bcp14>MUST</bcp14> have the appropriate form: that is, it <bcp14>MUST</bcp14> be divisible by 8, <bcp14>MUST</bcp14> be at least 2**254, and <bcp14>MUST</bcp14> be less than 2**255.
The length of this MPI in bits is by definition always 255, so the two leading octets of the MPI will always be <spanx style="verb">00 ff</spanx> and reversing the following 32 octets from the wire will produce the "native" form.</t>

<t>When generating a new Curve25519 secret key from 32 fully-random octets, the following pseudocode produces the MPI wire format (note the similarity to <spanx style="verb">decodeScalar25519</spanx> from <xref target="RFC7748"/>):</t>

<figure><artwork><![CDATA[
def curve25519_MPI_from_random(octet_list):
    octet_list[0] &= 248
    octet_list[31] &= 127
    octet_list[31] |= 64
    mpi_header = [ 0x00, 0xff ]
    return mpi_header || reversed(octet_list)
]]></artwork></figure>

</section>
<section anchor="x448-secrets"><name>X448 ECDH Secret Key Material</name>

<t>An X448 secret key is contained within its MPI as a prefixed octet string (see <xref target="ec-prefix"/>), which encapsulates the native secret key format found in <xref target="RFC7748"/>.
The full wire format (as an MPI) will thus be the three octets <spanx style="verb">01 c7 40</spanx> followed by the full 56 octet native secret key.</t>

<t>When generating a new X448 secret key from 56 fully-random octets, the following pseudocode produces the MPI wire format:</t>

<figure><artwork><![CDATA[
def X448_MPI_from_random(octet_list):
    prefixed_header = [ 0x01, 0xc7, 0x40 ]
    return prefixed_header || octet_list
]]></artwork></figure>

</section>
</section>
</section>
</section>
</section>
<section anchor="compressed-data"><name>Compressed Data Packet (Tag 8)</name>

<t>The Compressed Data packet contains compressed data.
Typically, this packet is found as the contents of an encrypted packet, or following a Signature or One-Pass Signature packet, and contains a literal data packet.</t>

<t>The body of this packet consists of:</t>

<t><list style="symbols">
  <t>One octet that gives the algorithm used to compress the packet.</t>
  <t>Compressed data, which makes up the remainder of the packet.</t>
</list></t>

<t>A Compressed Data Packet's body contains an block that compresses some set of packets.
See <xref target="packet-composition"/> for details on how messages are formed.</t>

<t>ZIP-compressed packets are compressed with raw <xref target="RFC1951"/> DEFLATE blocks.</t>

<t>ZLIB-compressed packets are compressed with <xref target="RFC1950"/> ZLIB-style blocks.</t>

<t>BZip2-compressed packets are compressed using the BZip2 <xref target="BZ2"/> algorithm.</t>

<t>An implementation that generates a Compressed Data packet <bcp14>MUST</bcp14> use the non-legacy format for packet framing (see <xref target="openpgp-packet-format"/>).
It <bcp14>MUST NOT</bcp14> generate a Compressed Data packet with Legacy format (<xref target="legacy-packet-format"/>)</t>

<t>An implementation that deals with either historic data or data generated by legacy implementations <bcp14>MAY</bcp14> interpret Compressed Data packets that use the Legacy format for packet framing.</t>

</section>
<section anchor="sed"><name>Symmetrically Encrypted Data Packet (Tag 9)</name>

<t>The Symmetrically Encrypted Data packet contains data encrypted with a symmetric-key algorithm.
When it has been decrypted, it contains other packets (usually a literal data packet or compressed data packet, but in theory other Symmetrically Encrypted Data packets or sequences of packets that form whole OpenPGP messages).</t>

<t>This packet is obsolete.
An implementation <bcp14>MUST NOT</bcp14> create this packet.
An implementation <bcp14>MAY</bcp14> process such a packet but it <bcp14>MUST</bcp14> return a clear diagnostic that a non-integrity protected packet has been processed.
The implementation <bcp14>SHOULD</bcp14> also return an error in this case and stop processing.</t>

<t>This packet format is impossible to handle safely in general because the ciphertext it provides is malleable.
See <xref target="ciphertext-malleability"/> about selecting a better OpenPGP encryption container that does not have this flaw.</t>

<t>The body of this packet consists of:</t>

<t><list style="symbols">
  <t>Encrypted data, the output of the selected symmetric-key cipher operating in OpenPGP's variant of Cipher Feedback (CFB) mode.</t>
</list></t>

<t>The symmetric cipher used may be specified in a Public-Key or Symmetric-Key Encrypted Session Key packet that precedes the Symmetrically Encrypted Data packet.
In that case, the cipher algorithm octet is prefixed to the session key before it is encrypted.
If no packets of these types precede the encrypted data, the IDEA algorithm is used with the session key calculated as the MD5 hash of the passphrase, though this use is deprecated.</t>

<t>The data is encrypted in CFB mode, with a CFB shift size equal to the cipher's block size.
The Initial Vector (IV) is specified as all zeros.
Instead of using an IV, OpenPGP prefixes a string of length equal to the block size of the cipher plus two to the data before it is encrypted.
The first block-size octets (for example, 8 octets for a 64-bit block length) are random, and the following two octets are copies of the last two octets of the IV.
For example, in an 8-octet block, octet 9 is a repeat of octet 7, and octet 10 is a repeat of octet 8.
In a cipher of length 16, octet 17 is a repeat of octet 15 and octet 18 is a repeat of octet 16.
As a pedantic clarification, in both these examples, we consider the first octet to be numbered 1.</t>

<t>After encrypting the first block-size-plus-two octets, the CFB state is resynchronized.
The last block-size octets of ciphertext are passed through the cipher and the block boundary is reset.</t>

<t>The repetition of 16 bits in the random data prefixed to the message allows the receiver to immediately check whether the session key is incorrect.
See <xref target="quick-check-oracle"/> for hints on the proper use of this "quick check".</t>

</section>
<section anchor="marker-packet"><name>Marker Packet (Tag 10)</name>

<t>The body of this packet consists of:</t>

<t><list style="symbols">
  <t>The three octets 0x50, 0x47, 0x50 (which spell "PGP" in UTF-8).</t>
</list></t>

<t>Such a packet <bcp14>MUST</bcp14> be ignored when received.</t>

</section>
<section anchor="literal-data-packet-tag-11"><name>Literal Data Packet (Tag 11)</name>

<t>A Literal Data packet contains the body of a message; data that is not to be further interpreted.</t>

<t>The body of this packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet field that describes how the data is formatted.  <vspace blankLines='1'/>
If it is a <spanx style="verb">b</spanx> (0x62), then the Literal packet contains binary data.
If it is a <spanx style="verb">u</spanx> (0x75), then the Literal packet contains UTF-8-encoded text data, and thus may need line ends converted to local form, or other text mode changes.  <vspace blankLines='1'/>
Older versions of OpenPGP used <spanx style="verb">t</spanx> (0x74) to indicate textual data, but did not specify the character encoding.
Implementations <bcp14>SHOULD NOT</bcp14> emit this value.
An implementation that receives a literal data packet with this value in the format field <bcp14>SHOULD</bcp14> interpret the packet data as UTF-8 encoded text, unless reliable (not attacker-controlled) context indicates a specific alternate text encoding.
This mode is deprecated due to its ambiguity.  <vspace blankLines='1'/>
Early versions of PGP also defined a value of <spanx style="verb">l</spanx> as a 'local' mode for machine-local conversions.
<xref target="RFC1991"/> incorrectly stated this local mode flag as <spanx style="verb">1</spanx> (ASCII numeral one).
Both of these local modes are deprecated.</t>
  <t>File name as a string (one-octet length, followed by a file name).
This may be a zero-length string.
Commonly, if the source of the encrypted data is a file, this will be the name of the encrypted file.
An implementation <bcp14>MAY</bcp14> consider the file name in the Literal packet to be a more authoritative name than the actual file name.</t>
  <t>A four-octet number that indicates a date associated with the literal data.
Commonly, the date might be the modification date of a file, or the time the packet was created, or a zero that indicates no specific time.</t>
  <t>The remainder of the packet is literal data.  <vspace blankLines='1'/>
Text data <bcp14>MUST</bcp14> be encoded with UTF-8 (see <xref target="RFC3629"/>), and stored with &lt;CR&gt;&lt;LF&gt; text endings (that is, network-normal line endings).
These should be converted to native line endings by the receiving software.</t>
</list></t>

<t>Note that OpenPGP signatures do not include the formatting octet, the file name, and the date field of the literal packet in a signature hash and thus those fields are not protected against tampering in a signed document.
A receiving implementation <bcp14>MUST NOT</bcp14> treat those fields as though they were cryptographically secured by the surrounding signature either when representing them to the user or acting on them.</t>

<t>Due to their inherent malleability, an implementation that generates a literal data packet <bcp14>SHOULD</bcp14> avoid storing any significant data in these fields.
If the implementation is certain that the data is textual and is encoded with UTF-8 (for example, if it will follow this literal data packet with a signature packet of type 0x01 (see <xref target="signature-types"/>), it <bcp14>MAY</bcp14> set the format octet to <spanx style="verb">u</spanx>.
Otherwise, it <bcp14>SHOULD</bcp14> set the format octet to <spanx style="verb">b</spanx>.
It <bcp14>SHOULD</bcp14> set the filename to the empty string (encoded as a single zero octet), and the timestamp to zero (encoded as four zero octets).</t>

<t>An application that wishes to include such filesystem metadata within a signature is advised to sign an encapsulated archive (for example, <xref target="PAX"/>).</t>

<t>An implementation that generates a Literal Data packet <bcp14>MUST</bcp14> use the OpenPGP format for packet framing (see <xref target="openpgp-packet-format"/>).
It <bcp14>MUST NOT</bcp14> generate a Literal Data packet with Legacy format (<xref target="legacy-packet-format"/>)</t>

<t>An implementation that deals with either historic data or data generated by legacy implementations <bcp14>MAY</bcp14> interpret Literal Data packets that use the Legacy format for packet framing.</t>

<section anchor="special-filename-console-deprecated"><name>Special Filename _CONSOLE (Deprecated)</name>

<t>The Literal Data packet's filename field has a historical special case for the special name <spanx style="verb">_CONSOLE</spanx>.
When the filename field is <spanx style="verb">_CONSOLE</spanx>, the message is considered to be "for your eyes only".
This advises that the message data is unusually sensitive, and the receiving program should process it more carefully, perhaps avoiding storing the received data to disk, for example.</t>

<t>An OpenPGP deployment that generates literal data packets <bcp14>MUST NOT</bcp14> depend on this indicator being honored in any particular way.
It cannot be enforced, and the field itself is not covered by any cryptographic signature.</t>

<t>It is <bcp14>NOT RECOMMENDED</bcp14> to use this special filename in a newly-generated literal data packet.</t>

</section>
</section>
<section anchor="trust-packet-tag-12"><name>Trust Packet (Tag 12)</name>

<t>The Trust packet is used only within keyrings and is not normally exported.
Trust packets contain data that record the user's specifications of which key holders are trustworthy introducers, along with other information that implementing software uses for trust information.
The format of Trust packets is defined by a given implementation.</t>

<t>Trust packets <bcp14>SHOULD NOT</bcp14> be emitted to output streams that are transferred to other users, and they <bcp14>SHOULD</bcp14> be ignored on any input other than local keyring files.</t>

</section>
<section anchor="user-id-packet-tag-13"><name>User ID Packet (Tag 13)</name>

<t>A User ID packet consists of UTF-8 text that is intended to represent the name and email address of the key holder.
By convention, it includes an <xref target="RFC2822"/> mail name-addr, but there are no restrictions on its content.
The packet length in the header specifies the length of the User ID.</t>

</section>
<section anchor="user-attribute-packet"><name>User Attribute Packet (Tag 17)</name>

<t>The User Attribute packet is a variation of the User ID packet.
It is capable of storing more types of data than the User ID packet, which is limited to text.
Like the User ID packet, a User Attribute packet may be certified by the key owner ("self-signed") or any other key owner who cares to certify it.
Except as noted, a User Attribute packet may be used anywhere that a User ID packet may be used.</t>

<t>While User Attribute packets are not a required part of the OpenPGP standard, implementations <bcp14>SHOULD</bcp14> provide at least enough compatibility to properly handle a certification signature on the User Attribute packet.
A simple way to do this is by treating the User Attribute packet as a User ID packet with opaque contents, but an implementation may use any method desired.</t>

<t>The User Attribute packet is made up of one or more attribute subpackets.
Each subpacket consists of a subpacket header and a body.
The header consists of:</t>

<t><list style="symbols">
  <t>the subpacket length (1, 2, or 5 octets)</t>
  <t>the subpacket type (1 octet)</t>
</list></t>

<t>and is followed by the subpacket specific data.</t>

<t>The following table lists the currently known subpackets:</t>

<texttable title="User Attribute type registry">
      <ttcol align='right'>Type</ttcol>
      <ttcol align='left'>Attribute Subpacket</ttcol>
      <c>1</c>
      <c>Image Attribute Subpacket</c>
      <c>100-110</c>
      <c>Private/Experimental Use</c>
</texttable>

<t>An implementation <bcp14>SHOULD</bcp14> ignore any subpacket of a type that it does not recognize.</t>

<section anchor="uat-image"><name>The Image Attribute Subpacket</name>

<t>The Image Attribute subpacket is used to encode an image, presumably (but not required to be) that of the key owner.</t>

<t>The Image Attribute subpacket begins with an image header.
The first two octets of the image header contain the length of the image header.
Note that unlike other multi-octet numerical values in this document, due to a historical accident this value is encoded as a little-endian number.
The image header length is followed by a single octet for the image header version.
The only currently defined version of the image header is 1, which is a 16-octet image header.
The first three octets of a version 1 image header are thus 0x10, 0x00, 0x01.</t>

<t>The fourth octet of a version 1 image header designates the encoding format of the image.
The only currently defined encoding format is the value 1 to indicate JPEG.
Image format types 100 through 110 are reserved for private or experimental use.
The rest of the version 1 image header is made up of 12 reserved octets, all of which <bcp14>MUST</bcp14> be set to 0.</t>

<t>The rest of the image subpacket contains the image itself.
As the only currently defined image type is JPEG, the image is encoded in the JPEG File Interchange Format (JFIF), a standard file format for JPEG images <xref target="JFIF"/>.</t>

<t>An implementation <bcp14>MAY</bcp14> try to determine the type of an image by examination of the image data if it is unable to handle a particular version of the image header or if a specified encoding format value is not recognized.</t>

</section>
</section>
<section anchor="seipd"><name>Sym. Encrypted Integrity Protected Data Packet (Tag 18)</name>

<t>This packet contains integrity protected and encrypted data.
When it has been decrypted, it will contain other packets forming an OpenPGP Message (see <xref target="openpgp-messages"/>).</t>

<t>The first octet of this packet is always used to indicate the version number, but different versions contain differently-structured ciphertext.
Version 1 of this packet contains data encrypted with a symmetric-key algorithm and protected against modification by the SHA-1 hash algorithm.
This is a legacy OpenPGP mechanism that offers some protections against ciphertext malleability.</t>

<t>Version 2 of this packet contains data encrypted with an authenticated encryption and additional data (AEAD) construction.
This offers a more cryptographically rigorous defense against ciphertext malleability, but may not be as widely supported yet.
See <xref target="ciphertext-malleability"/> for more details on choosing between these formats.</t>

<section anchor="version-one-seipd"><name>Version 1 Sym. Encrypted Integrity Protected Data Packet Format</name>

<t>A version 1 Symmetrically Encrypted Integrity Protected Data packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number with value 1.</t>
  <t>Encrypted data, the output of the selected symmetric-key cipher operating in Cipher Feedback mode with shift amount equal to the block size of the cipher (CFB-n where n is the block size).</t>
</list></t>

<t>The symmetric cipher used <bcp14>MUST</bcp14> be specified in a Public-Key or Symmetric-Key Encrypted Session Key packet that precedes the Symmetrically Encrypted Integrity Protected Data packet.
In either case, the cipher algorithm octet is prefixed to the session key before it is encrypted.</t>

<t>The data is encrypted in CFB mode, with a CFB shift size equal to the cipher's block size.
The Initial Vector (IV) is specified as all zeros.
Instead of using an IV, OpenPGP prefixes an octet string to the data before it is encrypted.
The length of the octet string equals the block size of the cipher in octets, plus two.
The first octets in the group, of length equal to the block size of the cipher, are random; the last two octets are each copies of their 2nd preceding octet.
For example, with a cipher whose block size is 128 bits or 16 octets, the prefix data will contain 16 random octets, then two more octets, which are copies of the 15th and 16th octets, respectively.
Unlike the Symmetrically Encrypted Data Packet, no special CFB resynchronization is done after encrypting this prefix data.
See <xref target="cfb-mode"/> for more details.</t>

<t>The repetition of 16 bits in the random data prefixed to the message allows the receiver to immediately check whether the session key is incorrect.</t>

<t>Two constant octets with the values 0xD3 and 0x14 are appended to the plaintext.
Then, the plaintext of the data to be encrypted is passed through the SHA-1 hash function.
The input to the hash function includes the prefix data described above; it includes all of the plaintext, including the trailing constant octets 0xD3, 0x14.
The 20 octets of the SHA-1 hash are then appended to the plaintext (after the constant octets 0xD3, 0x14) and encrypted along with the plaintext using the same CFB context.
This trailing checksum is known as the Modification Detection Code (MDC).</t>

<t>During decryption, the plaintext data should be hashed with SHA-1, including the prefix data as well as the trailing constant octets 0xD3, 0x14, but excluding the last 20 octets containing the SHA-1 hash.
The computed SHA-1 hash is then compared with the last 20 octets of plaintext.
A mismatch of the hash indicates that the message has been modified and <bcp14>MUST</bcp14> be treated as a security problem.
Any failure <bcp14>SHOULD</bcp14> be reported to the user.</t>

<t><list style='empty'>
  <t>NON-NORMATIVE EXPLANATION</t>

  <t>The Modification Detection Code (MDC) system, as the integrity
  protection mechanism of version 1 of the Symmetrically Encrypted
  Integrity Protected Data packet is called, was created to
  provide an integrity mechanism that is less strong than a
  signature, yet stronger than bare CFB encryption.</t>

  <t>It is a limitation of CFB encryption that damage to the ciphertext
  will corrupt the affected cipher blocks and the block following.
  Additionally, if data is removed from the end of a CFB-encrypted
  block, that removal is undetectable.  (Note also that CBC mode has
  a similar limitation, but data removed from the front of the block
  is undetectable.)</t>

  <t>The obvious way to protect or authenticate an encrypted block is
  to digitally sign it.  However, many people do not wish to
  habitually sign data, for a large number of reasons beyond the
  scope of this document.  Suffice it to say that many people
  consider properties such as deniability to be as valuable as
  integrity.</t>

  <t>OpenPGP addresses this desire to have more security than raw
  encryption and yet preserve deniability with the MDC system.  An
  MDC is intentionally not a MAC.  Its name was not selected by
  accident.  It is analogous to a checksum.</t>

  <t>Despite the fact that it is a relatively modest system, it has
  proved itself in the real world.  It is an effective defense to
  several attacks that have surfaced since it has been created.  It
  has met its modest goals admirably.</t>

  <t>Consequently, because it is a modest security system, it has
  modest requirements on the hash function(s) it employs.  It does
  not rely on a hash function being collision-free, it relies on a
  hash function being one-way.  If a forger, Frank, wishes to send
  Alice a (digitally) unsigned message that says, "I've always
  secretly loved you, signed Bob", it is far easier for him to
  construct a new message than it is to modify anything intercepted
  from Bob.  (Note also that if Bob wishes to communicate secretly
  with Alice, but without authentication or identification and with
  a threat model that includes forgers, he has a problem that
  transcends mere cryptography.)</t>

  <t>Note also that unlike nearly every other OpenPGP subsystem, there
  are no parameters in the MDC system.  It hard-defines SHA-1 as its
  hash function.  This is not an accident.  It is an intentional
  choice to avoid downgrade and cross-grade attacks while making a
  simple, fast system.  (A downgrade attack would be an attack that
  replaced SHA2-256 with SHA-1, for example.  A cross-grade attack
  would replace SHA-1 with another 160-bit hash, such as
  RIPEMD-160, for example.)</t>

  <t>However, no update will be needed because the MDC has been replaced
  by the AEAD encryption described in this document.</t>
</list></t>

</section>
<section anchor="version-two-seipd"><name>Version 2 Sym. Encrypted Integrity Protected Data Packet Format</name>

<t>A version 2 Symmetrically Encrypted Integrity Protected Data packet consists of:</t>

<t><list style="symbols">
  <t>A one-octet version number with value 2.</t>
  <t>A one-octet cipher algorithm.</t>
  <t>A one-octet AEAD algorithm.</t>
  <t>A one-octet chunk size.</t>
  <t>Thirty-two octets of salt.
The salt is used to derive the message key and must be unique.</t>
  <t>Encrypted data, the output of the selected symmetric-key cipher operating in the given AEAD mode.</t>
  <t>A final, summary authentication tag for the AEAD mode.</t>
</list></t>

<t>The decrypted session key and the salt are used to derive an M-bit message key and N-64 bits used as initialization vector, where M is the key size of the symmetric algorithm and N is the nonce size of the AEAD algorithm.
M + N - 64 bits are derived using HKDF (see <xref target="RFC5869"/>).
The left-most M bits are used as symmetric algorithm key, the remaining N - 64 bits are used as initialization vector.
HKDF is used with SHA256 as hash algorithm, the session key as Initial Keying Material (IKM), the salt as salt, and the Packet Tag in OpenPGP format encoding (bits 7 and 6 set, bits 5-0 carry the packet tag), version number, cipher algorithm octet, AEAD algorithm octet, and chunk size octet as info parameter.</t>

<t>The KDF mechanism provides key separation between cipher and AEAD algorithms.
Furthermore, an implementation can securely reply to a message even if a recipients certificate is unknown by reusing the encrypted session key packets and replying with a different salt yielding a new, unique message key.</t>

<t>A v2 SEIPD packet consists of one or more chunks of data.
The plaintext of each chunk is of a size specified using the chunk size octet using the method specified below.</t>

<t>The encrypted data consists of the encryption of each chunk of plaintext, followed immediately by the relevant authentication tag.
If the last chunk of plaintext is smaller than the chunk size, the ciphertext for that data may be shorter; it is nevertheless followed by a full authentication tag.</t>

<t>For each chunk, the AEAD construction is given the Packet Tag in OpenPGP format encoding (bits 7 and 6 set, bits 5-0 carry the packet tag), version number, cipher algorithm octet, AEAD algorithm octet, and chunk size octet as additional data.
For example, the additional data of the first chunk using EAX and AES-128 with a chunk size of 2**16 octets consists of the octets 0xD2, 0x02, 0x07, 0x01, and 0x10.</t>

<t>After the final chunk, the AEAD algorithm is used to produce a final authentication tag encrypting the empty string.
This AEAD instance is given the additional data specified above, plus an eight-octet, big-endian value specifying the total number of plaintext octets encrypted.
This allows detection of a truncated ciphertext.</t>

<t>The chunk size octet specifies the size of chunks using the following formula (in C), where c is the chunk size octet:</t>

<figure><artwork><![CDATA[
  chunk_size = ((uint64_t)1 << (c + 6))
]]></artwork></figure>

<t>An implementation <bcp14>MUST</bcp14> accept chunk size octets with values from 0 to 16.
An implementation <bcp14>MUST NOT</bcp14> create data with a chunk size octet value larger than 16 (4 MiB chunks).</t>

<t>The nonce for AEAD mode consists of two parts.
Let N be the size of the nonce.
The left-most N - 64 bits are the initialization vector derived using HKDF.
The right-most 64 bits are the chunk index as big-endian value.
The index of the first chunk is zero.</t>

</section>
<section anchor="eax-mode"><name>EAX Mode</name>

<t>The EAX AEAD Algorithm used in this document is defined in <xref target="EAX"/>.</t>

<t>The EAX algorithm can only use block ciphers with 16-octet blocks.
The nonce is 16 octets long.
EAX authentication tags are 16 octets long.</t>

</section>
<section anchor="ocb-mode"><name>OCB Mode</name>

<t>The OCB AEAD Algorithm used in this document is defined in <xref target="RFC7253"/>.</t>

<t>The OCB algorithm can only use block ciphers with 16-octet blocks.
The nonce is 15 octets long.
OCB authentication tags are 16 octets long.</t>

</section>
<section anchor="gcm-mode"><name>GCM Mode</name>

<t>The GCM AEAD Algorithm used in this document is defined in <xref target="SP800-38D"/>.</t>

<t>The GCM algorithm can only use block ciphers with 16-octet blocks.
The nonce is 12 octets long.
GCM authentication tags are 16 octets long.</t>

</section>
</section>
<section anchor="padding-packet"><name>Padding Packet (Tag 21)</name>

<t>The Padding packet contains random data, and can be used to defend against traffic analysis (see <xref target="traffic-analysis"/>) on version 2 SEIPD messages (see <xref target="version-two-seipd"/>) and Transferable Public Keys (see <xref target="transferable-public-keys"/>).</t>

<t>Such a packet <bcp14>MUST</bcp14> be ignored when received.</t>

<t>Its contents <bcp14>SHOULD</bcp14> be random octets to make the length obfuscation it provides more robust even when compressed.</t>

<t>An implementation adding padding to an OpenPGP stream <bcp14>SHOULD</bcp14> place such a packet:</t>

<t><list style="symbols">
  <t>At the end of a v5 Transferable Public Key that is transferred over an encrypted channel (see <xref target="transferable-public-keys"/>).</t>
  <t>As the last packet of an Optionally Padded Message within a version 2 Symmetrically Encrypted Integrity Protected Data Packet (see <xref target="unwrapping"/>).</t>
</list></t>

<t>An implementation <bcp14>MUST</bcp14> be able to process padding packets anywhere else in an OpenPGP stream, so that future revisions of this document may specify further locations for padding.</t>

<t>Policy about how large to make such a packet to defend against traffic analysis is beyond the scope of this document.</t>

</section>
</section>
<section anchor="radix-64-conversions"><name>Radix-64 Conversions</name>

<t>As stated in the introduction, OpenPGP's underlying native representation for objects is a stream of arbitrary octets, and some systems desire these objects to be immune to damage caused by character set translation, data conversions, etc.</t>

<t>In principle, any printable encoding scheme that met the requirements of the unsafe channel would suffice, since it would not change the underlying binary bit streams of the native OpenPGP data structures.
The OpenPGP standard specifies one such printable encoding scheme to ensure interoperability.</t>

<t>OpenPGP's Radix-64 encoding is composed of two parts: a base64 encoding of the binary data and an optional checksum.
The base64 encoding is identical to the MIME base64 content-transfer-encoding <xref target="RFC2045"/>.</t>

<section anchor="optional-crc24"><name>Optional checksum</name>

<t>The optional checksum is a 24-bit Cyclic Redundancy Check (CRC) converted to four characters of radix-64 encoding by the same MIME base64 transformation, preceded by an equal sign (=).
The CRC is computed by using the generator 0x864CFB and an initialization of 0xB704CE.
The accumulation is done on the data before it is converted to radix-64, rather than on the converted data.
A sample implementation of this algorithm is in <xref target="sample-crc24"/>.</t>

<t>If present, the checksum with its leading equal sign <bcp14>MUST</bcp14> appear on the next line after the base64 encoded data.</t>

<t>An implementation <bcp14>MUST NOT</bcp14> reject an OpenPGP object when the CRC24 footer is present, missing, malformed, or disagrees with the computed CRC24 sum.
When forming ASCII Armor, the CRC24 footer <bcp14>SHOULD NOT</bcp14> be generated, unless interoperability with implementations that require the CRC24 footer to be present is a concern.</t>

<t>The CRC24 footer <bcp14>MUST NOT</bcp14> be generated if it can be determined by context or by the OpenPGP object being encoded that the consuming implementation accepts Radix-64 encoded blocks without CRC24 footer.
Notably:</t>

<t><list style="symbols">
  <t>An ASCII-armored Encrypted Message packet sequence that ends in an v2 SEIPD packet <bcp14>MUST NOT</bcp14> contain a CRC24 footer.</t>
  <t>An ASCII-armored sequence of Signature packets that only includes v5 Signature packets <bcp14>MUST NOT</bcp14> contain a CRC24 footer.</t>
  <t>An ASCII-armored Transferable Public Key packet sequence of a v5 key <bcp14>MUST NOT</bcp14> contain a CRC24 footer.</t>
  <t>An ASCII-armored keyring consisting of only v5 keys <bcp14>MUST NOT</bcp14> contain a CRC24 footer.</t>
</list></t>

<t>Rationale:
Previous versions of this document state that the CRC24 footer is optional, but the text was ambiguous.
In practice, very few implementations require the CRC24 footer to be present.
Computing the CRC24 incurs a significant cost, while providing no meaningful integrity protection.
Therefore, generating it is now discouraged.</t>

<section anchor="sample-crc24"><name>An Implementation of the CRC-24 in "C"</name>

<figure><sourcecode type="text/x-csrc" name="sample-crc24.c"><![CDATA[
#define CRC24_INIT 0xB704CEL
#define CRC24_GENERATOR 0x864CFBL

typedef unsigned long crc24;
crc24 crc_octets(unsigned char *octets, size_t len)
{
    crc24 crc = CRC24_INIT;
    int i;
    while (len--) {
        crc ^= (*octets++) << 16;
        for (i = 0; i < 8; i++) {
            crc <<= 1;
            if (crc & 0x1000000) {
                crc &= 0xffffff; /* Clear bit 25 to avoid overflow */
                crc ^= CRC24_GENERATOR;
            }
        }
    }
    return crc & 0xFFFFFFL;
}
]]></sourcecode></figure>

</section>
</section>
<section anchor="forming-ascii-armor"><name>Forming ASCII Armor</name>

<t>When OpenPGP encodes data into ASCII Armor, it puts specific headers around the Radix-64 encoded data, so OpenPGP can reconstruct the data later.
An OpenPGP implementation <bcp14>MAY</bcp14> use ASCII armor to protect raw binary data.
OpenPGP informs the user what kind of data is encoded in the ASCII armor through the use of the headers.</t>

<t>Concatenating the following data creates ASCII Armor:</t>

<t><list style="symbols">
  <t>An Armor Header Line, appropriate for the type of data</t>
  <t>Armor Headers</t>
  <t>A blank (zero-length, or containing only whitespace) line</t>
  <t>The ASCII-Armored data</t>
  <t>An optional Armor Checksum (discouraged, see <xref target="optional-crc24"/>)</t>
  <t>The Armor Tail, which depends on the Armor Header Line</t>
</list></t>

<t>An Armor Header Line consists of the appropriate header line text surrounded by five (5) dashes (<spanx style="verb">-</spanx>, 0x2D) on either side of the header line text.
The header line text is chosen based upon the type of data that is being encoded in Armor, and how it is being encoded.
Header line texts include the following strings:</t>

<dl newline="true">
  <dt>
BEGIN PGP MESSAGE  </dt>
  <dd>
    <t>Used for signed, encrypted, or compressed files.</t>
  </dd>
  <dt>
BEGIN PGP PUBLIC KEY BLOCK  </dt>
  <dd>
    <t>Used for armoring public keys.</t>
  </dd>
  <dt>
BEGIN PGP PRIVATE KEY BLOCK  </dt>
  <dd>
    <t>Used for armoring private keys.</t>
  </dd>
  <dt>
BEGIN PGP SIGNATURE  </dt>
  <dd>
    <t>Used for detached signatures, OpenPGP/MIME signatures, and cleartext signatures.</t>
  </dd>
</dl>

<t>Note that all these Armor Header Lines are to consist of a complete line.
The header lines, therefore, <bcp14>MUST</bcp14> start at the beginning of a line, and <bcp14>MUST NOT</bcp14> have text other than whitespace following them on the same line.
These line endings are considered a part of the Armor Header Line for the purposes of determining the content they delimit.
This is particularly important when computing a cleartext signature (see <xref target="cleartext-signature"/>).</t>

<t>The Armor Headers are pairs of strings that can give the user or the receiving OpenPGP implementation some information about how to decode or use the message.
The Armor Headers are a part of the armor, not a part of the message, and hence are not protected by any signatures applied to the message.</t>

<t>The format of an Armor Header is that of a key-value pair.
A colon (<spanx style="verb">:</spanx> 0x38) and a single space (0x20) separate the key and value.
An OpenPGP implementation may consider improperly formatted Armor Headers to be corruption of the ASCII Armor, but <bcp14>SHOULD</bcp14> make an effort to recover.
Unknown keys should be silently ignored, and an OpenPGP implementation <bcp14>SHOULD</bcp14> continue to process the message.</t>

<t>Note that some transport methods are sensitive to line length.
While there is a limit of 76 characters for the Radix-64 data (<xref target="encoding-binary-radix64"/>), there is no limit to the length of Armor Headers.
Care should be taken that the Armor Headers are short enough to survive transport.
One way to do this is to repeat an Armor Header Key multiple times with different values for each so that no one line is overly long.</t>

<t>Currently defined Armor Header Keys are as follows:</t>

<t><list style="symbols">
  <t>"Version", which states the OpenPGP implementation and version used to encode the message.
To minimize metadata, implementations <bcp14>SHOULD NOT</bcp14> emit this key and its corresponding value except for debugging purposes with explicit user consent.</t>
  <t>"Comment", a user-defined comment.
OpenPGP defines all text to be in UTF-8.
A comment may be any UTF-8 string.
However, the whole point of armoring is to provide seven-bit-clean data.
Consequently, if a comment has characters that are outside the US-ASCII range of UTF, they may very well not survive transport.</t>
  <t>"Hash", a comma-separated list of hash algorithms used in this message.
This is used only in cleartext signed messages.</t>
  <t>"SaltedHash", a salt and hash algorithm used in this message.
This is used only in cleartext signed messages that are followed by a v5 Signature.</t>
  <t>"Charset", a description of the character set that the plaintext is in.
Please note that OpenPGP defines text to be in UTF-8.
An implementation will get best results by translating into and out of UTF-8.
However, there are many instances where this is easier said than done.
Also, there are communities of users who have no need for UTF-8 because they are all happy with a character set like ISO Latin-5 or a Japanese character set.
In such instances, an implementation <bcp14>MAY</bcp14> override the UTF-8 default by using this header key.
An implementation <bcp14>MAY</bcp14> implement this key and any translations it cares to; an implementation <bcp14>MAY</bcp14> ignore it and assume all text is UTF-8.</t>
</list></t>

<t>The Armor Tail Line is composed in the same manner as the Armor Header Line, except the string "BEGIN" is replaced by the string "END".</t>

</section>
<section anchor="encoding-binary-radix64"><name>Encoding Binary in Radix-64</name>

<t>The encoding process represents 24-bit groups of input bits as output strings of 4 encoded characters.
Proceeding from left to right, a 24-bit input group is formed by concatenating three 8-bit input groups.
These 24 bits are then treated as four concatenated 6-bit groups, each of which is translated into a single digit in the Radix-64 alphabet.
When encoding a bit stream with the Radix-64 encoding, the bit stream must be presumed to be ordered with the most significant bit first.
That is, the first bit in the stream will be the high-order bit in the first 8-bit octet, and the eighth bit will be the low-order bit in the first 8-bit octet, and so on.</t>

<figure><artwork><![CDATA[
┌──first octet──┬─second octet──┬──third octet──┐
│7 6 5 4 3 2 1 0│7 6 5 4 3 2 1 0│7 6 5 4 3 2 1 0│
├───────────┬───┴───────┬───────┴───┬───────────┤
│5 4 3 2 1 0│5 4 3 2 1 0│5 4 3 2 1 0│5 4 3 2 1 0│
└──1.index──┴──2.index──┴──3.index──┴──4.index──┘
]]></artwork></figure>

<t>Each 6-bit group is used as an index into an array of 64 printable characters from the table below.
The character referenced by the index is placed in the output string.</t>

<texttable title="Encoding for Radix-64">
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Encoding</ttcol>
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Encoding</ttcol>
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Encoding</ttcol>
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Encoding</ttcol>
      <c>0</c>
      <c>A</c>
      <c>&#160;</c>
      <c>17</c>
      <c>R</c>
      <c>&#160;</c>
      <c>34</c>
      <c>i</c>
      <c>&#160;</c>
      <c>51</c>
      <c>z</c>
      <c>1</c>
      <c>B</c>
      <c>&#160;</c>
      <c>18</c>
      <c>S</c>
      <c>&#160;</c>
      <c>35</c>
      <c>j</c>
      <c>&#160;</c>
      <c>52</c>
      <c>0</c>
      <c>2</c>
      <c>C</c>
      <c>&#160;</c>
      <c>19</c>
      <c>T</c>
      <c>&#160;</c>
      <c>36</c>
      <c>k</c>
      <c>&#160;</c>
      <c>53</c>
      <c>1</c>
      <c>3</c>
      <c>D</c>
      <c>&#160;</c>
      <c>20</c>
      <c>U</c>
      <c>&#160;</c>
      <c>37</c>
      <c>l</c>
      <c>&#160;</c>
      <c>54</c>
      <c>2</c>
      <c>4</c>
      <c>E</c>
      <c>&#160;</c>
      <c>21</c>
      <c>V</c>
      <c>&#160;</c>
      <c>38</c>
      <c>m</c>
      <c>&#160;</c>
      <c>55</c>
      <c>3</c>
      <c>5</c>
      <c>F</c>
      <c>&#160;</c>
      <c>22</c>
      <c>W</c>
      <c>&#160;</c>
      <c>39</c>
      <c>n</c>
      <c>&#160;</c>
      <c>56</c>
      <c>4</c>
      <c>6</c>
      <c>G</c>
      <c>&#160;</c>
      <c>23</c>
      <c>X</c>
      <c>&#160;</c>
      <c>40</c>
      <c>o</c>
      <c>&#160;</c>
      <c>57</c>
      <c>5</c>
      <c>7</c>
      <c>H</c>
      <c>&#160;</c>
      <c>24</c>
      <c>Y</c>
      <c>&#160;</c>
      <c>41</c>
      <c>p</c>
      <c>&#160;</c>
      <c>58</c>
      <c>6</c>
      <c>8</c>
      <c>I</c>
      <c>&#160;</c>
      <c>25</c>
      <c>Z</c>
      <c>&#160;</c>
      <c>42</c>
      <c>q</c>
      <c>&#160;</c>
      <c>59</c>
      <c>7</c>
      <c>9</c>
      <c>J</c>
      <c>&#160;</c>
      <c>26</c>
      <c>a</c>
      <c>&#160;</c>
      <c>43</c>
      <c>r</c>
      <c>&#160;</c>
      <c>60</c>
      <c>8</c>
      <c>10</c>
      <c>K</c>
      <c>&#160;</c>
      <c>27</c>
      <c>b</c>
      <c>&#160;</c>
      <c>44</c>
      <c>s</c>
      <c>&#160;</c>
      <c>61</c>
      <c>9</c>
      <c>11</c>
      <c>L</c>
      <c>&#160;</c>
      <c>28</c>
      <c>c</c>
      <c>&#160;</c>
      <c>45</c>
      <c>t</c>
      <c>&#160;</c>
      <c>62</c>
      <c>+</c>
      <c>12</c>
      <c>M</c>
      <c>&#160;</c>
      <c>29</c>
      <c>d</c>
      <c>&#160;</c>
      <c>46</c>
      <c>u</c>
      <c>&#160;</c>
      <c>63</c>
      <c>/</c>
      <c>13</c>
      <c>N</c>
      <c>&#160;</c>
      <c>30</c>
      <c>e</c>
      <c>&#160;</c>
      <c>47</c>
      <c>v</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>14</c>
      <c>O</c>
      <c>&#160;</c>
      <c>31</c>
      <c>f</c>
      <c>&#160;</c>
      <c>48</c>
      <c>w</c>
      <c>&#160;</c>
      <c>(pad)</c>
      <c>=</c>
      <c>15</c>
      <c>P</c>
      <c>&#160;</c>
      <c>32</c>
      <c>g</c>
      <c>&#160;</c>
      <c>49</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>16</c>
      <c>Q</c>
      <c>&#160;</c>
      <c>33</c>
      <c>h</c>
      <c>&#160;</c>
      <c>50</c>
      <c>y</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
</texttable>

<t>The encoded output stream must be represented in lines of no more than 76 characters each.</t>

<t>Special processing is performed if fewer than 24 bits are available at the end of the data being encoded.
There are three possibilities:</t>

<t><list style="numbers">
  <t>The last data group has 24 bits (3 octets).
No special processing is needed.</t>
  <t>The last data group has 16 bits (2 octets).
The first two 6-bit groups are processed as above.
The third (incomplete) data group has two zero-value bits added to it, and is processed as above.
A pad character (=) is added to the output.</t>
  <t>The last data group has 8 bits (1 octet).
The first 6-bit group is processed as above.
The second (incomplete) data group has four zero-value bits added to it, and is processed as above.
Two pad characters (=) are added to the output.</t>
</list></t>

</section>
<section anchor="decoding-radix-64"><name>Decoding Radix-64</name>

<t>In Radix-64 data, characters other than those in the table, line breaks, and other white space probably indicate a transmission error, about which a warning message or even a message rejection might be appropriate under some circumstances.
Decoding software must ignore all white space.</t>

<t>Because it is used only for padding at the end of the data, the occurrence of any "=" characters may be taken as evidence that the end of the data has been reached (without truncation in transit).
No such assurance is possible, however, when the number of octets transmitted was a multiple of three and no "=" characters are present.</t>

</section>
<section anchor="examples-of-radix-64"><name>Examples of Radix-64</name>

<figure><artwork><![CDATA[
Input data:  0x14FB9C03D97E
Hex:     1   4    F   B    9   C     | 0   3    D   9    7   E
8-bit:   00010100 11111011 10011100  | 00000011 11011001 01111110
6-bit:   000101 001111 101110 011100 | 000000 111101 100101 111110
Decimal: 5      15     46     28       0      61     37     62
Output:  F      P      u      c        A      9      l      +
Input data:  0x14FB9C03D9
Hex:     1   4    F   B    9   C     | 0   3    D   9
8-bit:   00010100 11111011 10011100  | 00000011 11011001
                                                pad with 00
6-bit:   000101 001111 101110 011100 | 000000 111101 100100
Decimal: 5      15     46     28       0      61     36
                                                   pad with =
Output:  F      P      u      c        A      9      k      =
Input data:  0x14FB9C03
Hex:     1   4    F   B    9   C     | 0   3
8-bit:   00010100 11111011 10011100  | 00000011
                                       pad with 0000
6-bit:   000101 001111 101110 011100 | 000000 110000
Decimal: 5      15     46     28       0      48
                                            pad with =      =
Output:  F      P      u      c        A      w      =      =
]]></artwork></figure>

</section>
<section anchor="example-of-an-ascii-armored-message"><name>Example of an ASCII Armored Message</name>

<figure><artwork><![CDATA[
-----BEGIN PGP MESSAGE-----

yDgBO22WxBHv7O8X7O/jygAEzol56iUKiXmV+XmpCtmpqQUKiQrFqclFqUDBovzS
vBSFjNSiVHsuAA==
-----END PGP MESSAGE-----
]]></artwork></figure>

<t>Note that this example has extra indenting; an actual armored message would have no leading whitespace.</t>

</section>
</section>
<section anchor="cleartext-signature"><name>Cleartext Signature Framework</name>

<t>It is desirable to be able to sign a textual octet stream without ASCII armoring the stream itself, so the signed text is still readable without special software.
In order to bind a signature to such a cleartext, this framework is used, which follows the same basic format and restrictions as the ASCII armoring described in <xref target="forming-ascii-armor"/>.
(Note that this framework is not intended to be reversible.
<xref target="RFC3156"/> defines another way to sign cleartext messages for environments that support MIME.)</t>

<t>The cleartext signed message consists of:</t>

<t><list style="symbols">
  <t>The cleartext header <spanx style="verb">-----BEGIN PGP SIGNED MESSAGE-----</spanx> on a single line,</t>
  <t>If the message is signed using v3 or v4 Signatures, one or more "Hash" Armor Headers,</t>
  <t>If the message is signed using v5 Signatures, one or more "SaltedHash" Armor Headers,</t>
  <t>Exactly one empty line not included into the message digest,</t>
  <t>The dash-escaped cleartext that is included into the message digest,</t>
  <t>The ASCII armored signature(s) including the <spanx style="verb">-----BEGIN PGP SIGNATURE-----</spanx> Armor Header and Armor Tail Lines.</t>
</list></t>

<t>If the "Hash" Armor Header is given, the specified message digest algorithm(s) are used for the signature.
If more than one message digest is used in the signatures, each digest algorithm has to be specified.
To that end, the "Hash" Armor Header contains a comma-delimited list of used message digests, and the "Hash" Armor Header can be given multiple times.</t>

<t>If the "SaltedHash" Armor Header is given, the specified message digest algorithm and salt are used for a signature.
The message digest name is followed by a colon (<spanx style="verb">:</spanx>) followed by 22 characters of Radix-64 encoded salt without padding.
Note: The "SaltedHash" Armor Header contains digest algorithm and salt for a single signature; a second signature requires a second "SaltedHash" Armor Header.</t>

<t>If neither a "Hash" nor a "SaltedHash" Armor Header is given, or the message digest algorithms (and salts) used in the signatures do not match the information in the headers, the signature <bcp14>MUST</bcp14> be considered invalid.</t>

<t>Current message digest names are described with the algorithm IDs in <xref target="hash-algos"/>.</t>

<t>An implementation <bcp14>SHOULD</bcp14> add a line break after the cleartext, but <bcp14>MAY</bcp14> omit it if the cleartext ends with a line break.
This is for visual clarity.</t>

<section anchor="dash-escaped-text"><name>Dash-Escaped Text</name>

<t>The cleartext content of the message must also be dash-escaped.</t>

<t>Dash-escaped cleartext is the ordinary cleartext where every line starting with a <u>-</u> is prefixed by the sequence <u>-</u> and <u> </u>.
This prevents the parser from recognizing armor headers of the cleartext itself.
An implementation <bcp14>MAY</bcp14> dash-escape any line, <bcp14>SHOULD</bcp14> dash-escape lines commencing "From" followed by a space, and <bcp14>MUST</bcp14> dash-escape any line commencing in a dash.
The message digest is computed using the cleartext itself, not the dash-escaped form.</t>

<t>As with binary signatures on text documents, a cleartext signature is calculated on the text using canonical &lt;CR&gt;&lt;LF&gt; line endings.
The line ending (that is, the &lt;CR&gt;&lt;LF&gt;) before the <spanx style="verb">-----BEGIN PGP SIGNATURE-----</spanx> line that terminates the signed text is not considered part of the signed text.</t>

<t>When reversing dash-escaping, an implementation <bcp14>MUST</bcp14> strip the string <spanx style="verb">- </spanx> if it occurs at the beginning of a line, and <bcp14>SHOULD</bcp14> warn on <spanx style="verb">-</spanx> and any character other than a space at the beginning of a line.</t>

<t>Also, any trailing whitespace --- spaces (0x20) and tabs (0x09) --- at the end of any line is removed when the cleartext signature is generated.</t>

</section>
</section>
<section anchor="regular-expressions"><name>Regular Expressions</name>

<t>A regular expression is zero or more branches, separated by <spanx style="verb">|</spanx>.
It matches anything that matches one of the branches.</t>

<t>A branch is zero or more pieces, concatenated.
It matches a match for the first, followed by a match for the second, etc.</t>

<t>A piece is an atom possibly followed by <spanx style="verb">*</spanx>, <spanx style="verb">+</spanx>, or <spanx style="verb">?</spanx>.
An atom followed by <spanx style="verb">*</spanx> matches a sequence of 0 or more matches of the atom.
An atom followed by <spanx style="verb">+</spanx> matches a sequence of 1 or more matches of the atom.
An atom followed by <spanx style="verb">?</spanx> matches a match of the atom, or the null string.</t>

<t>An atom is a regular expression in parentheses (matching a match for the regular expression), a range (see below), <spanx style="verb">.</spanx> (matching any single character), <spanx style="verb">^</spanx> (matching the null string at the beginning of the input string), <spanx style="verb">$</spanx> (matching the null string at the end of the input string), a <spanx style="verb">\</spanx> followed by a single character (matching that character), or a single character with no other significance (matching that character).</t>

<t>A range is a sequence of characters enclosed in <spanx style="verb">[]</spanx>.
It normally matches any single character from the sequence.
If the sequence begins with <spanx style="verb">^</spanx>, it matches any single character not from the rest of the sequence.
If two characters in the sequence are separated by <spanx style="verb">-</spanx>, this is shorthand for the full list of ASCII characters between them (for example, <spanx style="verb">[0-9]</spanx> matches any decimal digit).
To include a literal <spanx style="verb">]</spanx> in the sequence, make it the first character (following a possible <spanx style="verb">^</spanx>).
To include a literal <spanx style="verb">-</spanx>, make it the first or last character.</t>

</section>
<section anchor="constants"><name>Constants</name>

<t>This section describes the constants used in OpenPGP.</t>

<t>Note that these tables are not exhaustive lists; an implementation <bcp14>MAY</bcp14> implement an algorithm not on these lists, so long as the algorithm numbers are chosen from the private or experimental algorithm range.</t>

<t>See <xref target="notes-on-algorithms"/> for more discussion of the algorithms.</t>

<section anchor="pubkey-algos"><name>Public-Key Algorithms</name>

<texttable title="Public-key algorithm registry">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Public Key Format</ttcol>
      <ttcol align='left'>Secret Key Format</ttcol>
      <ttcol align='left'>Signature Format</ttcol>
      <ttcol align='left'>PKESK Format</ttcol>
      <c>1</c>
      <c>RSA (Encrypt or Sign) <xref target="HAC"/></c>
      <c>MPI(n), MPI(e) [<xref target="key-rsa"/>]</c>
      <c>MPI(d), MPI(p), MPI(q), MPI(u)</c>
      <c>MPI(m**d mod n) [<xref target="sig-rsa"/>]</c>
      <c>MPI(m**e mod n) [<xref target="pkesk-rsa"/>]</c>
      <c>2</c>
      <c>RSA Encrypt-Only <xref target="HAC"/></c>
      <c>MPI(n), MPI(e) [<xref target="key-rsa"/>]</c>
      <c>MPI(d), MPI(p), MPI(q), MPI(u)</c>
      <c>N/A</c>
      <c>MPI(m**e mod n) [<xref target="pkesk-rsa"/>]</c>
      <c>3</c>
      <c>RSA Sign-Only <xref target="HAC"/></c>
      <c>MPI(n), MPI(e) [<xref target="key-rsa"/>]</c>
      <c>MPI(d), MPI(p), MPI(q), MPI(u)</c>
      <c>MPI(m**d mod n) [<xref target="sig-rsa"/>]</c>
      <c>N/A</c>
      <c>16</c>
      <c>Elgamal (Encrypt-Only) <xref target="ELGAMAL"/> <xref target="HAC"/></c>
      <c>MPI(p), MPI(g), MPI(y) [<xref target="key-elgamal"/>]</c>
      <c>MPI(x)</c>
      <c>N/A</c>
      <c>MPI(g**k mod p), MPI (m * y**k mod p) [<xref target="pkesk-elgamal"/>]</c>
      <c>17</c>
      <c>DSA (Digital Signature Algorithm) <xref target="FIPS186"/> <xref target="HAC"/></c>
      <c>MPI(p), MPI(q), MPI(g), MPI(y) [<xref target="key-dsa"/>]</c>
      <c>MPI(x)</c>
      <c>MPI(r), MPI(s) [<xref target="sig-dsa"/>]</c>
      <c>N/A</c>
      <c>18</c>
      <c>ECDH public key algorithm</c>
      <c>OID, MPI(point in curve-specific point format), KDFParams [see <xref target="curve-specific-formats"/>, <xref target="key-ecdh"/>]</c>
      <c>MPI(value in curve-specific format) [<xref target="curve-specific-formats"/>]</c>
      <c>N/A</c>
      <c>MPI(point in curve-specific point format), size octet, encoded key [<xref target="curve-specific-formats"/>, <xref target="pkesk-ecdh"/>, <xref target="ecdh"/>]</c>
      <c>19</c>
      <c>ECDSA public key algorithm <xref target="FIPS186"/></c>
      <c>OID, MPI(point in SEC1 format) [<xref target="key-ecdsa"/>]</c>
      <c>MPI(value)</c>
      <c>MPI(r), MPI(s) [<xref target="sig-dsa"/>]</c>
      <c>N/A</c>
      <c>20</c>
      <c>Reserved (formerly Elgamal Encrypt or Sign)</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>21</c>
      <c>Reserved for Diffie-Hellman (X9.42, as defined for IETF-S/MIME)</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>22</c>
      <c>EdDSA  <xref target="RFC8032"/></c>
      <c>OID, MPI(point in prefixed native format) [see <xref target="ec-point-prefixed-native"/>, <xref target="key-eddsa"/>]</c>
      <c>MPI(value in curve-specific format) [see <xref target="curve-specific-formats"/>]</c>
      <c>MPI, MPI [see <xref target="curve-specific-formats"/>, <xref target="sig-eddsa"/>]</c>
      <c>N/A</c>
      <c>23</c>
      <c>Reserved (AEDH)</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>24</c>
      <c>Reserved (AEDSA)</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>100 to 110</c>
      <c>Private/Experimental algorithm</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
</texttable>

<t>Implementations <bcp14>MUST</bcp14> implement EdDSA (19) for signatures, and ECDH (18) for encryption.</t>

<t>RSA (1) keys are deprecated and <bcp14>SHOULD NOT</bcp14> be generated, but may be interpreted.
RSA Encrypt-Only (2) and RSA Sign-Only (3) are deprecated and <bcp14>MUST NOT</bcp14> be generated.
See <xref target="rsa-notes"/>.
Elgamal (16) keys are deprecated and <bcp14>MUST NOT</bcp14> be generated (see <xref target="elgamal-notes"/>).
DSA (17) keys are deprecated and <bcp14>MUST NOT</bcp14> be generated (see <xref target="dsa-notes"/>).
See <xref target="reserved-notes"/> for notes on Elgamal Encrypt or Sign (20), and X9.42 (21).
Implementations <bcp14>MAY</bcp14> implement any other algorithm.</t>

<t>Note that an implementation conforming to the previous version of this standard (<xref target="RFC4880"/>) have only DSA (17) and Elgamal (16) as its <bcp14>MUST</bcp14>-implement algorithms.</t>

<t>A compatible specification of ECDSA is given in <xref target="RFC6090"/> as "KT-I Signatures" and in <xref target="SEC1"/>; ECDH is defined in <xref target="ecdh"/> of this document.</t>

</section>
<section anchor="ec-curves"><name>ECC Curves for OpenPGP</name>

<t>The parameter curve OID is an array of octets that define a named curve.</t>

<t>The table below specifies the exact sequence of octets for each named curve referenced in this document.
It also specifies which public key algorithms the curve can be used with, as well as the size of expected elements in octets:</t>

<texttable title="ECC Curve OID and usage registry" anchor="ecc-oid-usage">
      <ttcol align='left'>ASN.1 Object Identifier</ttcol>
      <ttcol align='left'>OID len</ttcol>
      <ttcol align='left'>Curve OID octets in hexadecimal representation</ttcol>
      <ttcol align='left'>Curve name</ttcol>
      <ttcol align='left'>Usage</ttcol>
      <ttcol align='left'>Field Size (fsize)</ttcol>
      <c>1.2.840.10045.3.1.7</c>
      <c>8</c>
      <c>2A 86 48 CE 3D 03 01 07</c>
      <c>NIST P-256</c>
      <c>ECDSA, ECDH</c>
      <c>32</c>
      <c>1.3.132.0.34</c>
      <c>5</c>
      <c>2B 81 04 00 22</c>
      <c>NIST P-384</c>
      <c>ECDSA, ECDH</c>
      <c>48</c>
      <c>1.3.132.0.35</c>
      <c>5</c>
      <c>2B 81 04 00 23</c>
      <c>NIST P-521</c>
      <c>ECDSA, ECDH</c>
      <c>66</c>
      <c>1.3.36.3.3.2.8.1.1.7</c>
      <c>9</c>
      <c>2B 24 03 03 02 08 01 01 07</c>
      <c>brainpoolP256r1</c>
      <c>ECDSA, ECDH</c>
      <c>32</c>
      <c>1.3.36.3.3.2.8.1.1.11</c>
      <c>9</c>
      <c>2B 24 03 03 02 08 01 01 0B</c>
      <c>brainpoolP384r1</c>
      <c>ECDSA, ECDH</c>
      <c>48</c>
      <c>1.3.36.3.3.2.8.1.1.13</c>
      <c>9</c>
      <c>2B 24 03 03 02 08 01 01 0D</c>
      <c>brainpoolP512r1</c>
      <c>ECDSA, ECDH</c>
      <c>64</c>
      <c>1.3.6.1.4.1.11591.15.1</c>
      <c>9</c>
      <c>2B 06 01 04 01 DA 47 0F 01</c>
      <c>Ed25519</c>
      <c>EdDSA</c>
      <c>32</c>
      <c>1.3.101.113</c>
      <c>3</c>
      <c>2B 65 71</c>
      <c>Ed448</c>
      <c>EdDSA</c>
      <c>57</c>
      <c>1.3.6.1.4.1.3029.1.5.1</c>
      <c>10</c>
      <c>2B 06 01 04 01 97 55 01 05 01</c>
      <c>Curve25519</c>
      <c>ECDH</c>
      <c>32</c>
      <c>1.3.101.111</c>
      <c>3</c>
      <c>2B 65 6F</c>
      <c>X448</c>
      <c>ECDH</c>
      <c>56</c>
</texttable>

<t>The "Field Size (fsize)" column represents the field size of the group in number of octets, rounded up, such that x or y coordinates for a point on the curve, native point representations, or scalars with high enough entropy for the curve can be represented in that many octets.</t>

<t>The sequence of octets in the third column is the result of applying the Distinguished Encoding Rules (DER) to the ASN.1 Object Identifier with subsequent truncation.
The truncation removes the two fields of encoded Object Identifier.
The first omitted field is one octet representing the Object Identifier tag, and the second omitted field is the length of the Object Identifier body.
For example, the complete ASN.1 DER encoding for the NIST P-256 curve OID is "06 08 2A 86 48 CE 3D 03 01 07", from which the first entry in the table above is constructed by omitting the first two octets.
Only the truncated sequence of octets is the valid representation of a curve OID.</t>

<t>Implementations <bcp14>MUST</bcp14> implement Ed25519 for use with EdDSA, and Curve25519 for use with ECDH.
Implementations <bcp14>SHOULD</bcp14> implement Ed448 for use with EdDSA, and X448 for use with ECDH.</t>

<section anchor="curve-specific-formats"><name>Curve-Specific Wire Formats</name>

<t>Some Elliptic Curve Public Key Algorithms use different conventions for specific fields depending on the curve in use.
Each field is always formatted as an MPI, but with a curve-specific framing.
This table summarizes those distinctions.</t>

<texttable title="Curve-specific wire formats" anchor="ecc-wire-formats">
      <ttcol align='left'>Curve</ttcol>
      <ttcol align='left'>ECDH Point Format</ttcol>
      <ttcol align='left'>ECDH Secret Key MPI</ttcol>
      <ttcol align='left'>EdDSA Secret Key MPI</ttcol>
      <ttcol align='left'>EdDSA Signature first MPI</ttcol>
      <ttcol align='left'>EdDSA Signature second MPI</ttcol>
      <c>NIST P-256</c>
      <c>SEC1</c>
      <c>integer</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>NIST P-384</c>
      <c>SEC1</c>
      <c>integer</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>NIST P-521</c>
      <c>SEC1</c>
      <c>integer</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>brainpoolP256r1</c>
      <c>SEC1</c>
      <c>integer</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>brainpoolP384r1</c>
      <c>SEC1</c>
      <c>integer</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>brainpoolP512r1</c>
      <c>SEC1</c>
      <c>integer</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>Ed25519</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>32 octets of secret</c>
      <c>32 octets of R</c>
      <c>32 octets of S</c>
      <c>Ed448</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>prefixed 57 octets of secret</c>
      <c>prefixed 114 octets of signature</c>
      <c>0 [this is an unused placeholder]</c>
      <c>Curve25519</c>
      <c>prefixed native</c>
      <c>integer (see <xref target="curve25519-secrets"/>)</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>X448</c>
      <c>prefixed native</c>
      <c>prefixed 56 octets of secret (see <xref target="x448-secrets"/>)</c>
      <c>N/A</c>
      <c>N/A</c>
      <c>N/A</c>
</texttable>

<t>For the native octet-string forms of EdDSA values, see <xref target="RFC8032"/>.
For the native octet-string forms of ECDH secret scalars and points, see <xref target="RFC7748"/>.</t>

</section>
</section>
<section anchor="symmetric-algos"><name>Symmetric-Key Algorithms</name>

<texttable title="Symmetric-key algorithm registry">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <c>0</c>
      <c>Plaintext or unencrypted data</c>
      <c>1</c>
      <c>IDEA <xref target="IDEA"/></c>
      <c>2</c>
      <c>TripleDES (DES-EDE, <xref target="SCHNEIER"/>, <xref target="HAC"/> - 168 bit key derived from 192)</c>
      <c>3</c>
      <c>CAST5 (128 bit key, as per <xref target="RFC2144"/>)</c>
      <c>4</c>
      <c>Blowfish (128 bit key, 16 rounds) <xref target="BLOWFISH"/></c>
      <c>5</c>
      <c>Reserved</c>
      <c>6</c>
      <c>Reserved</c>
      <c>7</c>
      <c>AES with 128-bit key <xref target="AES"/></c>
      <c>8</c>
      <c>AES with 192-bit key</c>
      <c>9</c>
      <c>AES with 256-bit key</c>
      <c>10</c>
      <c>Twofish with 256-bit key <xref target="TWOFISH"/></c>
      <c>11</c>
      <c>Camellia with 128-bit key <xref target="RFC3713"/></c>
      <c>12</c>
      <c>Camellia with 192-bit key</c>
      <c>13</c>
      <c>Camellia with 256-bit key</c>
      <c>100 to 110</c>
      <c>Private/Experimental algorithm</c>
      <c>253, 254 and 255</c>
      <c>Reserved to avoid collision with Secret Key Encryption (see <xref target="secret-key-encryption"/> and <xref target="secret-key-packet-formats"/>)</c>
</texttable>

<t>Implementations <bcp14>MUST</bcp14> implement AES-128.
Implementations <bcp14>SHOULD</bcp14> implement AES-256.
Implementations <bcp14>MUST NOT</bcp14> encrypt data with IDEA, TripleDES, or CAST5.
Implementations <bcp14>MAY</bcp14> decrypt data that uses IDEA, TripleDES, or CAST5 for the sake of reading older messages or new messages from legacy clients.
An Implementation that decrypts data using IDEA, TripleDES, or CAST5 <bcp14>SHOULD</bcp14> generate a deprecation warning about the symmetric algorithm, indicating that message confidentiality is suspect.
Implementations <bcp14>MAY</bcp14> implement any other algorithm.</t>

</section>
<section anchor="compression-algos"><name>Compression Algorithms</name>

<texttable title="Compression algorithm registry">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <c>0</c>
      <c>Uncompressed</c>
      <c>1</c>
      <c>ZIP <xref target="RFC1951"/></c>
      <c>2</c>
      <c>ZLIB <xref target="RFC1950"/></c>
      <c>3</c>
      <c>BZip2 <xref target="BZ2"/></c>
      <c>100 to 110</c>
      <c>Private/Experimental algorithm</c>
</texttable>

<t>Implementations <bcp14>MUST</bcp14> implement uncompressed data.
Implementations <bcp14>SHOULD</bcp14> implement ZLIB.
For interoperability reasons implementations <bcp14>SHOULD</bcp14> be able to decompress using ZIP.
Implementations <bcp14>MAY</bcp14> implement any other algorithm.</t>

</section>
<section anchor="hash-algos"><name>Hash Algorithms</name>

<texttable title="Hash algorithm registry">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Text Name</ttcol>
      <c>1</c>
      <c>MD5 <xref target="HAC"/></c>
      <c>"MD5"</c>
      <c>2</c>
      <c>SHA-1 <xref target="FIPS180"/>, <xref target="sha1cd"/></c>
      <c>"SHA1"</c>
      <c>3</c>
      <c>RIPEMD-160 <xref target="HAC"/></c>
      <c>"RIPEMD160"</c>
      <c>4</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>5</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>6</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>7</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>8</c>
      <c>SHA2-256 <xref target="FIPS180"/></c>
      <c>"SHA256"</c>
      <c>9</c>
      <c>SHA2-384 <xref target="FIPS180"/></c>
      <c>"SHA384"</c>
      <c>10</c>
      <c>SHA2-512 <xref target="FIPS180"/></c>
      <c>"SHA512"</c>
      <c>11</c>
      <c>SHA2-224 <xref target="FIPS180"/></c>
      <c>"SHA224"</c>
      <c>12</c>
      <c>SHA3-256 <xref target="FIPS202"/></c>
      <c>"SHA3-256"</c>
      <c>13</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>14</c>
      <c>SHA3-512 <xref target="FIPS202"/></c>
      <c>"SHA3-512"</c>
      <c>100 to 110</c>
      <c>Private/Experimental algorithm</c>
      <c>&#160;</c>
</texttable>

<t>Implementations <bcp14>MUST</bcp14> implement SHA2-256.
Implementations <bcp14>SHOULD</bcp14> implement SHA2-384 and SHA2-512.
Implementations <bcp14>MAY</bcp14> implement other algorithms.
Implementations <bcp14>SHOULD NOT</bcp14> create messages which require the use of SHA-1 with the exception of computing version 4 key fingerprints and for purposes of the Modification Detection Code (MDC) in version 1 Symmetrically Encrypted Integrity Protected Data packets.
Implementations <bcp14>MUST NOT</bcp14> generate signatures with MD5, SHA-1, or RIPEMD-160.
Implementations <bcp14>MUST NOT</bcp14> use MD5, SHA-1, or RIPEMD-160 as a hash function in an ECDH KDF.
Implementations <bcp14>MUST NOT</bcp14> validate any recent signature that depends on MD5, SHA-1, or RIPEMD-160.
Implementations <bcp14>SHOULD NOT</bcp14> validate any old signature that depends on MD5, SHA-1, or RIPEMD-160 unless the signature's creation date predates known weakness of the algorithm used, and the implementation is confident that the message has been in the secure custody of the user the whole time.</t>

</section>
<section anchor="aead-algorithms"><name>AEAD Algorithms</name>

<texttable title="AEAD algorithm registry">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>IV length (octets)</ttcol>
      <ttcol align='left'>authentication tag length (octets)</ttcol>
      <c>1</c>
      <c>EAX <xref target="EAX"/></c>
      <c>16</c>
      <c>16</c>
      <c>2</c>
      <c>OCB <xref target="RFC7253"/></c>
      <c>15</c>
      <c>16</c>
      <c>3</c>
      <c>GCM <xref target="SP800-38D"/></c>
      <c>12</c>
      <c>16</c>
      <c>100 to 110</c>
      <c>Private/Experimental algorithm</c>
      <c>&#160;</c>
      <c>&#160;</c>
</texttable>

<t>Implementations <bcp14>MUST</bcp14> implement OCB.
Implementations <bcp14>MAY</bcp14> implement EAX, GCM and other algorithms.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>Because this document obsoletes <xref target="RFC4880"/>, IANA is requested to update all registration information that references <xref target="RFC4880"/> to instead reference this RFC.</t>

<t>OpenPGP is highly parameterized, and consequently there are a number of considerations for allocating parameters for extensions.
This section describes how IANA should look at extensions to the protocol as described in this document.</t>

<section anchor="new-string-to-key-specifier-types"><name>New String-to-Key Specifier Types</name>

<t>OpenPGP S2K specifiers contain a mechanism for new algorithms to turn a string into a key.
This specification creates a registry of S2K specifier types.
The registry includes the S2K type, the name of the S2K, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="s2k-types"/>.
Adding a new S2K specifier <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<t>IANA should add a column "Generate?" to the S2K type registry, with initial values taken from <xref target="s2k-types"/>.</t>

</section>
<section anchor="new-packets"><name>New Packets</name>

<t>Major new features of OpenPGP are defined through new packet types.
This specification creates a registry of packet types.
The registry includes the packet type, the name of the packet, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="packet-tags"/>.
Adding a new packet type <bcp14>MUST</bcp14> be done through the RFC <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<section anchor="user-attribute-types"><name>User Attribute Types</name>

<t>The User Attribute packet permits an extensible mechanism for other types of certificate identification.
This specification creates a registry of User Attribute types.
The registry includes the User Attribute type, the name of the User Attribute, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="user-attribute-packet"/>.
Adding a new User Attribute type <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<section anchor="image-format-subpacket-types"><name>Image Format Subpacket Types</name>

<t>Within User Attribute packets, there is an extensible mechanism for other types of image-based User Attributes.
This specification creates a registry of Image Attribute subpacket types.
The registry includes the Image Attribute subpacket type, the name of the Image Attribute subpacket, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="uat-image"/>.
Adding a new Image Attribute subpacket type <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
</section>
<section anchor="new-signature-subpackets"><name>New Signature Subpackets</name>

<t>OpenPGP signatures contain a mechanism for signed (or unsigned) data to be added to them for a variety of purposes in the Signature subpackets as discussed in <xref target="signature-subpacket"/>.
This specification creates a registry of Signature subpacket types.
The registry includes the Signature subpacket type, the name of the subpacket, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="signature-subpacket"/>.
Adding a new Signature subpacket <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<section anchor="signature-notation-data-subpackets"><name>Signature Notation Data Subpackets</name>

<t>OpenPGP signatures further contain a mechanism for extensions in signatures.
These are the Notation Data subpackets, which contain a key/value pair.
Notations contain a user space that is completely unmanaged and an IETF space.</t>

<t>This specification creates a registry of Signature Notation Data types.
The registry includes the name of the Signature Notation Data, the Signature Notation Data type, its allowed values, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="notation-data"/>.
Adding a new Signature Notation Data subpacket <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="signature-notation-data-subpacket-notation-flags"><name>Signature Notation Data Subpacket Notation Flags</name>

<t>This specification creates a new registry of Signature Notation Data Subpacket Notation Flags.
The registry includes the columns "Flag", "Shorthand", "Description", "Security Recommended", "Interoperability Recommended", and "Reference".
The initial values for this registry can be found in <xref target="notation-data"/>.
Adding a new item <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="key-server-preference-extensions"><name>Key Server Preference Extensions</name>

<t>OpenPGP signatures contain a mechanism for preferences to be specified about key servers.
This specification creates a registry of key server preferences.
The registry includes the key server preference, the name of the preference, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="key-server-preferences"/>.
Adding a new key server preference <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="key-flags-extensions"><name>Key Flags Extensions</name>

<t>OpenPGP signatures contain a mechanism for flags to be specified about key usage.
This specification creates a registry of key usage flags.
The registry includes the key flags value, the name of the flag, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="key-flags"/>.
Adding a new key usage flag <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="reason-for-revocation-extensions"><name>Reason for Revocation Extensions</name>

<t>OpenPGP signatures contain a mechanism for flags to be specified about why a key was revoked.
This specification creates a registry of "Reason for Revocation" flags.
The registry includes the "Reason for Revocation" flags value, the name of the flag, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="reason-for-revocation"/>.
Adding a new feature flag <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="implementation-features"><name>Implementation Features</name>

<t>OpenPGP signatures contain a mechanism for flags to be specified stating which optional features an implementation supports.
This specification creates a registry of feature-implementation flags.
The registry includes the feature-implementation flags value, the name of the flag, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="features-subpacket"/>.
Adding a new feature-implementation flag <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<t>Also see <xref target="meta-considerations-for-expansion"/> for more information about when feature flags are needed.</t>

</section>
</section>
<section anchor="new-packet-versions"><name>New Packet Versions</name>

<t>The core OpenPGP packets all have version numbers, and can be revised by introducing a new version of an existing packet.
This specification creates a registry of packet types.
The registry includes the packet type, the number of the version, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="packet-types"/>.
Adding a new packet version <bcp14>MUST</bcp14> be done through the RFC <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
</section>
<section anchor="new-algorithms"><name>New Algorithms</name>

<t><xref target="constants"/> lists the core algorithms that OpenPGP uses.
Adding in a new algorithm is usually simple.
For example, adding in a new symmetric cipher usually would not need anything more than allocating a constant for that cipher.
If that cipher had other than a 64-bit or 128-bit block size, there might need to be additional documentation describing how OpenPGP-CFB mode would be adjusted.
Similarly, when DSA was expanded from a maximum of 1024-bit public keys to 3072-bit public keys, the revision of FIPS 186 contained enough information itself to allow implementation.
Changes to this document were made mainly for emphasis.</t>

<section anchor="public-key-algorithms"><name>Public-Key Algorithms</name>

<t>OpenPGP specifies a number of public-key algorithms.
This specification creates a registry of public-key algorithm identifiers.
The registry includes the algorithm name, its key sizes and parameters, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="pubkey-algos"/>.
Adding a new public-key algorithm <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<t>This document requests IANA register the following new public-key algorithm:</t>

<texttable title="New public-Key algorithms registered">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>22</c>
      <c>EdDSA public key algorithm</c>
      <c>This doc, <xref target="eddsa"/></c>
</texttable>

<t>[ Note to RFC-Editor: Please remove the table above on publication.
]</t>

<section anchor="elliptic-curve-algorithms"><name>Elliptic Curve Algorithms</name>

<t>Some public key algorithms use Elliptic Curves.
In particular, ECDH/EdDSA/ECDSA public key algorithms all allow specific curves to be used, as indicated by OID.
To register a new elliptic curve for use with OpenPGP, its OID needs to be registered in <xref target="ecc-oid-usage"/>, its wire format needs to be documented in <xref target="ecc-wire-formats"/>, and if used for ECDH, its KDF and KEK parameters must be populated in <xref target="ecdh-kdf-kek-parameters"/>.</t>

</section>
</section>
<section anchor="symmetric-key-algorithms"><name>Symmetric-Key Algorithms</name>

<t>OpenPGP specifies a number of symmetric-key algorithms.
This specification creates a registry of symmetric-key algorithm identifiers.
The registry includes the algorithm name, its key sizes and block size, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="symmetric-algos"/>.
Adding a new symmetric-key algorithm <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="hash-algorithms"><name>Hash Algorithms</name>

<t>OpenPGP specifies a number of hash algorithms.
This specification creates a registry of hash algorithm identifiers.
The registry includes the algorithm name, a text representation of that name, its block size, an OID hash prefix, and a reference to the defining specification.
The initial values for this registry can be found in <xref target="hash-algos"/> for the algorithm identifiers and text names, and <xref target="version-three-sig"/> for the OIDs and expanded signature prefixes.
Adding a new hash algorithm <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<t>This document requests IANA register the following hash algorithms:</t>

<texttable title="New hash algorithms registered">
      <ttcol align='right'>ID</ttcol>
      <ttcol align='left'>Algorithm</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>12</c>
      <c>SHA3-256</c>
      <c>This doc</c>
      <c>13</c>
      <c>Reserved</c>
      <c>&#160;</c>
      <c>14</c>
      <c>SHA3-512</c>
      <c>This doc</c>
</texttable>

<t>[Notes to RFC-Editor: Please remove the table above on publication.
    It is desirable not to reuse old or reserved algorithms because some existing tools might print a wrong description.
    The ID 13 has been reserved so that the SHA3 algorithm IDs align nicely with their SHA2 counterparts.]</t>

</section>
<section anchor="compression-algorithms"><name>Compression Algorithms</name>

<t>OpenPGP specifies a number of compression algorithms.
This specification creates a registry of compression algorithm identifiers.
The registry includes the algorithm name and a reference to the defining specification.
The initial values for this registry can be found in <xref target="compression-algos"/>.
Adding a new compression key algorithm <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

</section>
<section anchor="elliptic-curve-algorithms-1"><name>Elliptic Curve Algorithms</name>

<t>This document requests IANA add a registry of elliptic curves for use in OpenPGP.</t>

<t>Each curve is identified on the wire by OID, and is acceptable for use in certain OpenPGP public key algorithms.
The table's initial headings and values can be found in <xref target="ec-curves"/>.
Adding a new elliptic curve algorithm to OpenPGP <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.
If the new curve can be used for ECDH or EdDSA, it must also be added to the "Curve-specific wire formats" table described in <xref target="curve-specific-formats"/>.</t>

</section>
</section>
<section anchor="elliptic-curve-point-and-scalar-wire-formats"><name>Elliptic Curve Point and Scalar Wire Formats</name>

<t>This document requests IANA add a registry of wire formats that represent elliptic curve points.
The table's initial headings and values can be found in <xref target="ec-point-wire-formats"/>.
Adding a new EC point wire format <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<t>This document also requests IANA add a registry of wire formats that represent scalars for use with elliptic curve cryptography.
The table's initial headings and values can be found in <xref target="ec-scalar-wire-formats"/>.
Adding a new EC scalar wire format <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>.</t>

<t>This document also requests that IANA add a registry mapping curve-specific MPI octet-string encoding conventions for ECDH and EdDSA.
The table's initial headings and values can be found in <xref target="curve-specific-formats"/>.
Adding a new elliptic curve algorithm to OpenPGP <bcp14>MUST</bcp14> be done through the SPECIFICATION <bcp14>REQUIRED</bcp14> method, as described in <xref target="RFC8126"/>, and requires adding an entry to this table if the curve is to be used with either EdDSA or ECDH.</t>

</section>
<section anchor="changes-to-existing-registries"><name>Changes to existing registries</name>

<t>This document requests IANA add the following wire format columns to the OpenPGP public-key algorithm registry:</t>

<t><list style="symbols">
  <t>Public Key Format</t>
  <t>Secret Key Format</t>
  <t>Signature Format</t>
  <t>PKESK Format</t>
</list></t>

<t>And populate them with the values found in <xref target="pubkey-algos"/>.</t>

</section>
</section>
<section anchor="packet-composition"><name>Packet Composition</name>

<t>OpenPGP packets are assembled into sequences in order to create messages and to transfer keys.
Not all possible packet sequences are meaningful and correct.
This section describes the rules for how packets should be placed into sequences.</t>

<t>There are three distinct sequences of packets:</t>

<t><list style="symbols">
  <t>Transferable Public Keys (<xref target="transferable-public-keys"/>) and its close counterpart, Transferable Secret Keys (<xref target="transferable-secret-keys"/>)</t>
  <t>OpenPGP Messages (<xref target="openpgp-messages"/>)</t>
  <t>Detached Signatures (<xref target="detached-signatures"/>)</t>
</list></t>

<t>Each sequence has an explicit grammar of what packet types (<xref target="packet-type-registry"/>) can appear in what place.
The presence of an unknown critical packet, or a known but unexpected packet is a critical error, invalidating the entire sequence (see <xref target="packet-criticality"/>).
On the other hand, unknown non-critical packets can appear anywhere within any sequence.
This provides a structured way to introduce new packets into the protocol, while making sure that certain packets will be handled strict.</t>

<t>An implementation may "recognize" a packet, but not implement it.
The purpose of Packet Criticality is to allow the producer to tell the consumer whether it would prefer a new, unknown packet to generate an error or be ignored.</t>

<t>Note that previous versions of this document did not have a concept of Packet Criticality, and did not give clear guidance on what to do when unknown packets are encountered.
Therefore, a legacy implementation may reject unknown non-critical packets, or accept unknown critical packets.</t>

<t>When generating a sequence of OpenPGP packets according to one of the three grammars, an implementation <bcp14>MUST NOT</bcp14> inject a critical packet of a type that does not adhere to the grammar.</t>

<t>When consuming a sequence of OpenPGP packets according to one of the three grammars, an implementation <bcp14>MUST</bcp14> reject the sequence with an error if it encounters a critical packet of inappropriate type according to the grammar.</t>

<section anchor="transferable-public-keys"><name>Transferable Public Keys</name>

<t>OpenPGP users may transfer public keys.
This section describes the structure of public keys in transit to ensure interoperability.</t>

<section anchor="openpgp-v5-key-structure"><name>OpenPGP v5 Key Structure</name>

<t>The format of an OpenPGP v5 key is as follows.
Entries in square brackets are optional and ellipses indicate repetition.</t>

<figure><artwork><![CDATA[
Primary Key
   [Revocation Signature...]
    Direct-Key Signature...
   [User ID or User Attribute
           [Certification Revocation Signature...]
           [Certification Signature...]]...
   [Subkey [Subkey Revocation Signature...]
           Subkey Binding Signature...]...
   [Padding]
]]></artwork></figure>

<t>In addition to these rules, a marker packet (<xref target="marker-packet"/>) can appear anywhere in the sequence.</t>

<t>Note, that a v5 key uses a Direct-Key Signature to store algorithm preferences.</t>

<t>Every subkey for a v5 primary key <bcp14>MUST</bcp14> be a v5 subkey.</t>

<t>When a primary v5 Public Key is revoked, it is sometimes distributed with only the revocation signature:</t>

<figure><artwork><![CDATA[
Primary Key
    Revocation Signature
]]></artwork></figure>

<t>In this case, the direct-key signature is no longer necessary, since the primary key itself has been marked as unusable.</t>

</section>
<section anchor="openpgp-v4-key-structure"><name>OpenPGP v4 Key Structure</name>

<t>The format of an OpenPGP v4 key is as follows.</t>

<figure><artwork><![CDATA[
Primary Key
   [Revocation Signature]
   [Direct-Key Signature...]
   [User ID or User Attribute [Signature...]]...
   [Subkey [Subkey Revocation Signature...]
           Subkey Binding Signature...]...
]]></artwork></figure>

<t>In addition to these rules, a marker packet (<xref target="marker-packet"/>) can appear anywhere in the sequence.</t>

<t>A subkey always has at least one subkey binding signature after it that is issued using the primary key to tie the two keys together.
These binding signatures may be in either v3 or v4 format, but <bcp14>SHOULD</bcp14> be v4.
Subkeys that can issue signatures <bcp14>MUST</bcp14> have a v4 binding signature due to the <bcp14>REQUIRED</bcp14> embedded primary key binding signature.</t>

<t>Every subkey for a v4 primary key <bcp14>MUST</bcp14> be a v4 subkey.</t>

<t>When a primary v4 Public Key is revoked, the revocation signature is sometimes distributed by itself, without the primary key packet it applies to. This is referred to as a "revocation certificate".
Instead, a v5 revocation certificate <bcp14>MUST</bcp14> include the primary key packet, as described above.</t>

</section>
<section anchor="openpgp-v3-key-structure"><name>OpenPGP v3 Key Structure</name>

<t>The format of an OpenPGP v3 key is as follows.</t>

<figure><artwork><![CDATA[
RSA Public Key
   [Revocation Signature]
    User ID [Signature...]
   [User ID [Signature...]]...
]]></artwork></figure>

<t>In addition to these rules, a marker packet (<xref target="marker-packet"/>) can appear anywhere in the sequence.</t>

<t>Each signature certifies the RSA public key and the preceding User ID.
The RSA public key can have many User IDs and each User ID can have many signatures.
V3 keys are deprecated.
Implementations <bcp14>MUST NOT</bcp14> generate new v3 keys, but <bcp14>MAY</bcp14> continue to use existing ones.</t>

<t>V3 keys <bcp14>MUST NOT</bcp14> have subkeys.</t>

</section>
<section anchor="common-requirements"><name>Common requirements</name>

<t>The Public-Key packet occurs first.</t>

<t>In order to create self-signatures (see <xref target="self-sigs"/>), the primary key <bcp14>MUST</bcp14> be an algorithm capable of making signatures (that is, not an encryption-only algorithm).
The subkeys may be keys of any type.
For example, there may be a single-key RSA key, an EdDSA primary key with an RSA encryption key, or an EdDSA primary key with an ECDH subkey, etc.</t>

<t>Each of the following User ID packets provides the identity of the owner of this public key.
If there are multiple User ID packets, this corresponds to multiple means of identifying the same unique individual user; for example, a user may have more than one email address, and construct a User ID for each one.
A transferable public key <bcp14>SHOULD</bcp14> include at least one User ID packet unless storage requirements prohibit this.</t>

<t>Immediately following each User ID packet, there are zero or more Signature packets.
Each Signature packet is calculated on the immediately preceding User ID packet and the initial Public-Key packet.
The signature serves to certify the corresponding public key and User ID.
In effect, the signer is testifying to his or her belief that this public key belongs to the user identified by this User ID.</t>

<t>Within the same section as the User ID packets, there are zero or more User Attribute packets.
Like the User ID packets, a User Attribute packet is followed by zero or more Signature packets calculated on the immediately preceding User Attribute packet and the initial Public-Key packet.</t>

<t>User Attribute packets and User ID packets may be freely intermixed in this section, so long as the signatures that follow them are maintained on the proper User Attribute or User ID packet.</t>

<t>After the User ID packet or Attribute packet, there may be zero or more Subkey packets.
In general, subkeys are provided in cases where the top-level public key is a certification-only key.
However, any v4 or v5 key may have subkeys, and the subkeys may be encryption keys, signing keys, authentication keys, etc.
It is good practice to use separate subkeys for every operation (i.e. signature-only, encryption-only, authentication-only keys, etc.).</t>

<t>Each Subkey packet <bcp14>MUST</bcp14> be followed by one Signature packet, which should be a subkey binding signature issued by the top-level key.
For subkeys that can issue signatures, the subkey binding signature <bcp14>MUST</bcp14> contain an Embedded Signature subpacket with a primary key binding signature (0x19) issued by the subkey on the top-level key.</t>

<t>Subkey and Key packets may each be followed by a revocation Signature packet to indicate that the key is revoked.
Revocation signatures are only accepted if they are issued by the key itself, or by a key that is authorized to issue revocations via a Revocation Key subpacket in a self-signature by the top-level key.</t>

<t>The optional trailing Padding packet is a mechanism to defend against traffic analysis (see <xref target="traffic-analysis"/>).
For maximum interoperability, if the Public-Key packet is a v4 key, the optional Padding packet <bcp14>SHOULD NOT</bcp14> be present unless the recipient has indicated that they are capable of ignoring it successfully.
An implementation that is capable of receiving a transferable public key with a v5 Public-Key primary key <bcp14>MUST</bcp14> be able to accept (and ignore) the trailing optional Padding packet.</t>

<t>Transferable public-key packet sequences may be concatenated to allow transferring multiple public keys in one operation (see <xref target="keyrings"/>).</t>

</section>
</section>
<section anchor="transferable-secret-keys"><name>Transferable Secret Keys</name>

<t>OpenPGP users may transfer secret keys.
The format of a transferable secret key is the same as a transferable public key except that secret-key and secret-subkey packets can be used in addition to the public key and public-subkey packets.
If a single secret-key or secret-subkey packet is included in a packet sequence, it is a transferable secret key and should be handled and marked as such (see <xref target="forming-ascii-armor"/>).
Implementations <bcp14>SHOULD</bcp14> include self-signatures on any User IDs and subkeys, as this allows for a complete public key to be automatically extracted from the transferable secret key.
Implementations <bcp14>MAY</bcp14> choose to omit the self-signatures, especially if a transferable public key accompanies the transferable secret key.</t>

</section>
<section anchor="openpgp-messages"><name>OpenPGP Messages</name>

<t>An OpenPGP message is a packet or sequence of packets that corresponds to the following grammatical rules (comma represents sequential composition, and vertical bar separates alternatives):</t>

<dl>
  <dt>
OpenPGP Message :-  </dt>
  <dd>
    <t>Encrypted Message | Signed Message | Compressed Message | Literal Message.</t>
  </dd>
  <dt>
Compressed Message :-  </dt>
  <dd>
    <t>Compressed Data Packet.</t>
  </dd>
  <dt>
Literal Message :-  </dt>
  <dd>
    <t>Literal Data Packet.</t>
  </dd>
  <dt>
ESK :-  </dt>
  <dd>
    <t>Public-Key Encrypted Session Key Packet | Symmetric-Key Encrypted Session Key Packet.</t>
  </dd>
  <dt>
ESK Sequence :-  </dt>
  <dd>
    <t>ESK | ESK Sequence, ESK.</t>
  </dd>
  <dt>
Encrypted Data :-  </dt>
  <dd>
    <t>Symmetrically Encrypted Data Packet | Symmetrically Encrypted Integrity Protected Data Packet</t>
  </dd>
  <dt>
Encrypted Message :-  </dt>
  <dd>
    <t>Encrypted Data | ESK Sequence, Encrypted Data.</t>
  </dd>
  <dt>
One-Pass Signed Message :-  </dt>
  <dd>
    <t>One-Pass Signature Packet, OpenPGP Message, Corresponding Signature Packet.</t>
  </dd>
  <dt>
Signed Message :-  </dt>
  <dd>
    <t>Signature Packet, OpenPGP Message | One-Pass Signed Message.</t>
  </dd>
  <dt>
Optionally Padded Message :-  </dt>
  <dd>
    <t>OpenPGP Message | OpenPGP Message, Padding Packet.</t>
  </dd>
</dl>

<t>In addition to these rules, a marker packet (<xref target="marker-packet"/>) can appear anywhere in the sequence.</t>

<section anchor="unwrapping"><name>Unwrapping Encrypted and Compressed Messages</name>

<t>In addition to the above grammar, certain messages can be "unwrapped" to yield new messages.
In particular:</t>

<t><list style="symbols">
  <t>Decrypting a version 2 Symmetrically Encrypted and Integrity Protected Data packet must yield a valid Optionally Padded Message.</t>
  <t>Decrypting a version 1 Symmetrically Encrypted and Integrity Protected Data packet or --- for historic data --- a Symmetrically Encrypted Data packet must yield a valid OpenPGP Message.</t>
  <t>Decompressing a Compressed Data packet must also yield a valid OpenPGP Message.</t>
</list></t>

<t>When any unwrapping is performed, the resulting stream of octets is parsed into a series OpenPGP packets like any other stream of octets.
The packet boundaries found in the series of octets are expected to align with the length of the unwrapped octet stream.
An implementation <bcp14>MUST NOT</bcp14> interpret octets beyond the boundaries of the unwrapped octet stream as part of any OpenPGP packet.
If an implementation encounters a packet whose header length indicates that it would extend beyond the boundaries of the unwrapped octet stream, the implementation <bcp14>MUST</bcp14> reject that packet as malformed and unusable.</t>

</section>
<section anchor="additional-constraints-on-packet-sequences"><name>Additional Constraints on Packet Sequences</name>

<t>Note that some subtle combinations that are formally acceptable by this grammar are nonetheless unacceptable.</t>

<section anchor="encrypted-message-versions"><name>Packet Versions in Encrypted Messages</name>

<t>As noted above, an Encrypted Message is a sequence of zero or more PKESKs (<xref target="pkesk"/>) and SKESKs (<xref target="skesk"/>), followed by an SEIPD (<xref target="seipd"/>) payload.
In some historic data, the payload may be a deprecated SED (<xref target="sed"/>) packet instead of SEIPD, though implementations <bcp14>MUST NOT</bcp14> generate SED packets (see <xref target="ciphertext-malleability"/>).
The versions of the preceding ESK packets within an Encrypted Message <bcp14>MUST</bcp14> align with the version of the payload SEIPD packet, as described in this section.</t>

<t>v3 PKESK and v4 SKESK packets both contain in their cleartext the symmetric cipher algorithm identifier in addition to the session key for the subsequent SEIPD packet.
Since a v1 SEIPD does not contain a symmetric algorithm identifier, so all ESK packets preceding a v1 SEIPD payload <bcp14>MUST</bcp14> be either v3 PKESK or v4 SKESK.</t>

<t>On the other hand, the cleartext of the v5 ESK packets (either PKESK or SKESK) do not contain a symmetric cipher algorithm identifier, so they cannot be used in combination with a v1 SEIPD payload.
The payload following any v5 PKESK or v5 SKESK packet <bcp14>MUST</bcp14> be a v2 SEIPD.</t>

<t>Additionally, to avoid potentially conflicting cipher algorithm identifiers, and for simplicity, implementations <bcp14>MUST NOT</bcp14> precede a v2 SEIPD payload with either v3 PKESK or v4 SKESK packets.</t>

<t>The acceptable versions of packets in an Encrypted Message are summarized in the following table:</t>

<texttable title="Encrypted Message Packet Version Alignment">
      <ttcol align='left'>Version of Encrypted Data payload</ttcol>
      <ttcol align='left'>Version of preceding Symmetric-Key ESK (if any)</ttcol>
      <ttcol align='left'>Version of preceding Public-Key ESK (if any)</ttcol>
      <c>v1 SEIPD</c>
      <c>v4 SKESK</c>
      <c>v3 PKESK</c>
      <c>v2 SEIPD</c>
      <c>v5 SKESK</c>
      <c>v5 PKESK</c>
</texttable>

<t>An implementation processing an Encrypted Message <bcp14>MUST</bcp14> discard any preceding ESK packet with a version that does not align with the version of the payload.</t>

</section>
</section>
</section>
<section anchor="detached-signatures"><name>Detached Signatures</name>

<t>Some OpenPGP applications use so-called "detached signatures".
For example, a program bundle may contain a file, and with it a second file that is a detached signature of the first file.
These detached signatures are simply one or more Signature packets stored separately from the data for which they are a signature.</t>

<t>In addition, a marker packet (<xref target="marker-packet"/>) and a padding packet (<xref target="padding-packet"/>) can appear anywhere in the sequence.</t>

</section>
</section>
<section anchor="elliptic-curve-cryptography"><name>Elliptic Curve Cryptography</name>

<t>This section describes algorithms and parameters used with Elliptic Curve Cryptography (ECC) keys.
A thorough introduction to ECC can be found in <xref target="KOBLITZ"/>.</t>

<t>None of the ECC methods described in this document are allowed with deprecated v3 keys.
Refer to <xref target="FIPS186"/>, B.4.1, for the method to generate a uniformly distributed ECC private key.</t>

<section anchor="supported-ecc-curves"><name>Supported ECC Curves</name>

<t>This document references three named prime field curves defined in <xref target="FIPS186"/> as "Curve P-256", "Curve P-384", and "Curve P-521"; and three named prime field curves defined in <xref target="RFC5639"/> as "brainpoolP256r1", "brainpoolP384r1", and "brainpoolP512r1".
These three <xref target="FIPS186"/> curves and the three <xref target="RFC5639"/> curves can be used with ECDSA and ECDH public key algorithms.
Additionally, curve "Curve25519" and "Curve448" are referenced for use with Ed25519 and Ed448 (EdDSA signing, see <xref target="RFC8032"/>); and X25519 and X448 (ECDH encryption, see <xref target="RFC7748"/>).</t>

<t>The named curves are referenced as a sequence of octets in this document, called throughout, curve OID.
<xref target="ec-curves"/> describes in detail how this sequence of octets is formed.</t>

</section>
<section anchor="ec-point-wire-formats"><name>EC Point Wire Formats</name>

<t>A point on an elliptic curve will always be represented on the wire as an MPI.
Each curve uses a specific point format for the data within the MPI itself.
Each format uses a designated prefix octet to ensure that the high octet has at least one bit set to make the MPI a constant size.</t>

<texttable title="Elliptic Curve Point Wire Formats">
      <ttcol align='right'>Name</ttcol>
      <ttcol align='left'>Wire Format</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>SEC1</c>
      <c>0x04 || x || y</c>
      <c><xref target="ec-point-sec1"/></c>
      <c>Prefixed native</c>
      <c>0x40 || native</c>
      <c><xref target="ec-point-prefixed-native"/></c>
</texttable>

<section anchor="ec-point-sec1"><name>SEC1 EC Point Wire Format</name>

<t>For a SEC1-encoded (uncompressed) point the content of the MPI is:</t>

<figure><artwork><![CDATA[
B = 04 || x || y
]]></artwork></figure>

<t>where x and y are coordinates of the point P = (x, y), and each is encoded in the big-endian format and zero-padded to the adjusted underlying field size.
The adjusted underlying field size is the underlying field size rounded up to the nearest 8-bit boundary, as noted in the "fsize" column in <xref target="ec-curves"/>.
This encoding is compatible with the definition given in <xref target="SEC1"/>.</t>

</section>
<section anchor="ec-point-prefixed-native"><name>Prefixed Native EC Point Wire Format</name>

<t>For a custom compressed point the content of the MPI is:</t>

<figure><artwork><![CDATA[
B = 40 || p
]]></artwork></figure>

<t>where p is the public key of the point encoded using the rules defined for the specified curve.
This format is used for ECDH keys based on curves expressed in Montgomery form, and for points when using EdDSA.</t>

</section>
<section anchor="notes-on-ec-point-wire-formats"><name>Notes on EC Point Wire Formats</name>

<t>Given the above definitions, the exact size of the MPI payload for an encoded point is 515 bits for both NIST P-256 and brainpoolP256r1, 771 for both NIST P-384 and brainpoolP384r1, 1059 for NIST P-521, 1027 for brainpoolP512r1, 263 for both Curve25519 and Ed25519, 463 for Ed448, and 455 for X448.
For example, the length of a EdDSA public key for the curve Ed25519 is 263 bits: 7 bits to represent the 0x40 prefix octet and 32 octets for the native value of the public key.</t>

<t>Even though the zero point, also called the point at infinity, may occur as a result of arithmetic operations on points of an elliptic curve, it <bcp14>SHALL NOT</bcp14> appear in data structures defined in this document.</t>

<t>Each particular curve uses a designated wire format for the point found in its public key or ECDH data structure.
An implementation <bcp14>MUST NOT</bcp14> use a different wire format for a point than the wire format associated with the curve.</t>

</section>
</section>
<section anchor="ec-scalar-wire-formats"><name>EC Scalar Wire Formats</name>

<t>Some non-curve values in elliptic curve cryptography (for example, secret keys and signature components) are not points on a curve, but are also encoded on the wire in OpenPGP as an MPI.</t>

<t>Because of different patterns of deployment, some curves treat these values as opaque bit strings with the high bit set, while others are treated as actual integers, encoded in the standard OpenPGP big-endian form.
The choice of encoding is specific to the public key algorithm in use.</t>

<texttable title="Elliptic Curve Scalar Encodings">
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>integer</c>
      <c>An integer, big-endian encoded as a standard OpenPGP MPI</c>
      <c><xref target="mpi"/></c>
      <c>octet string</c>
      <c>An octet string of fixed length, that may be shorter on the wire due to leading zeros being stripped by the MPI encoding, and may need to be zero-padded before usage</c>
      <c><xref target="ec-octet-string"/></c>
      <c>prefixed N octets</c>
      <c>An octet string of fixed length N, prefixed with octet 0x40 to ensure no leading zero octet</c>
      <c><xref target="ec-prefix"/></c>
</texttable>

<section anchor="ec-octet-string"><name>EC Octet String Wire Format</name>

<t>Some opaque strings of octets are represented on the wire as an MPI by simply stripping the leading zeros and counting the remaining bits.
These strings are of known, fixed length.
They are represented in this document as <spanx style="verb">MPI(N octets of X)</spanx> where <spanx style="verb">N</spanx> is the expected length in octets of the octet string.</t>

<t>For example, a five-octet opaque string (<spanx style="verb">MPI(5 octets of X)</spanx>) where <spanx style="verb">X</spanx> has the value <spanx style="verb">00 02 ee 19 00</spanx> would be represented on the wire as an MPI like so: <spanx style="verb">00 1a 02 ee 19 00</spanx>.</t>

<t>To encode <spanx style="verb">X</spanx> to the wire format, we set the MPI's two-octet bit counter to the value of the highest set bit (bit 26, or 0x001a), and do not transfer the leading all-zero octet to the wire.</t>

<t>To reverse the process, an implementation that knows this value has an expected length of 5 octets can take the following steps:</t>

<t><list style="symbols">
  <t>ensure that the MPI's two-octet bitcount is less than or equal to 40 (5 octets of 8 bits)</t>
  <t>allocate 5 octets, setting all to zero initially</t>
  <t>copy the MPI data octets (without the two count octets) into the lower octets of the allocated space</t>
</list></t>

</section>
<section anchor="ec-prefix"><name>Elliptic Curve Prefixed Octet String Wire Format</name>

<t>Another way to ensure that a fixed-length bytestring is encoded simply to the wire while remaining in MPI format is to prefix the bytestring with a dedicated non-zero octet.
This specification uses 0x40 as the prefix octet.
This is represented in this standard as <spanx style="verb">MPI(prefixed N octets of X)</spanx>, where <spanx style="verb">N</spanx> is the known bytestring length.</t>

<t>For example, a five-octet opaque string using <spanx style="verb">MPI(prefixed 5 octets of X)</spanx> where <spanx style="verb">X</spanx> has the value <spanx style="verb">00 02 ee 19 00</spanx> would be written to the wire form as: <spanx style="verb">00 2f 40 00 02 ee 19 00</spanx>.</t>

<t>To encode the string, we prefix it with the octet 0x40 (whose 7th bit is set), then set the MPI's two-octet bit counter to 47 (0x002f, 7 bits for the prefix octet and 40 bits for the string).</t>

<t>To decode the string from the wire, an implementation that knows that the variable is formed in this way can:</t>

<t><list style="symbols">
  <t>ensure that the first three octets of the MPI (the two bit-count octets plus the prefix octet)  are <spanx style="verb">00 2f 40</spanx>, and</t>
  <t>use the remainder of the MPI directly off the wire.</t>
</list></t>

<t>Note that this is a similar approach to that used in the EC point encodings found in <xref target="ec-point-prefixed-native"/>.</t>

</section>
</section>
<section anchor="key-derivation-function"><name>Key Derivation Function</name>

<t>A key derivation function (KDF) is necessary to implement EC encryption.
The Concatenation Key Derivation Function (Approved Alternative 1) <xref target="SP800-56A"/> with the KDF hash function that is SHA2-256 <xref target="FIPS180"/> or stronger is <bcp14>REQUIRED</bcp14>.</t>

<t>For convenience, the synopsis of the encoding method is given below with significant simplifications attributable to the restricted choice of hash functions in this document.
However, <xref target="SP800-56A"/> is the normative source of the definition.</t>

<figure><artwork><![CDATA[
//   Implements KDF( X, oBits, Param );
//   Input: point X = (x,y)
//   oBits - the desired size of output
//   hBits - the size of output of hash function Hash
//   Param - octets representing the parameters
//   Assumes that oBits <= hBits
// Convert the point X to the octet string:
//   ZB' = 04 || x || y
// and extract the x portion from ZB'
ZB = x;
MB = Hash ( 00 || 00 || 00 || 01 || ZB || Param );
return oBits leftmost bits of MB.
]]></artwork></figure>

<t>Note that ZB in the KDF description above is the compact representation of X as defined in Section 4.2 of <xref target="RFC6090"/>.</t>

</section>
<section anchor="ecdh"><name>EC DH Algorithm (ECDH)</name>

<t>The method is a combination of an ECC Diffie-Hellman method to establish a shared secret, a key derivation method to process the shared secret into a derived key, and a key wrapping method that uses the derived key to protect a session key used to encrypt a message.</t>

<t>The One-Pass Diffie-Hellman method C(1, 1, ECC CDH) <xref target="SP800-56A"/> <bcp14>MUST</bcp14> be implemented with the following restrictions: the ECC CDH primitive employed by this method is modified to always assume the cofactor is 1, the KDF specified in <xref target="key-derivation-function"/> is used, and the KDF parameters specified below are used.</t>

<t>The KDF parameters are encoded as a concatenation of the following 5 variable-length and fixed-length fields, which are compatible with the definition of the OtherInfo bitstring <xref target="SP800-56A"/>:</t>

<t><list style="symbols">
  <t>A variable-length field containing a curve OID, which is formatted as follows:  <list style="symbols">
      <t>A one-octet size of the following field,</t>
      <t>The octets representing a curve OID defined in <xref target="ec-curves"/>;</t>
    </list></t>
  <t>A one-octet public key algorithm ID defined in <xref target="pubkey-algos"/>;</t>
  <t>A variable-length field containing KDF parameters, which are identical to the corresponding field in the ECDH public key, and are formatted as follows:  <list style="symbols">
      <t>A one-octet size of the following fields; values 0 and 0xFF are reserved for future extensions,</t>
      <t>A one-octet value 0x01, reserved for future extensions,</t>
      <t>A one-octet hash function ID used with the KDF,</t>
      <t>A one-octet algorithm ID for the symmetric algorithm used to wrap the symmetric key for message encryption; see <xref target="ecdh"/> for details;</t>
    </list></t>
  <t>20 octets representing the UTF-8 encoding of the string <spanx style="verb">Anonymous Sender    </spanx>, which is the octet sequence 41 6E 6F 6E 79 6D 6F 75 73 20 53 65 6E 64 65 72 20 20 20 20;</t>
  <t>A variable-length field containing the fingerprint of the recipient encryption subkey identifying the key material that is needed for decryption.
For version 4 keys, this field is 20 octets.
For version 5 keys, this field is 32 octets.</t>
</list></t>

<t>The size in octets of the KDF parameters sequence, defined above, for encrypting to a v4 key is either 54 for curve NIST P-256, 51 for curves NIST P-384 and NIST P-521, 55 for curves brainpoolP256r1, brainpoolP384r1 and brainpoolP512r1, 56 for Curve25519, or 49 for X448.
For encrypting to a v5 key, the size of the sequence is either 66 for curve NIST P-256, 63 for curves NIST P-384 and NIST P-521, 67 for curves brainpoolP256r1, brainpoolP384r1 and brainpoolP512r1, 68 for Curve25519, or 61 for X448.</t>

<t>The key wrapping method is described in <xref target="RFC3394"/>.
The KDF produces a symmetric key that is used as a key-encryption key (KEK) as specified in <xref target="RFC3394"/>.
Refer to <xref target="ecdh-parameters"/> for the details regarding the choice of the KEK algorithm, which <bcp14>SHOULD</bcp14> be one of three AES algorithms.
Key wrapping and unwrapping is performed with the default initial value of <xref target="RFC3394"/>.</t>

<t>The input to the key wrapping method is the plaintext described in <xref target="pkesk"/>, "Public-Key Encrypted Session Key Packets (Tag 1)", padded using the method described in <xref target="PKCS5"/> to an 8-octet granularity.</t>

<t>For example, in a v4 Public-Key Encrypted Session Key packet, the following AES-256 session key, in which 32 octets are denoted from k0 to k31, is composed to form the following 40 octet sequence:</t>

<figure><artwork><![CDATA[
09 k0 k1 ... k31 s0 s1 05 05 05 05 05
]]></artwork></figure>

<t>The octets s0 and s1 above denote the checksum of the session key octets.
This encoding allows the sender to obfuscate the size of the symmetric encryption key used to encrypt the data.
For example, assuming that an AES algorithm is used for the session key, the sender <bcp14>MAY</bcp14> use 21, 13, and 5 octets of padding for AES-128, AES-192, and AES-256, respectively, to provide the same number of octets, 40 total, as an input to the key wrapping method.</t>

<t>In a v5 Public-Key Encrypted Session Key packet, the symmetric algorithm is not included, as described in <xref target="pkesk"/>.
For example, an AES-256 session key would be composed as follows:</t>

<figure><artwork><![CDATA[
k0 k1 ... k31 s0 s1 06 06 06 06 06 06
]]></artwork></figure>

<t>The octets k0 to k31 above again denote the session key, and the octets s0 and s1 denote the checksum.
In this case, assuming that an AES algorithm is used for the session key, the sender <bcp14>MAY</bcp14> use 22, 14, and 6 octets of padding for AES-128, AES-192, and AES-256, respectively, to provide the same number of octets, 40 total, as an input to the key wrapping method.</t>

<t>The output of the method consists of two fields.
The first field is the MPI containing the ephemeral key used to establish the shared secret.
The second field is composed of the following two subfields:</t>

<t><list style="symbols">
  <t>One octet encoding the size in octets of the result of the key wrapping method; the value 255 is reserved for future extensions;</t>
  <t>Up to 254 octets representing the result of the key wrapping method, applied to the 8-octet padded session key, as described above.</t>
</list></t>

<t>Note that for session key sizes 128, 192, and 256 bits, the size of the result of the key wrapping method is, respectively, 32, 40, and 48 octets, unless size obfuscation is used.</t>

<t>For convenience, the synopsis of the encoding method is given below; however, this section, <xref target="SP800-56A"/>, and <xref target="RFC3394"/> are the normative sources of the definition.</t>

<t><list style="symbols">
  <t>Obtain the authenticated recipient public key R</t>
  <t>Generate an ephemeral key pair {v, V=vG}</t>
  <t>Compute the shared point S = vR;</t>
  <t>m = symm_alg_ID || session key || checksum || pkcs5_padding;</t>
  <t>curve_OID_len = (octet)len(curve_OID);</t>
  <t>Param = curve_OID_len || curve_OID || public_key_alg_ID || 03 || 01 || KDF_hash_ID || KEK_alg_ID for AESKeyWrap || <spanx style="verb">Anonymous Sender    </spanx> || recipient_fingerprint;</t>
  <t>Z_len = the key size for the KEK_alg_ID used with AESKeyWrap</t>
  <t>Compute Z = KDF( S, Z_len, Param );</t>
  <t>Compute C = AESKeyWrap( Z, m ) as per <xref target="RFC3394"/></t>
  <t>VB = convert point V to the octet string</t>
  <t>Output (MPI(VB) || len(C) || C).</t>
</list></t>

<t>The decryption is the inverse of the method given.
Note that the recipient obtains the shared secret by calculating</t>

<figure><artwork><![CDATA[
S = rV = rvG, where (r,R) is the recipient's key pair.
]]></artwork></figure>

<section anchor="ecdh-parameters"><name>ECDH Parameters</name>

<t>ECDH keys have a hash algorithm parameter for key derivation and a symmetric algorithm for key encapsulation.</t>

<t>For v5 keys, the following algorithms <bcp14>MUST</bcp14> be used depending on the curve.
An implementation <bcp14>MUST NOT</bcp14> generate a v5 ECDH key over any listed curve that uses different KDF or KEK parameters.
An implementation <bcp14>MUST NOT</bcp14> encrypt any message to a v5 ECDH key over a listed curve that announces a different KDF or KEK parameter.</t>

<t>For v4 keys, the following algorithms <bcp14>SHOULD</bcp14> be used depending on the curve.
An implementation <bcp14>SHOULD</bcp14> only use an AES algorithm as a KEK algorithm.</t>

<texttable title="ECDH KDF and KEK parameters" anchor="ecdh-kdf-kek-parameters">
      <ttcol align='left'>Curve</ttcol>
      <ttcol align='left'>Hash algorithm</ttcol>
      <ttcol align='left'>Symmetric algorithm</ttcol>
      <c>NIST P-256</c>
      <c>SHA2-256</c>
      <c>AES-128</c>
      <c>NIST P-384</c>
      <c>SHA2-384</c>
      <c>AES-192</c>
      <c>NIST P-521</c>
      <c>SHA2-512</c>
      <c>AES-256</c>
      <c>brainpoolP256r1</c>
      <c>SHA2-256</c>
      <c>AES-128</c>
      <c>brainpoolP384r1</c>
      <c>SHA2-384</c>
      <c>AES-192</c>
      <c>brainpoolP512r1</c>
      <c>SHA2-512</c>
      <c>AES-256</c>
      <c>Curve25519</c>
      <c>SHA2-256</c>
      <c>AES-128</c>
      <c>X448</c>
      <c>SHA2-512</c>
      <c>AES-256</c>
</texttable>

</section>
</section>
</section>
<section anchor="notes-on-algorithms"><name>Notes on Algorithms</name>

<section anchor="pkcs-encoding"><name>PKCS#1 Encoding in OpenPGP</name>

<t>This standard makes use of the PKCS#1 functions EME-PKCS1-v1_5 and EMSA-PKCS1-v1_5.
However, the calling conventions of these functions has changed in the past.
To avoid potential confusion and interoperability problems, we are including local copies in this document, adapted from those in PKCS#1 v2.1 <xref target="RFC8017"/>.
<xref target="RFC8017"/> should be treated as the ultimate authority on PKCS#1 for OpenPGP.
Nonetheless, we believe that there is value in having a self-contained document that avoids problems in the future with needed changes in the conventions.</t>

<section anchor="eme-pkcs1-v15-encode"><name>EME-PKCS1-v1_5-ENCODE</name>

<t>Input:</t>

<dl>
  <dt>
k =  </dt>
  <dd>
    <t>the length in octets of the key modulus.</t>
  </dd>
  <dt>
M =  </dt>
  <dd>
    <t>message to be encoded, an octet string of length mLen, where mLen &lt;= k - 11.</t>
  </dd>
</dl>

<t>Output:</t>

<dl>
  <dt>
EM =  </dt>
  <dd>
    <t>encoded message, an octet string of length k.</t>
  </dd>
</dl>

<t>Error: "message too long".</t>

<t><list style="numbers">
  <t>Length checking: If mLen &gt; k - 11, output "message too long" and stop.</t>
  <t>Generate an octet string PS of length k - mLen - 3 consisting of pseudo-randomly generated nonzero octets.
The length of PS will be at least eight octets.</t>
  <t>Concatenate PS, the message M, and other padding to form an encoded message EM of length k octets as  <vspace blankLines='1'/>
    <figure><artwork><![CDATA[
EM = 0x00 || 0x02 || PS || 0x00 || M.
]]></artwork></figure>
  </t>
  <t>Output EM.</t>
</list></t>

</section>
<section anchor="eme-pkcs1-v15-decode"><name>EME-PKCS1-v1_5-DECODE</name>

<t>Input:</t>

<dl>
  <dt>
EM =  </dt>
  <dd>
    <t>encoded message, an octet string</t>
  </dd>
</dl>

<t>Output:</t>

<dl>
  <dt>
M =  </dt>
  <dd>
    <t>message, an octet string.</t>
  </dd>
</dl>

<t>Error: "decryption error".</t>

<t>To decode an EME-PKCS1_v1_5 message, separate the encoded message EM into an octet string PS consisting of nonzero octets and a message M as follows</t>

<figure><artwork><![CDATA[
  EM = 0x00 || 0x02 || PS || 0x00 || M.
]]></artwork></figure>

<t>If the first octet of EM does not have hexadecimal value 0x00, if the second octet of EM does not have hexadecimal value 0x02, if there is no octet with hexadecimal value 0x00 to separate PS from M, or if the length of PS is less than 8 octets, output "decryption error" and stop.
See also <xref target="pkcs1-errors"/> regarding differences in reporting between a decryption error and a padding error.</t>

</section>
<section anchor="emsa-pkcs1-v15"><name>EMSA-PKCS1-v1_5</name>

<t>This encoding method is deterministic and only has an encoding operation.</t>

<t>Option:</t>

<dl>
  <dt>
Hash -  </dt>
  <dd>
    <t>a hash function in which hLen denotes the length in octets of the hash function output.</t>
  </dd>
</dl>

<t>Input:</t>

<dl>
  <dt>
M =  </dt>
  <dd>
    <t>message to be encoded.</t>
  </dd>
  <dt>
emLen =  </dt>
  <dd>
    <t>intended length in octets of the encoded message, at least tLen + 11, where tLen is the octet length of the DER encoding T of a certain value computed during the encoding operation.</t>
  </dd>
</dl>

<t>Output:</t>

<dl>
  <dt>
EM =  </dt>
  <dd>
    <t>encoded message, an octet string of length emLen.</t>
  </dd>
</dl>

<t>Errors: "message too long"; "intended encoded message length too short".</t>

<t>Steps:</t>

<t><list style="numbers">
  <t>Apply the hash function to the message M to produce a hash value H:  <vspace blankLines='1'/>
H = Hash(M).  <vspace blankLines='1'/>
If the hash function outputs "message too long," output "message too long" and stop.</t>
  <t>Using the list in <xref target="version-three-sig"/>, produce an ASN.1 DER value for the hash function used.
Let T be the full hash prefix from the list, and let tLen be the length in octets of T.</t>
  <t>If emLen &lt; tLen + 11, output "intended encoded message length too short" and stop.</t>
  <t>Generate an octet string PS consisting of emLen - tLen - 3 octets with hexadecimal value 0xFF.
The length of PS will be at least 8 octets.</t>
  <t>Concatenate PS, the hash prefix T, and other padding to form the encoded message EM as  <vspace blankLines='1'/>
    <figure><artwork><![CDATA[
EM = 0x00 || 0x01 || PS || 0x00 || T.
]]></artwork></figure>
  </t>
  <t>Output EM.</t>
</list></t>

</section>
</section>
<section anchor="symmetric-algorithm-preferences"><name>Symmetric Algorithm Preferences</name>

<t>The symmetric algorithm preference is an ordered list of algorithms that the keyholder accepts.
Since it is found on a self-signature, it is possible that a keyholder may have multiple, different preferences.
For example, Alice may have AES-128 only specified for "alice@work.com" but Camellia-256, Twofish, and AES-128 specified for "alice@home.org".
Note that it is also possible for preferences to be in a subkey's binding signature.</t>

<t>Since AES-128 is the <bcp14>MUST</bcp14>-implement algorithm, if it is not explicitly in the list, it is tacitly at the end.
However, it is good form to place it there explicitly.
Note also that if an implementation does not implement the preference, then it is implicitly an AES-128-only implementation.
Note further that implementations conforming to previous versions of this standard <xref target="RFC4880"/> have TripleDES as its only <bcp14>MUST</bcp14>-implement algorithm.</t>

<t>An implementation <bcp14>MUST NOT</bcp14> use a symmetric algorithm that is not in the recipient's preference list.
When encrypting to more than one recipient, the implementation finds a suitable algorithm by taking the intersection of the preferences of the recipients.
Note that the <bcp14>MUST</bcp14>-implement algorithm, AES-128, ensures that the intersection is not null.
The implementation may use any mechanism to pick an algorithm in the intersection.</t>

<t>If an implementation can decrypt a message that a keyholder doesn't have in their preferences, the implementation <bcp14>SHOULD</bcp14> decrypt the message anyway, but <bcp14>MUST</bcp14> warn the keyholder that the protocol has been violated.
For example, suppose that Alice, above, has software that implements all algorithms in this specification.
Nonetheless, she prefers subsets for work or home.
If she is sent a message encrypted with IDEA, which is not in her preferences, the software warns her that someone sent her an IDEA-encrypted message, but it would ideally decrypt it anyway.</t>

<section anchor="plaintext"><name>Plaintext</name>

<t>Algorithm 0, "plaintext", may only be used to denote secret keys that are stored in the clear.
Implementations <bcp14>MUST NOT</bcp14> use plaintext in encrypted data packets; they must use Literal Data packets to encode unencrypted literal data.</t>

</section>
</section>
<section anchor="other-algorithm-preferences"><name>Other Algorithm Preferences</name>

<t>Other algorithm preferences work similarly to the symmetric algorithm preference, in that they specify which algorithms the keyholder accepts.
There are two interesting cases that other comments need to be made about, though, the compression preferences and the hash preferences.</t>

<section anchor="compression-preferences"><name>Compression Preferences</name>

<t>Like the algorithm preferences, an implementation <bcp14>MUST NOT</bcp14> use an algorithm that is not in the preference vector.
If Uncompressed (0) is not explicitly in the list, it is tacitly at the end.
That is, uncompressed messages may always be sent.</t>

<t>Note that earlier implementations may assume that the absence of compression preferences means that [ZIP(1), Uncompressed(0)] are preferred, and default to ZIP compression.
Therefore, an implementation that prefers uncompressed data <bcp14>SHOULD</bcp14> explicitly state this in the preferred compression algorithms.</t>

<section anchor="uncompressed"><name>Uncompressed</name>

<t>Algorithm 0, "uncompressed", may only be used to denote a preference for uncompressed data.
Implementations <bcp14>MUST NOT</bcp14> use uncompressed in Compressed Data packets; they must use Literal Data packets to encode uncompressed literal data.</t>

</section>
</section>
<section anchor="hash-algorithm-preferences"><name>Hash Algorithm Preferences</name>

<t>Typically, the choice of a hash algorithm is something the signer does, rather than the verifier, because a signer rarely knows who is going to be verifying the signature.
This preference, though, allows a protocol based upon digital signatures ease in negotiation.</t>

<t>Thus, if Alice is authenticating herself to Bob with a signature, it makes sense for her to use a hash algorithm that Bob's software uses.
This preference allows Bob to state in his key which algorithms Alice may use.</t>

<t>Since SHA2-256 is the <bcp14>MUST</bcp14>-implement hash algorithm, if it is not explicitly in the list, it is tacitly at the end.
However, it is good form to place it there explicitly.</t>

</section>
</section>
<section anchor="rsa-notes"><name>RSA</name>

<t>The PKCS1-v1_5 padding scheme, used by the RSA algorithms defined in this document, is no longer recommended, and its use is deprecated by <xref target="SP800-131A"/>.
Therefore, an implementation <bcp14>SHOULD NOT</bcp14> generate RSA keys.</t>

<t>There are algorithm types for RSA Sign-Only, and RSA Encrypt-Only keys.
These types are deprecated.
The "key flags" subpacket in a signature is a much better way to express the same idea, and generalizes it to all algorithms.
An implementation <bcp14>MUST NOT</bcp14> create such a key, but <bcp14>MAY</bcp14> interpret it.</t>

<t>An implementation <bcp14>MUST NOT</bcp14> generate RSA keys of size less than 3072 bits.
An implementation <bcp14>SHOULD NOT</bcp14> encrypt, sign or verify using RSA keys of size less than 3072 bits.
An implementation <bcp14>MUST NOT</bcp14> encrypt, sign or verify using RSA keys of size less than 2048 bits.
An implementation that decrypts a message using an RSA secret key of size less than 3072 bits <bcp14>SHOULD</bcp14> generate a deprecation warning that the key is too weak for modern use.</t>

</section>
<section anchor="dsa-notes"><name>DSA</name>

<t>DSA is expected to be deprecated in <xref target="FIPS186-5"/>.
Therefore, an implementation <bcp14>MUST NOT</bcp14> generate DSA keys.</t>

<t>An implementation <bcp14>MUST NOT</bcp14> sign or verify using DSA keys.</t>

</section>
<section anchor="elgamal-notes"><name>Elgamal</name>

<t>The PKCS1-v1_5 padding scheme, used by the Elgamal algorithm defined in this document, is no longer recommended, and its use is deprecated by <xref target="SP800-131A"/>.
Therefore, an implementation <bcp14>MUST NOT</bcp14> generate Elgamal keys.</t>

<t>An implementation <bcp14>MUST NOT</bcp14> encrypt using Elgamal keys.
An implementation that decrypts a message using an Elgamal secret key <bcp14>SHOULD</bcp14> generate a deprecation warning that the key is too weak for modern use.</t>

</section>
<section anchor="eddsa"><name>EdDSA</name>

<t>Although the EdDSA algorithm allows arbitrary data as input, its use with OpenPGP requires that a digest of the message is used as input (pre-hashed).
See <xref target="computing-signatures"/> for details.
Truncation of the resulting digest is never applied; the resulting digest value is used verbatim as input to the EdDSA algorithm.</t>

<t>For clarity: while <xref target="RFC8032"/> describes different variants of EdDSA, OpenPGP uses the "pure" variant (PureEdDSA).
The hashing that happens with OpenPGP is done as part of the standard OpenPGP signature process, and that hash itself is fed as the input message to the PureEdDSA algorithm.</t>

<t>As specified in <xref target="RFC8032"/>, Ed448 also expects a "context string".
In OpenPGP, Ed448 is used with the empty string as a context string.</t>

</section>
<section anchor="reserved-notes"><name>Reserved Algorithm Numbers</name>

<t>A number of algorithm IDs have been reserved for algorithms that would be useful to use in an OpenPGP implementation, yet there are issues that prevent an implementer from actually implementing the algorithm.
These are marked in <xref target="pubkey-algos"/> as "reserved for".</t>

<t>The reserved public-key algorithm X9.42 (21) does not have the necessary parameters, parameter order, or semantics defined.
The same is currently true for reserved public-key algorithms AEDH (23) and AEDSA (24).</t>

<t>Previous versions of OpenPGP permitted Elgamal <xref target="ELGAMAL"/> signatures with a public-key identifier of 20.
These are no longer permitted.
An implementation <bcp14>MUST NOT</bcp14> generate such keys.
An implementation <bcp14>MUST NOT</bcp14> generate Elgamal signatures.
See <xref target="BLEICHENBACHER"/>.</t>

</section>
<section anchor="cfb-mode"><name>OpenPGP CFB Mode</name>

<t>When using a version 1 Symmetrically Encrypted Integrity Protected Data packet (<xref target="version-one-seipd"/>) or --- for historic data --- a Symmetrically Encrypted Data packet (<xref target="sed"/>), OpenPGP does symmetric encryption using a variant of Cipher Feedback mode (CFB mode).
This section describes the procedure it uses in detail.
This mode is what is used for Symmetrically Encrypted Integrity Protected Data Packets (and the dangerously malleable --- and deprecated --- Symmetrically Encrypted Data Packets).
Some mechanisms for encrypting secret-key material also use CFB mode, as described in <xref target="secret-key-encryption"/>.</t>

<t>In the description below, the value BS is the block size in octets of the cipher.
Most ciphers have a block size of 8 octets.
The AES and Twofish have a block size of 16 octets.
Also note that the description below assumes that the IV and CFB arrays start with an index of 1 (unlike the C language, which assumes arrays start with a zero index).</t>

<t>OpenPGP CFB mode uses an initialization vector (IV) of all zeros, and prefixes the plaintext with BS+2 octets of random data, such that octets BS+1 and BS+2 match octets BS-1 and BS.
It does a CFB resynchronization after encrypting those BS+2 octets.</t>

<t>Thus, for an algorithm that has a block size of 8 octets (64 bits), the IV is 10 octets long and octets 7 and 8 of the IV are the same as octets 9 and 10.
For an algorithm with a block size of 16 octets (128 bits), the IV is 18 octets long, and octets 17 and 18 replicate octets 15 and 16.
Those extra two octets are an easy check for a correct key.</t>

<t>Step by step, here is the procedure:</t>

<t><list style="numbers">
  <t>The feedback register (FR) is set to the IV, which is all zeros.</t>
  <t>FR is encrypted to produce FRE (FR Encrypted).
This is the encryption of an all-zero value.</t>
  <t>FRE is xored with the first BS octets of random data prefixed to the plaintext to produce C[1] through C[BS], the first BS octets of ciphertext.</t>
  <t>FR is loaded with C[1] through C[BS].</t>
  <t>FR is encrypted to produce FRE, the encryption of the first BS octets of ciphertext.</t>
  <t>The left two octets of FRE get xored with the next two octets of data that were prefixed to the plaintext.
This produces C[BS+1] and C[BS+2], the next two octets of ciphertext.</t>
  <t>(The resynchronization step) FR is loaded with C[3] through C[BS+2].</t>
  <t>FR is encrypted to produce FRE.</t>
  <t>FRE is xored with the first BS octets of the given plaintext, now that we have finished encrypting the BS+2 octets of prefixed data.
This produces C[BS+3] through C[BS+(BS+2)], the next BS octets of ciphertext.</t>
  <t>FR is loaded with C[BS+3] to C[BS + (BS+2)] (which is C11-C18 for an 8-octet block).</t>
  <t>FR is encrypted to produce FRE.</t>
  <t>FRE is xored with the next BS octets of plaintext, to produce the next BS octets of ciphertext.
These are loaded into FR, and the process is repeated until the plaintext is used up.</t>
</list></t>

</section>
<section anchor="private-or-experimental-parameters"><name>Private or Experimental Parameters</name>

<t>S2K specifiers, Signature subpacket types, User Attribute types, image format types, and algorithms described in <xref target="constants"/> all reserve the range 100 to 110 for private and experimental use.
Packet types reserve the range 60 to 63 for private and experimental use.
These are intentionally managed with the PRIVATE USE method, as described in <xref target="RFC8126"/>.</t>

<t>However, implementations need to be careful with these and promote them to full IANA-managed parameters when they grow beyond the original, limited system.</t>

</section>
<section anchor="meta-considerations-for-expansion"><name>Meta-Considerations for Expansion</name>

<t>If OpenPGP is extended in a way that is not backwards-compatible, meaning that old implementations will not gracefully handle their absence of a new feature, the extension proposal can be declared in the key holder's self-signature as part of the Features signature subpacket.</t>

<t>We cannot state definitively what extensions will not be upwards-compatible, but typically new algorithms are upwards-compatible, whereas new packets are not.</t>

<t>If an extension proposal does not update the Features system, it <bcp14>SHOULD</bcp14> include an explanation of why this is unnecessary.
If the proposal contains neither an extension to the Features system nor an explanation of why such an extension is unnecessary, the proposal <bcp14>SHOULD</bcp14> be rejected.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t><list style="symbols">
  <t>As with any technology involving cryptography, you should check the current literature to determine if any algorithms used here have been found to be vulnerable to attack.</t>
  <t>This specification uses Public-Key Cryptography technologies.
It is assumed that the private key portion of a public-private key pair is controlled and secured by the proper party or parties.</t>
  <t>The MD5 hash algorithm has been found to have weaknesses, with collisions found in a number of cases.
MD5 is deprecated for use in OpenPGP.
Implementations <bcp14>MUST NOT</bcp14> generate new signatures using MD5 as a hash function.
They <bcp14>MAY</bcp14> continue to consider old signatures that used MD5 as valid.</t>
  <t>SHA2-224 and SHA2-384 require the same work as SHA2-256 and SHA2-512, respectively.
In general, there are few reasons to use them outside of DSS compatibility.
You need a situation where one needs more security than smaller hashes, but does not want to have the full 256-bit or 512-bit data length.</t>
  <t>Many security protocol designers think that it is a bad idea to use a single key for both privacy (encryption) and integrity (signatures).
In fact, this was one of the motivating forces behind the v4 key format with separate signature and encryption keys.
If you as an implementer promote dual-use keys, you should at least be aware of this controversy.</t>
  <t>The DSA algorithm will work with any hash, but is sensitive to the quality of the hash algorithm.
Verifiers should be aware that even if the signer used a strong hash, an attacker could have modified the signature to use a weak one.
Only signatures using acceptably strong hash algorithms should be accepted as valid.</t>
  <t>As OpenPGP combines many different asymmetric, symmetric, and hash algorithms, each with different measures of strength, care should be taken that the weakest element of an OpenPGP message is still sufficiently strong for the purpose at hand.
While consensus about the strength of a given algorithm may evolve, NIST Special Publication 800-57 <xref target="SP800-57"/> recommends the following list of equivalent strengths:</t>
</list></t>

<texttable title="Key length equivalences">
      <ttcol align='right'>Asymmetric key size</ttcol>
      <ttcol align='left'>Hash size</ttcol>
      <ttcol align='left'>Symmetric key size</ttcol>
      <c>1024</c>
      <c>160</c>
      <c>80</c>
      <c>2048</c>
      <c>224</c>
      <c>112</c>
      <c>3072</c>
      <c>256</c>
      <c>128</c>
      <c>7680</c>
      <c>384</c>
      <c>192</c>
      <c>15360</c>
      <c>512</c>
      <c>256</c>
</texttable>

<t><list style="symbols">
  <t>There is a somewhat-related potential security problem in signatures.
If an attacker can find a message that hashes to the same hash with a different algorithm, a bogus signature structure can be constructed that evaluates correctly.  <vspace blankLines='1'/>
For example, suppose Alice DSA signs message M using hash algorithm H.
Suppose that Mallet finds a message M' that has the same hash value as M with H'.
Mallet can then construct a signature block that verifies as Alice's signature of M' with H'.
However, this would also constitute a weakness in either H or H' or both.
Should this ever occur, a revision will have to be made to this document to revise the allowed hash algorithms.</t>
  <t>If you are building an authentication system, the recipient may specify a preferred signing algorithm.
However, the signer would be foolish to use a weak algorithm simply because the recipient requests it.</t>
  <t>Some of the encryption algorithms mentioned in this document have been analyzed less than others.
For example, although CAST5 is presently considered strong, it has been analyzed less than TripleDES.
Other algorithms may have other controversies surrounding them.</t>
  <t>In late summer 2002, Jallad, Katz, and Schneier published an interesting attack on older versions of the OpenPGP protocol and some of its implementations <xref target="JKS02"/>.
In this attack, the attacker modifies a message and sends it to a user who then returns the erroneously decrypted message to the attacker.
The attacker is thus using the user as a decryption oracle, and can often decrypt the message.
This attack is a particular form of ciphertext malleability.
See <xref target="ciphertext-malleability"/> for information on how to defend against such an attack using more recent versions of OpenPGP.</t>
  <t>Some technologies mentioned here may be subject to government control in some countries.</t>
</list></t>

<section anchor="sha1cd"><name>SHA-1 Collision Detection</name>

<t>As described in <xref target="SHAMBLES"/>, the SHA-1 digest algorithm is not collision-resistant.
However, an OpenPGP implementation cannot completely discard the SHA-1 algorithm, because it is required for implementing and reasoning about v4 public keys.
In particular, the v4 fingerprint derivation uses SHA-1.
So as long as an OpenPGP implementation supports v4 public keys, it will need to implement SHA-1 in at least some scenarios.</t>

<t>To avoid the risk of uncertain breakage from a maliciously introduced SHA-1 collision, an OpenPGP implementation <bcp14>MAY</bcp14> attempt to detect when a hash input is likely from a known collision attack, and then either deliberately reject the hash input or modify the hash output.
This should convert an uncertain breakage (where it is unclear what the effect of a collision will be) to an explicit breakage, which is more desirable for a robust implementation.</t>

<t><xref target="STEVENS2013"/> describes a method for detecting indicators of well-known SHA-1 collision attacks.
Some example C code implementing this technique can be found at <xref target="SHA1CD"/>.</t>

</section>
<section anchor="signature-salt-rationale"><name>Advantages of Salted Signatures</name>

<t>V5 signatures include a 128 bit salt that is hashed first.
This makes v5 OpenPGP signatures non-deterministic and protects against a broad class of attacks that depend on creating a signature over a predictable message.
By selecting a new random salt for each signature made, signatures are not predictable.</t>

<t>When the material to be signed may be attacker-controlled, hashing the salt first means that there is no attacker controlled hashed prefix.
An example of this kind of attack is described in the paper SHA-1 Is A Shambles (see <xref target="SHAMBLES"/>), which leverages a chosen prefix collision attack against SHA-1.</t>

<t>In some cases, an attacker may be able to induce a signature to be made, even if they do not control the content of the message.
In some scenarios, a repeated signature over the exact same message may risk leakage of part or all of the signing key, for example see discussion of hardware faults over EdDSA and deterministic ECDSA in <xref target="PSSLR17"/>.
Choosing a new random salt for each signature ensures that no repeated signatures are produced, and mitigates this risk.</t>

</section>
<section anchor="ecc-side-channels"><name>Elliptic Curve Side Channels</name>

<t>Side channel attacks are a concern when a compliant application's use of the OpenPGP format can be modeled by a decryption or signing oracle, for example, when an application is a network service performing decryption to unauthenticated remote users.
ECC scalar multiplication operations used in ECDSA and ECDH are vulnerable to side channel attacks.
Countermeasures can often be taken at the higher protocol level, such as limiting the number of allowed failures or time-blinding of the operations associated with each network interface.
Mitigations at the scalar multiplication level seek to eliminate any measurable distinction between the ECC point addition and doubling operations.</t>

</section>
<section anchor="quick-check-oracle"><name>Risks of a Quick Check Oracle</name>

<t>In winter 2005, Serge Mister and Robert Zuccherato from Entrust released a paper describing a way that the "quick check" in OpenPGP CFB mode (used by v1 SEIPD and SED packets) can be as an oracle to decrypt two octets of every cipher block <xref target="MZ05"/>.
This check was intended for early detection of session key decryption errors, particularly to detect a wrong passphrase, since v4 SKESK packets do not include an integrity check.</t>

<t>There is a danger to using the quick check if timing or error information about the check can be exposed to an attacker, particularly via an automated service that allows rapidly repeated queries.</t>

<t>Disabling the quick check prevents the attack.</t>

<t>For very large legacy encrypted data whose session key is protected by a passphrase (v4 SKESK), while the quick check may be convenient to the user to be informed early on that they typed the wrong passphrase, the implementation should use the quick check with care.
The recommended approach for secure and early detection of decryption failure is to encrypt data using v2 SEIPD.
If the session key is public-key encrypted, the quick check is not useful as the public-key encryption of the session key should guarantee that it is the right session key.</t>

<t>The quick check oracle attack is a particular type of attack that exploits ciphertext malleability.
For information about other similar attacks, see <xref target="ciphertext-malleability"/>.</t>

</section>
<section anchor="pkcs1-errors"><name>Avoiding Leaks From PKCS#1 Errors</name>

<t>The PKCS#1 padding (used in RSA-encrypted and ElGamal-encrypted PKESK) has been found to be vulnerable to attacks in which a system that allows distinguishing padding errors from other decryption errors can act as a decryption and/or signing oracle that can leak the session key or allow signing arbitrary data, respectively <xref target="BLEICHENBACHER-PKCS1"/>.
The number of queries required to carry out an attack can range from thousands to millions, depending on how strict and careful an implementation is in processing the padding.</t>

<t>To make the attack more difficult, an implementation <bcp14>SHOULD</bcp14> implement strict, robust, constant time padding checks.</t>

<t>To prevent the attack, in settings where the attacker does not have access to timing information concerning message decryption, the simplest solution is to report a single error code for all variants of PKESK processing errors as well as SEIPD integrity errors (this includes also session key parsing errors, such as on invalid cipher algorithm for v3 PKESK, or session key size mismatch for v5 PKESK).
If the attacker may have access to timing information, then a constant time solution is also needed.
This requires careful design, especially for v3 PKESK, where session key size and cipher information is typically not known in advance, as it is part of the PKESK encrypted payload.</t>

</section>
<section anchor="fingerprint-usability"><name>Fingerprint Usability</name>

<t>This specification uses fingerprints in several places on the wire (e.g., <xref target="revocation-key"/>, <xref target="issuer-fingerprint-subpacket"/>, and <xref target="intended-recipient-fingerprint"/>), and in processing (e.g., in ECDH KDF <xref target="ecdh"/>).
An implementation may also use the fingerprint internally, for example as an index to a keystore.</t>

<t>Additionally, some OpenPGP users have historically used manual fingerprint comparison to verify the public key of a peer.
For a version 4 fingerprint, this has typically been done with the fingerprint represented as 40 hexadecimal digits, often broken into groups of four digits with whitespace between each group.</t>

<t>When a human is actively involved, the result of such a verification is dubious.
We have little evidence that most humans are good at precise comparison of high-entropy data, particularly when that data is represented in compact textual form like a hexadecimal fingerprint.</t>

<t>The version 5 fingerprint makes the challenge for a human verifier even worse.
At 256 bits (compared to v4's 160 bit fingerprint), a v5 fingerprint is even harder for a human to successfully compare.</t>

<t>An OpenPGP implementation should prioritize mechanical fingerprint transfer and comparison where possible, and <bcp14>SHOULD NOT</bcp14> promote manual transfer or comparison of full fingerprints by a human unless there is no other way to achieve the desired result.</t>

<t>While this subsection acknowledges existing practice for human-representable v4 fingerprints, this document does not attempt to standardize any specific human-readable form of v5 fingerprint for this discouraged use case.</t>

<t>NOTE: the topic of interoperable human-in-the-loop key verification needs more work, probably in a separate document.</t>

</section>
<section anchor="ciphertext-malleability"><name>Avoiding Ciphertext Malleability</name>

<t>If ciphertext can be modified by an attacker but still subsequently decrypted to some new plaintext, it is considered "malleable".
A number of attacks can arise in any cryptosystem that uses malleable encryption, so modern OpenPGP offers mechanisms to defend against it.
However, legacy OpenPGP data may have been created before these mechanisms were available.
Because OpenPGP implementations deal with historic stored data, they may encounter malleable ciphertexts.</t>

<t>When an OpenPGP implementation discovers that it is decrypting data that appears to be malleable, it <bcp14>MUST</bcp14> indicate a clear error message that the integrity of the message is suspect, <bcp14>SHOULD NOT</bcp14> attempt to parse nor release decrypted data to the user, and <bcp14>SHOULD</bcp14> halt with an error.
Parsing or releasing decrypted data before having confirmed its integrity can leak the decrypted data <xref target="EFAIL"/>, <xref target="MRLG15"/>.</t>

<t>In the case of AEAD encrypted data, if the authentication tag fails to verify, the implementation <bcp14>MUST NOT</bcp14> attempt to parse nor release decrypted data to the user, and <bcp14>MUST</bcp14> halt with an error.</t>

<t>An implementation that encounters malleable ciphertext <bcp14>MAY</bcp14> choose to release cleartext to the user if it is not encrypted using AEAD, and it is known to be dealing with historic archived legacy data, and the user is aware of the risks.</t>

<t>In the case of AEAD encrypted messages, if the message is truncated, i.e. the final zero-octet chunk and possibly (part of) some chunks before it are missing, the implementation <bcp14>MAY</bcp14> choose to release cleartext from fully authenticated chunks before it to the user if it is operating in a streaming fashion, but it <bcp14>MUST</bcp14> indicate a clear error message as soon as the truncation is detected.</t>

<t>Any of the following OpenPGP data elements indicate that malleable ciphertext is present:</t>

<t><list style="symbols">
  <t>all Symmetrically Encrypted Data packets (<xref target="sed"/>).</t>
  <t>within any encrypted container, any Compressed Data packet (<xref target="compressed-data"/>) where there is a decompression failure.</t>
  <t>any version 1 Symmetrically Encrypted Integrity Protected Data packet (<xref target="version-one-seipd"/>) where the internal Modification Detection Code does not validate.</t>
  <t>any version 2 Symmetrically Encrypted Integrity Protected Data packet (<xref target="version-two-seipd"/>) where the authentication tag of any chunk fails, or where there is no final zero-octet chunk.</t>
  <t>any Secret Key packet with encrypted secret key material (<xref target="secret-key-encryption"/>) where there is an integrity failure, based on the value of the secret key protection octet:  <list style="symbols">
      <t>value 255 or raw cipher algorithm: where the trailing 2-octet checksum does not match.</t>
      <t>value 254: where the SHA1 checksum is mismatched.</t>
      <t>value 253: where the AEAD authentication tag is invalid.</t>
    </list></t>
</list></t>

<t>To avoid these circumstances, an implementation that generates OpenPGP encrypted data <bcp14>SHOULD</bcp14> select the encrypted container format with the most robust protections that can be handled by the intended recipients.
In particular:</t>

<t><list style="symbols">
  <t>The SED packet is deprecated, and <bcp14>MUST NOT</bcp14> be generated.</t>
  <t>When encrypting to one or more public keys:  <list style="symbols">
      <t>all recipient keys indicate support for version 2 of the Symmetrically Encrypted Integrity Protected Data packet in their Features subpacket (<xref target="features-subpacket"/>), or are v5 keys without a Features subpacket, or the implementation can otherwise infer that all recipients support v2 SEIPD packets, the implementation <bcp14>MUST</bcp14> encrypt using a v2 SEIPD packet.</t>
      <t>If one of the recipients does not support v2 SEIPD packets, then the message generator <bcp14>MAY</bcp14> use a v1 SEIPD packet instead.</t>
    </list></t>
  <t>Password-protected secret key material in a v5 Secret Key or v5 Secret Subkey packet <bcp14>SHOULD</bcp14> be protected with AEAD encryption (S2K usage octet 253) unless it will be transferred to an implementation that is known to not support AEAD.
Implementations should be aware that, in scenarios where an attacker has access to encrypted private keys, CFB-encrypted keys (S2K usage octet 254 or 255) are vulnerable to corruption attacks that can cause leakage of secret data when the secret key is used <xref target="KOPENPGP"/>, <xref target="KR02"/>.</t>
</list></t>

<t>Implementers should implement AEAD (v2 SEIPD and S2K usage octet 253) promptly and encourage its spread.</t>

<t>Users should migrate to AEAD with all due speed.</t>

</section>
<section anchor="escrowed-revocations"><name>Escrowed Revocation Signatures</name>

<t>A keyholder Alice may wish to designate a third party to be able to revoke Alice's own key.</t>

<t>The preferred way for her to do this is produce a specific Revocation Signature (signature types 0x20, 0x28, or 0x30) and distribute it securely to her preferred revoker who can hold it in escrow.
The preferred revoker can then publish the escrowed Revocation Signature at whatever time is deemed appropriate, rather than generating a revocation signature themselves.</t>

<t>There are multiple advantages of using an escrowed Revocation Signature over the deprecated Revocation Key subpacket (<xref target="revocation-key"/>):</t>

<t><list style="symbols">
  <t>The keyholder can constrain what types of revocation the preferred revoker can issue, by only escrowing those specific signatures.</t>
  <t>There is no public/visible linkage between the keyholder and the preferred revoker.</t>
  <t>Third parties can verify the revocation without needing to find the key of the preferred revoker.</t>
  <t>The preferred revoker doesn't even need to have a public OpenPGP key if some other secure transport is possible between them and the keyholder.</t>
  <t>Implementation support for enforcing a revocation from an authorized Revocation Key subpacket is uneven and unreliable.</t>
  <t>If the fingerprint mechanism suffers a cryptanalytic flaw, the escrowed Revocation Signature is not affected.</t>
</list></t>

<t>A Revocation Signature may also be split up into shares and distributed among multiple parties, requiring some subset of those parties to collaborate before the escrowed Revocation Signature is recreated.</t>

</section>
<section anchor="random-number-generation-and-seeding"><name>Random Number Generation and Seeding</name>

<t>OpenPGP requires a cryptographically secure pseudorandom number generator (CSPRNG).
In most cases, the operating system provides an appropriate facility such as a <spanx style="verb">getrandom()</spanx> syscall, which should be used absent other (for example, performance) concerns.
It is <bcp14>RECOMMENDED</bcp14> to use an existing CSPRNG implementation in preference to crafting a new one.
Many adequate cryptographic libraries are already available under favorable license terms.
Should those prove unsatisfactory, <xref target="RFC4086"/> provides guidance on the generation of random values.</t>

<t>OpenPGP uses random data with three different levels of visibility:</t>

<t><list style="symbols">
  <t>in publicly-visible fields such as nonces, IVs, public padding material, or salts,</t>
  <t>in shared-secret values, such as session keys for encrypted data or padding material within an encrypted packet, and</t>
  <t>in entirely private data, such as asymmetric key generation.</t>
</list></t>

<t>With a properly functioning CSPRNG, this does not present a security problem, as it is not feasible to determine the CSPRNG state from its output.
However, with a broken CSPRNG, it may be possible for an attacker to use visible output to determine the CSPRNG internal state and thereby predict less-visible data like keying material, as documented in <xref target="CHECKOWAY"/>.</t>

<t>An implementation can provide extra security against this form of attack by using separate CSPRNGs to generate random data with different levels of visibility.</t>

</section>
<section anchor="traffic-analysis"><name>Traffic Analysis</name>

<t>When sending OpenPGP data through the network, the size of the data may leak information to an attacker.
There are circumstances where such a leak could be unacceptable from a security perspective.</t>

<t>For example, if possible cleartext messages for a given protocol are known to be either <spanx style="verb">yes</spanx> (three octets) and <spanx style="verb">no</spanx> (two octets) and the messages are sent within a Symmetrically-Encrypted Integrity Protected Data packet, the length of the encrypted message will reveal the contents of the cleartext.</t>

<t>In another example, sending an OpenPGP Transferable Public Key over an encrypted network connection might reveal the length of the certificate.
Since the length of an OpenPGP certificate varies based on the content, an external observer interested in metadata (who is trying to contact who) may be able to guess the identity of the certificate sent, if its length is unique.</t>

<t>In both cases, an implementation can adjust the size of the compound structure by including a Padding packet (see <xref target="padding-packet"/>).</t>

</section>
<section anchor="surreptitious-forwarding"><name>Surreptitious Forwarding</name>

<t>When an attacker obtains a signature for some text, e.g. by receiving a signed message, they may be able to use that signature maliciously by sending a message purporting to come from the original sender, with the same body and signature, to a different recipient.
To prevent this, implementations <bcp14>SHOULD</bcp14> implement the Intended Recipient Fingerprint signature subpacket (<xref target="intended-recipient-fingerprint"/>).</t>

</section>
</section>
<section anchor="implementation-nits"><name>Implementation Nits</name>

<t>This section is a collection of comments to help an implementer, particularly with an eye to backward compatibility.
Often the differences are small, but small differences are frequently more vexing than large differences.
Thus, this is a non-comprehensive list of potential problems and gotchas for a developer who is trying to be backward-compatible.</t>

<t><list style="symbols">
  <t>There are many ways possible for two keys to have the same key material, but different fingerprints (and thus Key IDs).
For example, since a v4 fingerprint is constructed by hashing the key creation time along with other things, two v4 keys created at different times, yet with the same key material will have different fingerprints.</t>
  <t>OpenPGP does not put limits on the size of public keys.
However, larger keys are not necessarily better keys.
Larger keys take more computation time to use, and this can quickly become impractical.
Different OpenPGP implementations may also use different upper bounds for public key sizes, and so care should be taken when choosing sizes to maintain interoperability.</t>
  <t>ASCII armor is an optional feature of OpenPGP.
The OpenPGP working group strives for a minimal set of mandatory-to-implement features, and since there could be useful implementations that only use binary object formats, this is not a "<bcp14>MUST</bcp14>" feature for an implementation.
For example, an implementation that is using OpenPGP as a mechanism for file signatures may find ASCII armor unnecessary.
OpenPGP permits an implementation to declare what features it does and does not support, but ASCII armor is not one of these.
Since most implementations allow binary and armored objects to be used indiscriminately, an implementation that does not implement ASCII armor may find itself with compatibility issues with general-purpose implementations.
Moreover, implementations of OpenPGP-MIME <xref target="RFC3156"/> already have a requirement for ASCII armor so those implementations will necessarily have support.</t>
  <t>What this document calls Legacy packet format <xref target="legacy-packet-format"/> is what older documents called the "old packet format".
It is the packet format of the legacy PGP 2 implementation.
Older RFCs called the current OpenPGP packet format <xref target="openpgp-packet-format"/> the "new packet format".</t>
</list></t>

<section anchor="constrained-legacy-fingerprint-storage-for-v5-keys"><name>Constrained Legacy Fingerprint Storage for v5 Keys</name>

<t>Some OpenPGP implementations have fixed length constraints for key fingerprint storage that will not fit all 32 octets of a v5 fingerprint.
For example, <xref target="OPENPGPCARD"/> reserves 20 octets for each stored fingerprint.</t>

<t>An OpenPGP implementation <bcp14>MUST NOT</bcp14> attempt to map any part of a v5 fingerprint to such a constrained field unless the relevant spec for the constrained environment has explicit guidance for storing a v5 fingerprint that distinguishes it from a v4 fingerprint.
An implementation interacting with such a constrained field <bcp14>SHOULD</bcp14> directly calculate the v5 fingerprint from public key material and associated metadata instead of relying on the constrained field.</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="BLOWFISH" target="http://www.counterpane.com/bfsverlag.html">
  <front>
    <title>Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)</title>
    <author initials="B." surname="Schneier">
      <organization></organization>
    </author>
    <date year="1993" month="December"/>
  </front>
  <seriesInfo name="Fast Software Encryption, Cambridge Security Workshop Proceedings" value="Springer-Verlag, 1994, pp191-204"/>
</reference>
<reference anchor="BZ2" target="http://www.bzip.org/">
  <front>
    <title>The Bzip2 and libbzip2 home page</title>
    <author initials="J." surname="Seward" fullname="Julian Seward, jseward@acm.org">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="EAX" >
  <front>
    <title>A Conventional Authenticated-Encryption Mode</title>
    <author initials="M." surname="Bellare">
      <organization></organization>
    </author>
    <author initials="P." surname="Rogaway">
      <organization></organization>
    </author>
    <author initials="D." surname="Wagner">
      <organization></organization>
    </author>
    <date year="2003" month="April"/>
  </front>
</reference>
<reference anchor="ELGAMAL" >
  <front>
    <title>A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms</title>
    <author initials="T." surname="Elgamal">
      <organization></organization>
    </author>
    <date year="1985"/>
  </front>
  <seriesInfo name="IEEE Transactions on Information Theory" value="v. IT-31, n. 4, 1985, pp. 469-472"/>
</reference>
<reference anchor="HAC" >
  <front>
    <title>Handbook of Applied Cryptography</title>
    <author initials="A.J." surname="Menezes" fullname="Alfred J. Menezes">
      <organization></organization>
    </author>
    <author initials="P.v." surname="Oorschot" fullname="Paul van Oorschot">
      <organization></organization>
    </author>
    <author initials="S." surname="Vanstone" fullname="Scott Vanstone">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
</reference>
<reference anchor="IDEA" >
  <front>
    <title>On the design and security of block ciphers</title>
    <author initials="X." surname="Lai">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
  <seriesInfo name="ETH Series in Information Processing, J.L. Massey (editor)" value="Vol. 1, Hartung-Gorre Verlag Konstanz, Technische Hochschule (Zurich)"/>
</reference>
<reference anchor="ISO10646" >
  <front>
    <title>Information Technology - Universal Multiple-octet coded Character Set (UCS) - Part 1: Architecture and Basic Multilingual Plane</title>
    <author >
      <organization>International Organization for Standardization</organization>
    </author>
    <date year="1993" month="May"/>
  </front>
  <seriesInfo name="ISO" value="Standard 10646-1"/>
</reference>
<reference anchor="JFIF" >
  <front>
    <title>JPEG File Interchange Format (Version 1.02).</title>
    <author initials="E.H.M." surname="CA" fullname="Eric Hamilton, Milpitas, CA">
      <organization>C-Cube Microsystems</organization>
    </author>
    <date year="1996" month="September"/>
  </front>
</reference>
<reference anchor="PKCS5" >
  <front>
    <title>PKCS #5 v2.0: Password-Based Cryptography Standard</title>
    <author >
      <organization>RSA Laboratories</organization>
    </author>
    <date year="1999" month="March" day="25"/>
  </front>
</reference>




<reference anchor='RFC1950' target='https://www.rfc-editor.org/info/rfc1950'>
<front>
<title>ZLIB Compressed Data Format Specification version 3.3</title>
<author fullname='P. Deutsch' initials='P.' surname='Deutsch'><organization/></author>
<author fullname='J-L. Gailly' initials='J-L.' surname='Gailly'><organization/></author>
<date month='May' year='1996'/>
<abstract><t>This specification defines a lossless compressed data format.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1950'/>
<seriesInfo name='DOI' value='10.17487/RFC1950'/>
</reference>



<reference anchor='RFC1951' target='https://www.rfc-editor.org/info/rfc1951'>
<front>
<title>DEFLATE Compressed Data Format Specification version 1.3</title>
<author fullname='P. Deutsch' initials='P.' surname='Deutsch'><organization/></author>
<date month='May' year='1996'/>
<abstract><t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1951'/>
<seriesInfo name='DOI' value='10.17487/RFC1951'/>
</reference>



<reference anchor='RFC2045' target='https://www.rfc-editor.org/info/rfc2045'>
<front>
<title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<author fullname='N. Borenstein' initials='N.' surname='Borenstein'><organization/></author>
<date month='November' year='1996'/>
<abstract><t>This initial document specifies the various headers used to describe the structure of MIME messages.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2045'/>
<seriesInfo name='DOI' value='10.17487/RFC2045'/>
</reference>



<reference anchor='RFC2144' target='https://www.rfc-editor.org/info/rfc2144'>
<front>
<title>The CAST-128 Encryption Algorithm</title>
<author fullname='C. Adams' initials='C.' surname='Adams'><organization/></author>
<date month='May' year='1997'/>
<abstract><t>There is a need in the Internet community for an unencumbered encryption algorithm with a range of key sizes that can provide security for a variety of cryptographic applications and protocols.  This document describes an existing algorithm that can be used to satisfy this requirement.  This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='2144'/>
<seriesInfo name='DOI' value='10.17487/RFC2144'/>
</reference>



<reference anchor='RFC2822' target='https://www.rfc-editor.org/info/rfc2822'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='April' year='2001'/>
<abstract><t>This document specifies a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2822'/>
<seriesInfo name='DOI' value='10.17487/RFC2822'/>
</reference>



<reference anchor='RFC3156' target='https://www.rfc-editor.org/info/rfc3156'>
<front>
<title>MIME Security with OpenPGP</title>
<author fullname='M. Elkins' initials='M.' surname='Elkins'><organization/></author>
<author fullname='D. Del Torto' initials='D.' surname='Del Torto'><organization/></author>
<author fullname='R. Levien' initials='R.' surname='Levien'><organization/></author>
<author fullname='T. Roessler' initials='T.' surname='Roessler'><organization/></author>
<date month='August' year='2001'/>
<abstract><t>This document describes how the OpenPGP Message Format can be used to provide privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC 1847. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3156'/>
<seriesInfo name='DOI' value='10.17487/RFC3156'/>
</reference>



<reference anchor='RFC3394' target='https://www.rfc-editor.org/info/rfc3394'>
<front>
<title>Advanced Encryption Standard (AES) Key Wrap Algorithm</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='September' year='2002'/>
</front>
<seriesInfo name='RFC' value='3394'/>
<seriesInfo name='DOI' value='10.17487/RFC3394'/>
</reference>



<reference anchor='RFC3629' target='https://www.rfc-editor.org/info/rfc3629'>
<front>
<title>UTF-8, a transformation format of ISO 10646</title>
<author fullname='F. Yergeau' initials='F.' surname='Yergeau'><organization/></author>
<date month='November' year='2003'/>
<abstract><t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems.  The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo.  UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values.  This memo obsoletes and replaces RFC 2279.</t></abstract>
</front>
<seriesInfo name='STD' value='63'/>
<seriesInfo name='RFC' value='3629'/>
<seriesInfo name='DOI' value='10.17487/RFC3629'/>
</reference>



<reference anchor='RFC3713' target='https://www.rfc-editor.org/info/rfc3713'>
<front>
<title>A Description of the Camellia Encryption Algorithm</title>
<author fullname='M. Matsui' initials='M.' surname='Matsui'><organization/></author>
<author fullname='J. Nakajima' initials='J.' surname='Nakajima'><organization/></author>
<author fullname='S. Moriai' initials='S.' surname='Moriai'><organization/></author>
<date month='April' year='2004'/>
<abstract><t>This document describes the Camellia encryption algorithm.  Camellia is a block cipher with 128-bit block size and 128-, 192-, and 256-bit keys.  The algorithm description is presented together with key scheduling part and data randomizing part.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3713'/>
<seriesInfo name='DOI' value='10.17487/RFC3713'/>
</reference>



<reference anchor='RFC4086' target='https://www.rfc-editor.org/info/rfc4086'>
<front>
<title>Randomness Requirements for Security</title>
<author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'><organization/></author>
<author fullname='J. Schiller' initials='J.' surname='Schiller'><organization/></author>
<author fullname='S. Crocker' initials='S.' surname='Crocker'><organization/></author>
<date month='June' year='2005'/>
<abstract><t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t><t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='106'/>
<seriesInfo name='RFC' value='4086'/>
<seriesInfo name='DOI' value='10.17487/RFC4086'/>
</reference>



<reference anchor='RFC7253' target='https://www.rfc-editor.org/info/rfc7253'>
<front>
<title>The OCB Authenticated-Encryption Algorithm</title>
<author fullname='T. Krovetz' initials='T.' surname='Krovetz'><organization/></author>
<author fullname='P. Rogaway' initials='P.' surname='Rogaway'><organization/></author>
<date month='May' year='2014'/>
<abstract><t>This document specifies OCB, a shared-key blockcipher-based encryption scheme that provides confidentiality and authenticity for plaintexts and authenticity for associated data.  This document is a product of the Crypto Forum Research Group (CFRG).</t></abstract>
</front>
<seriesInfo name='RFC' value='7253'/>
<seriesInfo name='DOI' value='10.17487/RFC7253'/>
</reference>



<reference anchor='RFC7748' target='https://www.rfc-editor.org/info/rfc7748'>
<front>
<title>Elliptic Curves for Security</title>
<author fullname='A. Langley' initials='A.' surname='Langley'><organization/></author>
<author fullname='M. Hamburg' initials='M.' surname='Hamburg'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='January' year='2016'/>
<abstract><t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t></abstract>
</front>
<seriesInfo name='RFC' value='7748'/>
<seriesInfo name='DOI' value='10.17487/RFC7748'/>
</reference>



<reference anchor='RFC8017' target='https://www.rfc-editor.org/info/rfc8017'>
<front>
<title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
<author fullname='K. Moriarty' initials='K.' role='editor' surname='Moriarty'><organization/></author>
<author fullname='B. Kaliski' initials='B.' surname='Kaliski'><organization/></author>
<author fullname='J. Jonsson' initials='J.' surname='Jonsson'><organization/></author>
<author fullname='A. Rusch' initials='A.' surname='Rusch'><organization/></author>
<date month='November' year='2016'/>
<abstract><t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t><t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t><t>This document also obsoletes RFC 3447.</t></abstract>
</front>
<seriesInfo name='RFC' value='8017'/>
<seriesInfo name='DOI' value='10.17487/RFC8017'/>
</reference>



<reference anchor='RFC8032' target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<author fullname='I. Liusvaara' initials='I.' surname='Liusvaara'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>



<reference anchor='RFC8126' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>



<reference anchor='RFC9106' target='https://www.rfc-editor.org/info/rfc9106'>
<front>
<title>Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications</title>
<author fullname='A. Biryukov' initials='A.' surname='Biryukov'><organization/></author>
<author fullname='D. Dinu' initials='D.' surname='Dinu'><organization/></author>
<author fullname='D. Khovratovich' initials='D.' surname='Khovratovich'><organization/></author>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<date month='September' year='2021'/>
<abstract><t>This document describes the Argon2 memory-hard function for password hashing and proof-of-work applications.  We provide an implementer-oriented description with test vectors.  The purpose is to simplify adoption of Argon2 for Internet protocols.  This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t></abstract>
</front>
<seriesInfo name='RFC' value='9106'/>
<seriesInfo name='DOI' value='10.17487/RFC9106'/>
</reference>


<reference anchor="SCHNEIER" >
  <front>
    <title>Applied Cryptography Second Edition: protocols, algorithms, and source code in C</title>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
</reference>
<reference anchor="SP800-38D" >
  <front>
    <title>Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</title>
    <author initials="M." surname="Dworkin">
      <organization></organization>
    </author>
    <date year="2007" month="November"/>
  </front>
  <seriesInfo name="NIST Special Publication" value="800-38D"/>
</reference>
<reference anchor="SP800-56A" >
  <front>
    <title>Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography</title>
    <author initials="E." surname="Barker">
      <organization></organization>
    </author>
    <author initials="D." surname="Johnson">
      <organization></organization>
    </author>
    <author initials="M." surname="Smid">
      <organization></organization>
    </author>
    <date year="2007" month="March"/>
  </front>
  <seriesInfo name="NIST Special Publication" value="800-56A Revision 1"/>
</reference>
<reference anchor="TWOFISH" >
  <front>
    <title>The Twofish Encryption Algorithm</title>
    <author initials="B." surname="Schneier">
      <organization></organization>
    </author>
    <author initials="J." surname="Kelsey">
      <organization></organization>
    </author>
    <author initials="D." surname="Whiting">
      <organization></organization>
    </author>
    <author initials="D." surname="Wagner">
      <organization></organization>
    </author>
    <author initials="C." surname="Hall">
      <organization></organization>
    </author>
    <author initials="N." surname="Ferguson">
      <organization></organization>
    </author>
    <date year="1999"/>
  </front>
</reference>




<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='FIPS186' target='http://dx.doi.org/10.6028/nist.fips.186-4'>
  <front>
    <title>Digital Signature Standard (DSS)</title>
    <author fullname='Information Technology Laboratory'/>
    <author>
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date month='July' year='2013'/>
  </front>
  <seriesInfo name='DOI' value='10.6028/nist.fips.186-4'/>
</reference>

<reference anchor='AES' target='http://dx.doi.org/10.6028/nist.fips.197'>
  <front>
    <title>Advanced encryption standard (AES)</title>
    <author fullname='National Institute of Standards and Technology'/>
    <author>
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date month='November' year='2001'/>
  </front>
  <seriesInfo name='DOI' value='10.6028/nist.fips.197'/>
</reference>

<reference anchor='FIPS180' target='http://dx.doi.org/10.6028/nist.fips.180-4'>
  <front>
    <title>Secure Hash Standard</title>
    <author fullname='Quynh H. Dang' surname='Dang'/>
    <author>
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date month='July' year='2015'/>
  </front>
  <seriesInfo name='DOI' value='10.6028/nist.fips.180-4'/>
</reference>

<reference anchor='FIPS202' target='http://dx.doi.org/10.6028/nist.fips.202'>
  <front>
    <title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
    <author fullname='Morris J. Dworkin' surname='Dworkin'/>
    <author>
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date month='July' year='2015'/>
  </front>
  <seriesInfo name='DOI' value='10.6028/nist.fips.202'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="BLEICHENBACHER" >
  <front>
    <title>Generating ElGamal Signatures Without Knowing the Secret Key</title>
    <author initials="D." surname="Bleichenbacher">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
  <seriesInfo name="Lecture Notes in Computer Science" value="Volume 1070, pp. 10-18"/>
</reference>
<reference anchor="BLEICHENBACHER-PKCS1" target="http://archiv.infsec.ethz.ch/education/fs08/secsem/Bleichenbacher98.pdf">
  <front>
    <title>Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS \#1</title>
    <author initials="D." surname="Bleichenbacher">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>
<reference anchor="EFAIL" target="https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-poddebniak.pdf">
  <front>
    <title>Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels</title>
    <author initials="D." surname="Poddebniak" fullname="Damian Poddebniak">
      <organization></organization>
    </author>
    <author initials="C." surname="Dresen" fullname="Christian Dresen">
      <organization></organization>
    </author>
    <author initials="J." surname="Müller" fullname="Jens Müller">
      <organization></organization>
    </author>
    <author initials="F." surname="Ising" fullname="Fabian Ising">
      <organization></organization>
    </author>
    <author initials="S." surname="Schinzel" fullname="Sebastian Schinzel">
      <organization></organization>
    </author>
    <author initials="S." surname="Friedberger" fullname="Simon Friedberger">
      <organization></organization>
    </author>
    <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
      <organization></organization>
    </author>
    <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="Proceedings of the 27th USENIX Conference on Security Symposium, August 2018, Pages 549–566" value=""/>
</reference>
<reference anchor="JKS02" target="http://www.counterpane.com/pgp-attack.html">
  <front>
    <title>Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG</title>
    <author initials="K." surname="Jallad" fullname="Kahil Jallad">
      <organization></organization>
    </author>
    <author initials="J." surname="Katz" fullname="Jonathan Katz">
      <organization></organization>
    </author>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization></organization>
    </author>
    <date year="2002"/>
  </front>
</reference>
<reference anchor="KOBLITZ" >
  <front>
    <title>A course in number theory and cryptography, Chapter VI. Elliptic Curves</title>
    <author initials="N." surname="Koblitz">
      <organization></organization>
    </author>
    <date year="1997"/>
  </front>
  <seriesInfo name="ISBN" value="0-387-96576-9"/>
</reference>
<reference anchor="KOPENPGP" target="https://www.kopenpgp.com/">
  <front>
    <title>Victory by KO: Attacking OpenPGP Using Key Overwriting</title>
    <author initials="L." surname="Bruseghini" fullname="Lara Bruseghini">
      <organization></organization>
    </author>
    <author initials="K.G." surname="Paterson" fullname="Kenneth G. Paterson">
      <organization></organization>
    </author>
    <author initials="D." surname="Huigens" fullname="Daniel Huigens">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Proceedings of the 29th ACM Conference on Computer and Communications Security, November 2022 (to appear)" value=""/>
</reference>
<reference anchor="KR02" target="https://eprint.iacr.org/2002/076">
  <front>
    <title>Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP</title>
    <author initials="V." surname="Klíma" fullname="Vlastimil Klíma">
      <organization></organization>
    </author>
    <author initials="T." surname="Rosa" fullname="Tomáš Rosa">
      <organization></organization>
    </author>
    <date year="2002"/>
  </front>
  <seriesInfo name="Cryptology ePrint Archive, Report 2002/076" value=""/>
</reference>
<reference anchor="MRLG15" >
  <front>
    <title>Format Oracles on OpenPGP</title>
    <author initials="F." surname="Maury" fullname="Florian Maury">
      <organization></organization>
    </author>
    <author initials="J." surname="Reinhard" fullname="Jean-René Reinhard">
      <organization></organization>
    </author>
    <author initials="O." surname="Levillain" fullname="Olivier Levillain">
      <organization></organization>
    </author>
    <author initials="H." surname="Gilbert" fullname="Henri Gilbert">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="CT-RSA 2015" value="Topics in Cryptology –- CT-RSA 2015 pp 220–236"/>
  <seriesInfo name="DOI" value="10.1007/978-3-319-16715-2_12"/>
</reference>
<reference anchor="MZ05" target="http://eprint.iacr.org/2005/033">
  <front>
    <title>An Attack on CFB Mode Encryption As Used By OpenPGP</title>
    <author initials="S." surname="Mister" fullname="Serge Mister">
      <organization></organization>
    </author>
    <author initials="R." surname="Zuccherato" fullname="Robert Zuccherato">
      <organization></organization>
    </author>
    <date year="2005" month="February" day="08"/>
  </front>
  <seriesInfo name="IACR ePrint Archive" value="Report 2005/033"/>
</reference>
<reference anchor="OPENPGPCARD" target="https://gnupg.org/ftp/specs/OpenPGP-smart-card-application-3.4.1.pdf">
  <front>
    <title>Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems (version 3.4.1)</title>
    <author initials="A." surname="Pietig" fullname="Achim Pietig">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="PAX" target="https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html">
  <front>
    <title>IEEE Standard for Information Technology--Portable Operating System Interface (POSIX(R)) Base Specifications, Issue 7: pax - portable archive interchange</title>
    <author >
      <organization>The Open Group</organization>
    </author>
    <date year="2018"/>
  </front>
  <seriesInfo name="IEEE Standard" value="1003.1-2017"/>
  <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8277153"/>
</reference>
<reference anchor="PSSLR17" target="https://eprint.iacr.org/2017/1014">
  <front>
    <title>Attacking Deterministic Signature Schemes using Fault Attacks</title>
    <author initials="D." surname="Poddebniak">
      <organization></organization>
    </author>
    <author initials="J." surname="Somorovsky">
      <organization></organization>
    </author>
    <author initials="S." surname="Schinzel">
      <organization></organization>
    </author>
    <author initials="M." surname="Lochter">
      <organization></organization>
    </author>
    <author initials="P." surname="Rösler">
      <organization></organization>
    </author>
    <date year="2017" month="October"/>
  </front>
</reference>
<reference anchor="REGEX" >
  <front>
    <title>Mastering Regular Expressions</title>
    <author initials="J." surname="Friedl" fullname="Jeffrey Friedl">
      <organization>O'Reilly</organization>
    </author>
    <date year="2002" month="August"/>
  </front>
  <seriesInfo name="ISBN" value="0-596-00289-0"/>
</reference>




<reference anchor='RFC1991' target='https://www.rfc-editor.org/info/rfc1991'>
<front>
<title>PGP Message Exchange Formats</title>
<author fullname='D. Atkins' initials='D.' surname='Atkins'><organization/></author>
<author fullname='W. Stallings' initials='W.' surname='Stallings'><organization/></author>
<author fullname='P. Zimmermann' initials='P.' surname='Zimmermann'><organization/></author>
<date month='August' year='1996'/>
<abstract><t>This document describes the format of &quot;PGP files&quot;, i.e., messages that have been encrypted and/or signed with PGP.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1991'/>
<seriesInfo name='DOI' value='10.17487/RFC1991'/>
</reference>



<reference anchor='RFC2440' target='https://www.rfc-editor.org/info/rfc2440'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='1998'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2440'/>
<seriesInfo name='DOI' value='10.17487/RFC2440'/>
</reference>



<reference anchor='RFC4880' target='https://www.rfc-editor.org/info/rfc4880'>
<front>
<title>OpenPGP Message Format</title>
<author fullname='J. Callas' initials='J.' surname='Callas'><organization/></author>
<author fullname='L. Donnerhacke' initials='L.' surname='Donnerhacke'><organization/></author>
<author fullname='H. Finney' initials='H.' surname='Finney'><organization/></author>
<author fullname='D. Shaw' initials='D.' surname='Shaw'><organization/></author>
<author fullname='R. Thayer' initials='R.' surname='Thayer'><organization/></author>
<date month='November' year='2007'/>
<abstract><t>This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format.  It is not a step-by-step cookbook for writing an application.  It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.  It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.</t><t>OpenPGP software uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage.  These services include confidentiality, key management, authentication, and digital signatures.  This document specifies the message formats used in OpenPGP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4880'/>
<seriesInfo name='DOI' value='10.17487/RFC4880'/>
</reference>



<reference anchor='RFC5639' target='https://www.rfc-editor.org/info/rfc5639'>
<front>
<title>Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation</title>
<author fullname='M. Lochter' initials='M.' surname='Lochter'><organization/></author>
<author fullname='J. Merkle' initials='J.' surname='Merkle'><organization/></author>
<date month='March' year='2010'/>
<abstract><t>This memo proposes several elliptic curve domain parameters over finite prime fields for use in cryptographic applications.  The domain parameters are consistent with the relevant international standards, and can be used in X.509 certificates and certificate revocation lists (CRLs), for Internet Key Exchange (IKE), Transport Layer Security (TLS), XML signatures, and all applications or protocols based on the cryptographic message syntax (CMS).  This document is  not an Internet Standards Track specification; it is published for  informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='5639'/>
<seriesInfo name='DOI' value='10.17487/RFC5639'/>
</reference>



<reference anchor='RFC5869' target='https://www.rfc-editor.org/info/rfc5869'>
<front>
<title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='P. Eronen' initials='P.' surname='Eronen'><organization/></author>
<date month='May' year='2010'/>
<abstract><t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='5869'/>
<seriesInfo name='DOI' value='10.17487/RFC5869'/>
</reference>



<reference anchor='RFC6090' target='https://www.rfc-editor.org/info/rfc6090'>
<front>
<title>Fundamental Elliptic Curve Cryptography Algorithms</title>
<author fullname='D. McGrew' initials='D.' surname='McGrew'><organization/></author>
<author fullname='K. Igoe' initials='K.' surname='Igoe'><organization/></author>
<author fullname='M. Salter' initials='M.' surname='Salter'><organization/></author>
<date month='February' year='2011'/>
<abstract><t>This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier.  These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years.  Only elliptic curves defined over fields of characteristic greater than three are in scope; these curves are those used in Suite B. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6090'/>
<seriesInfo name='DOI' value='10.17487/RFC6090'/>
</reference>


<reference anchor="SEC1" >
  <front>
    <title>SEC 1: Elliptic Curve Cryptography</title>
    <author >
      <organization>Standards for Efficient Cryptography Group</organization>
    </author>
    <date year="2000" month="September"/>
  </front>
</reference>
<reference anchor="SHA1CD" target="https://github.com/cr-marcstevens/sha1collisiondetection">
  <front>
    <title>sha1collisiondetection</title>
    <author initials="M." surname="Stevens" fullname="Marc Stevens">
      <organization></organization>
    </author>
    <author initials="D." surname="Shumow" fullname="Dan Shumow">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
</reference>
<reference anchor="SHAMBLES" target="https://sha-mbles.github.io/">
  <front>
    <title>Sha-1 is a shambles: First chosen-prefix collision on sha-1 and application to the PGP web of trust</title>
    <author initials="G." surname="Leurent" fullname="Gaëtan Leurent">
      <organization></organization>
    </author>
    <author initials="T." surname="Peyrin" fullname="Thomas Peyrin">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="SP800-57" target="http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part{1,2}.pdf">
  <front>
    <title>Recommendation on Key Management</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="2007" month="March"/>
  </front>
  <seriesInfo name="NIST Special Publication" value="800-57"/>
</reference>
<reference anchor="SP800-131A" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf">
  <front>
    <title>Transitioning the Use of Cryptographic Algorithms and Key Lengths</title>
    <author initials="E." surname="Barker">
      <organization></organization>
    </author>
    <author initials="A." surname="Roginsky">
      <organization></organization>
    </author>
    <date year="2019" month="March"/>
  </front>
  <seriesInfo name="NIST Special Publication" value="800-131A Revision 2"/>
</reference>
<reference anchor="STEVENS2013" target="https://eprint.iacr.org/2013/358">
  <front>
    <title>Counter-cryptanalysis</title>
    <author initials="M." surname="Stevens" fullname="Marc Stevens">
      <organization></organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>


<reference anchor='FIPS186-5' target='http://dx.doi.org/10.6028/nist.fips.186-5-draft'>
  <front>
    <title>Digital Signature Standard (DSS)</title>
    <author fullname='Andrew Regenscheid' surname='Regenscheid'/>
    <author>
      <organization>National Institute of Standards and Technology (NIST)</organization>
    </author>
    <date day='30' month='October' year='2019'/>
  </front>
  <seriesInfo name='DOI' value='10.6028/nist.fips.186-5-draft'/>
</reference>

<reference anchor='CHECKOWAY' target='http://dx.doi.org/10.1145/2976749.2978395'>
  <front>
    <title>A Systematic Analysis of the Juniper Dual EC Incident</title>
    <author fullname='Stephen Checkoway' surname='Checkoway'>
      <organization>University of Illinois at Chicago, Chicago, IL, USA</organization>
    </author>
    <author fullname='Jacob Maskiewicz' surname='Maskiewicz'>
      <organization>UC San Diego, La Jolla, CA, USA</organization>
    </author>
    <author fullname='Christina Garman' surname='Garman'>
      <organization>Johns Hopkins University, Baltimore, MD, USA</organization>
    </author>
    <author fullname='Joshua Fried' surname='Fried'>
      <organization>University of Pennsylvania, Philadelphia, PA, USA</organization>
    </author>
    <author fullname='Shaanan Cohney' surname='Cohney'>
      <organization>University of Pennsylvania, Philadelphia, PA, USA</organization>
    </author>
    <author fullname='Matthew Green' surname='Green'>
      <organization>Johns Hopkins University, Baltimore, MD, USA</organization>
    </author>
    <author fullname='Nadia Heninger' surname='Heninger'>
      <organization>University of Pennsylvania, Philadelphia, PA, USA</organization>
    </author>
    <author fullname='Ralf-Philipp Weinmann' surname='Weinmann'>
      <organization>Comsecuris, Duisburg, Germany</organization>
    </author>
    <author fullname='Eric Rescorla' surname='Rescorla'>
      <organization>UC San Diego, La Jolla, CA, USA</organization>
    </author>
    <author fullname='Hovav Shacham' surname='Shacham'>
      <organization>UC San Diego, La Jolla, CA, USA</organization>
    </author>
    <author>
      <organization>ACM</organization>
    </author>
    <date day='24' month='October' year='2016'/>
  </front>
  <refcontent>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</refcontent>
  <seriesInfo name='DOI' value='10.1145/2976749.2978395'/>
</reference>




    </references>


<section anchor="test-vectors"><name>Test vectors</name>

<t>To help implementing this specification a non-normative example for the EdDSA algorithm is given.</t>

<section anchor="sample-v4-ed25519-key"><name>Sample v4 Ed25519 key</name>

<t>The secret key used for this example is:</t>

<t>D: 1a8b1ff05ded48e18bf50166c664ab023ea70003d78d9e41f5758a91d850f8d2</t>

<t>Note that this is the raw secret key used as input to the EdDSA signing operation.
The key was created on 2014-08-19 14:28:27 and thus the fingerprint of the OpenPGP key is:</t>

<figure><artwork><![CDATA[
   C959 BDBA FA32 A2F8 9A15  3B67 8CFD E121 9796 5A9A
]]></artwork></figure>

<t>The algorithm-specific input parameters without the MPI length headers are:</t>

<t>oid: 2b06010401da470f01</t>

<t>q: 403f098994bdd916ed4053197934e4a87c80733a1280d62f8010992e43ee3b2406</t>

<t>The entire public key packet is thus:</t>

<figure><artwork><![CDATA[
   98 33 04 53 f3 5f 0b 16  09 2b 06 01 04 01 da 47
   0f 01 01 07 40 3f 09 89  94 bd d9 16 ed 40 53 19
   79 34 e4 a8 7c 80 73 3a  12 80 d6 2f 80 10 99 2e
   43 ee 3b 24 06
]]></artwork></figure>

<t>The same packet, represented in ASCII-armored form is:</t>

<figure><sourcecode type="application/pgp-keys" name="v4-ed25519-pubkey-packet.key"><![CDATA[
-----BEGIN PGP PUBLIC KEY BLOCK-----

xjMEU/NfCxYJKwYBBAHaRw8BAQdAPwmJlL3ZFu1AUxl5NOSofIBzOhKA1i+AEJku
Q+47JAY=
-----END PGP PUBLIC KEY BLOCK-----
]]></sourcecode></figure>

</section>
<section anchor="sample-v4-ed25519-signature"><name>Sample v4 Ed25519 signature</name>

<t>The signature is created using the sample key over the input data "OpenPGP" on 2015-09-16 12:24:53 UTC and thus the input to the hash function is:</t>

<t>m: 4f70656e504750040016080006050255f95f9504ff0000000c</t>

<t>Using the SHA2-256 hash algorithm yields the digest:</t>

<t>d: f6220a3f757814f4c2176ffbb68b00249cd4ccdc059c4b34ad871f30b1740280</t>

<t>Which is fed into the EdDSA signature function and yields this signature:</t>

<t>r: 56f90cca98e2102637bd983fdb16c131dfd27ed82bf4dde5606e0d756aed3366</t>

<t>s: d09c4fa11527f038e0f57f2201d82f2ea2c9033265fa6ceb489e854bae61b404</t>

<t>The entire signature packet is thus:</t>

<figure><artwork><![CDATA[
   88 5e 04 00 16 08 00 06  05 02 55 f9 5f 95 00 0a
   09 10 8c fd e1 21 97 96  5a 9a f6 22 00 ff 56 f9
   0c ca 98 e2 10 26 37 bd  98 3f db 16 c1 31 df d2
   7e d8 2b f4 dd e5 60 6e  0d 75 6a ed 33 66 01 00
   d0 9c 4f a1 15 27 f0 38  e0 f5 7f 22 01 d8 2f 2e
   a2 c9 03 32 65 fa 6c eb  48 9e 85 4b ae 61 b4 04
]]></artwork></figure>

<t>The same packet represented in ASCII-armored form is:</t>

<figure><sourcecode type="application/pgp-signature" name="v4-ed25519-signature-over-OpenPGP.sig"><![CDATA[
-----BEGIN PGP SIGNATURE-----

iF4EABYIAAYFAlX5X5UACgkQjP3hIZeWWpr2IgD/VvkMypjiECY3vZg/2xbBMd/S
ftgr9N3lYG4NdWrtM2YBANCcT6EVJ/A44PV/IgHYLy6iyQMyZfps60iehUuuYbQE
-----END PGP SIGNATURE-----
]]></sourcecode></figure>

</section>
<section anchor="v5-cert"><name>Sample v5 Certificate (Transferable Public Key)</name>

<t>Here is a Transferable Public Key consisting of:</t>

<t><list style="symbols">
  <t>a v5 Ed25519 Public-Key packet</t>
  <t>a v5 direct key self-signature</t>
  <t>a v5 Curve25519 Public-Subkey packet</t>
  <t>a v5 subkey binding signature</t>
</list></t>

<figure><sourcecode type="application/pgp-keys" name="v5-minimal-cert.key"><![CDATA[
-----BEGIN PGP PUBLIC KEY BLOCK-----
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-----END PGP PUBLIC KEY BLOCK-----
]]></sourcecode></figure>

<t>The corresponding Transferable Secret Key can be found in <xref target="v5-key"/>.</t>

</section>
<section anchor="v5-key"><name>Sample v5 Secret Key (Transferable Secret Key)</name>

<t>Here is a Transferable Secret Key consisting of:</t>

<t><list style="symbols">
  <t>a v5 Ed25519 Secret-Key packet</t>
  <t>a v5 direct key self-signature</t>
  <t>a v5 Curve25519 Secret-Subkey packet</t>
  <t>a v5 subkey binding signature</t>
</list></t>

<figure><sourcecode type="application/pgp-keys" name="v5-minimal-secret.key"><![CDATA[
-----BEGIN PGP PRIVATE KEY BLOCK-----
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-----END PGP PRIVATE KEY BLOCK-----
]]></sourcecode></figure>

<t>The corresponding Transferable Public Key can be found in <xref target="v5-cert"/>.</t>

</section>
<section anchor="sample-aead-eax-encryption-and-decryption"><name>Sample AEAD-EAX encryption and decryption</name>

<t>This example encrypts the cleartext string <spanx style="verb">Hello, world!</spanx> with the password <spanx style="verb">password</spanx>, using AES-128 with AEAD-EAX encryption.</t>

<section anchor="sample-parameters"><name>Sample Parameters</name>

<t>S2K:</t>

<figure><artwork><![CDATA[
  Iterated and Salted S2K
]]></artwork></figure>

<t>Iterations:</t>

<figure><artwork><![CDATA[
  65011712 (255), SHA2-256
]]></artwork></figure>

<t>Salt:</t>

<figure><artwork><![CDATA[
  a5 ae 57 9d 1f c5 d8 2b
]]></artwork></figure>

</section>
<section anchor="sample-symmetric-key-encrypted-session-key-packet-v5"><name>Sample symmetric-key encrypted session key packet (v5)</name>

<t>Packet header:</t>

<figure><artwork><![CDATA[
  c3 40
]]></artwork></figure>

<t>Version, algorithms, S2K fields:</t>

<figure><artwork><![CDATA[
  05 1e 07 01 0b 03 08 a5 ae 57 9d 1f c5 d8 2b ff
  69 22
]]></artwork></figure>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  69 22 4f 91 99 93 b3 50 6f a3 b5 9a 6a 73 cf f8
]]></artwork></figure>

<t>Encrypted session key and AEAD tag:</t>

<figure><artwork><![CDATA[
  da 74 6b 88 e3 57 e8 ae 54 eb 87 e1 d7 05 75 d7
  2f 60 23 29 90 52 3e 9a 59 09 49 22 40 6b e1 c3
]]></artwork></figure>

</section>
<section anchor="starting-aead-eax-decryption-of-the-session-key"><name>Starting AEAD-EAX decryption of the session key</name>

<t>The derived key is:</t>

<figure><artwork><![CDATA[
  15 49 67 e5 90 aa 1f 92 3e 1c 0a c6 4c 88 f2 3d
]]></artwork></figure>

<t>HKDF info:</t>

<figure><artwork><![CDATA[
  c3 05 07 01
]]></artwork></figure>

<t>HKDF output:</t>

<figure><artwork><![CDATA[
  74 f0 46 03 63 a7 00 76 db 08 c4 92 ab f2 95 52
]]></artwork></figure>

<t>Authenticated Data:</t>

<figure><artwork><![CDATA[
  c3 05 07 01
]]></artwork></figure>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  69 22 4f 91 99 93 b3 50 6f a3 b5 9a 6a 73 cf f8
]]></artwork></figure>

<t>Decrypted session key:</t>

<figure><artwork><![CDATA[
  38 81 ba fe 98 54 12 45 9b 86 c3 6f 98 cb 9a 5e
]]></artwork></figure>

</section>
<section anchor="sample-v2-seipd-packet"><name>Sample v2 SEIPD packet</name>

<t>Packet header:</t>

<figure><artwork><![CDATA[
  d2 69
]]></artwork></figure>

<t>Version, AES-128, EAX, Chunk size octet:</t>

<figure><artwork><![CDATA[
  02 07 01 06
]]></artwork></figure>

<t>Salt:</t>

<figure><artwork><![CDATA[
  9f f9 0e 3b 32 19 64 f3 a4 29 13 c8 dc c6 61 93
  25 01 52 27 ef b7 ea ea a4 9f 04 c2 e6 74 17 5d
]]></artwork></figure>

<t>Chunk #0 encrypted data:</t>

<figure><artwork><![CDATA[
  4a 3d 22 6e d6 af cb 9c a9 ac 12 2c 14 70 e1 1c
  63 d4 c0 ab 24 1c 6a 93 8a d4 8b f9 9a 5a 99 b9
  0b ba 83 25 de
]]></artwork></figure>

<t>Chunk #0 authentication tag:</t>

<figure><artwork><![CDATA[
  61 04 75 40 25 8a b7 95 9a 95 ad 05 1d da 96 eb
]]></artwork></figure>

<t>Final (zero-sized chunk #1) authentication tag:</t>

<figure><artwork><![CDATA[
  15 43 1d fe f5 f5 e2 25 5c a7 82 61 54 6e 33 9a
]]></artwork></figure>

</section>
<section anchor="decryption-of-data"><name>Decryption of data</name>

<t>Starting AEAD-EAX decryption of data, using the session key.</t>

<t>HKDF info:</t>

<figure><artwork><![CDATA[
  d2 02 07 01 06
]]></artwork></figure>

<t>HKDF output:</t>

<figure><artwork><![CDATA[
  b5 04 22 ac 1c 26 be 9d dd 83 1d 5b bb 36 b6 4f
  78 b8 33 f2 e9 4a 60 c0
]]></artwork></figure>

<t>Message key:</t>

<figure><artwork><![CDATA[
  b5 04 22 ac 1c 26 be 9d dd 83 1d 5b bb 36 b6 4f
]]></artwork></figure>

<t>Initialization vector:</t>

<figure><artwork><![CDATA[
  78 b8 33 f2 e9 4a 60 c0
]]></artwork></figure>

<t>Chunk #0:</t>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  78 b8 33 f2 e9 4a 60 c0 00 00 00 00 00 00 00 00
]]></artwork></figure>

<t>Additional authenticated data:</t>

<figure><artwork><![CDATA[
  d2 02 07 01 06
]]></artwork></figure>

<t>Decrypted chunk #0.</t>

<t>Literal data packet with the string contents <spanx style="verb">Hello, world!</spanx>:</t>

<figure><artwork><![CDATA[
  cb 13 62 00 00 00 00 00 48 65 6c 6c 6f 2c 20 77
  6f 72 6c 64 21
]]></artwork></figure>

<t>Padding packet:</t>

<figure><artwork><![CDATA[
  d5 0e ae 5b f0 cd 67 05 50 03 55 81 6c b0 c8 ff
]]></artwork></figure>

<t>Authenticating final tag:</t>

<t>Final nonce:</t>

<figure><artwork><![CDATA[
  78 b8 33 f2 e9 4a 60 c0 00 00 00 00 00 00 00 01
]]></artwork></figure>

<t>Final additional authenticated data:</t>

<figure><artwork><![CDATA[
  d2 02 07 01 06 00 00 00 00 00 00 00 25
]]></artwork></figure>

</section>
<section anchor="complete-aead-eax-encrypted-packet-sequence"><name>Complete AEAD-EAX encrypted packet sequence</name>

<figure><sourcecode type="application/pgp-encrypted" name="v5skesk-aes128-eax.pgp"><![CDATA[
-----BEGIN PGP MESSAGE-----

w0AFHgcBCwMIpa5XnR/F2Cv/aSJPkZmTs1Bvo7WaanPP+Np0a4jjV+iuVOuH4dcF
ddcvYCMpkFI+mlkJSSJAa+HD0mkCBwEGn/kOOzIZZPOkKRPI3MZhkyUBUifvt+rq
pJ8EwuZ0F11KPSJu1q/LnKmsEiwUcOEcY9TAqyQcapOK1Iv5mlqZuQu6gyXeYQR1
QCWKt5Wala0FHdqW6xVDHf719eIlXKeCYVRuM5o=
-----END PGP MESSAGE-----
]]></sourcecode></figure>

</section>
</section>
<section anchor="sample-aead-ocb-encryption-and-decryption"><name>Sample AEAD-OCB encryption and decryption</name>

<t>This example encrypts the cleartext string <spanx style="verb">Hello, world!</spanx> with the password <spanx style="verb">password</spanx>, using AES-128 with AEAD-OCB encryption.</t>

<section anchor="sample-parameters-1"><name>Sample Parameters</name>

<t>S2K:</t>

<figure><artwork><![CDATA[
  Iterated and Salted S2K
]]></artwork></figure>

<t>Iterations:</t>

<figure><artwork><![CDATA[
  65011712 (255), SHA2-256
]]></artwork></figure>

<t>Salt:</t>

<figure><artwork><![CDATA[
  56 a2 98 d2 f5 e3 64 53
]]></artwork></figure>

</section>
<section anchor="sample-symmetric-key-encrypted-session-key-packet-v5-1"><name>Sample symmetric-key encrypted session key packet (v5)</name>

<t>Packet header:</t>

<figure><artwork><![CDATA[
  c3 3f
]]></artwork></figure>

<t>Version, algorithms, S2K fields:</t>

<figure><artwork><![CDATA[
  05 1d 07 02 0b 03 08 56 a2 98 d2 f5 e3 64 53 ff
  cf cc
]]></artwork></figure>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  cf cc 5c 11 66 4e db 9d b4 25 90 d7 dc 46 b0
]]></artwork></figure>

<t>Encrypted session key and AEAD tag:</t>

<figure><artwork><![CDATA[
  78 c5 c0 41 9c c5 1b 3a 46 87 cb 32 e5 b7 03 1c
  e7 c6 69 75 76 5b 5c 21 d9 2a ef 4c c0 5c 3f ea
]]></artwork></figure>

</section>
<section anchor="starting-aead-ocb-decryption-of-the-session-key"><name>Starting AEAD-OCB decryption of the session key</name>

<t>The derived key is:</t>

<figure><artwork><![CDATA[
  e8 0d e2 43 a3 62 d9 3b 9d c6 07 ed e9 6a 73 56
]]></artwork></figure>

<t>HKDF info:</t>

<figure><artwork><![CDATA[
  c3 05 07 02
]]></artwork></figure>

<t>HKDF output:</t>

<figure><artwork><![CDATA[
  20 62 fb 76 31 ef be f4 df 81 67 ce d7 f3 a4 64
]]></artwork></figure>

<t>Authenticated Data:</t>

<figure><artwork><![CDATA[
  c3 05 07 02
]]></artwork></figure>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  cf cc 5c 11 66 4e db 9d b4 25 90 d7 dc 46 b0
]]></artwork></figure>

<t>Decrypted session key:</t>

<figure><artwork><![CDATA[
  28 e7 9a b8 23 97 d3 c6 3d e2 4a c2 17 d7 b7 91
]]></artwork></figure>

</section>
<section anchor="sample-v2-seipd-packet-1"><name>Sample v2 SEIPD packet</name>

<t>Packet header:</t>

<figure><artwork><![CDATA[
  d2 69
]]></artwork></figure>

<t>Version, AES-128, OCB, Chunk size octet:</t>

<figure><artwork><![CDATA[
  02 07 02 06
]]></artwork></figure>

<t>Salt:</t>

<figure><artwork><![CDATA[
  20 a6 61 f7 31 fc 9a 30 32 b5 62 33 26 02 7e 3a
  5d 8d b5 74 8e be ff 0b 0c 59 10 d0 9e cd d6 41
]]></artwork></figure>

<t>Chunk #0 encrypted data:</t>

<figure><artwork><![CDATA[
  ff 9f d3 85 62 75 80 35 bc 49 75 4c e1 bf 3f ff
  a7 da d0 a3 b8 10 4f 51 33 cf 42 a4 10 0a 83 ee
  f4 ca 1b 48 01
]]></artwork></figure>

<t>Chunk #0 authentication tag:</t>

<figure><artwork><![CDATA[
  a8 84 6b f4 2b cd a7 c8 ce 9d 65 e2 12 f3 01 cb
]]></artwork></figure>

<t>Final (zero-sized chunk #1) authentication tag:</t>

<figure><artwork><![CDATA[
  cd 98 fd ca de 69 4a 87 7a d4 24 73 23 f6 e8 57
]]></artwork></figure>

</section>
<section anchor="decryption-of-data-1"><name>Decryption of data</name>

<t>Starting AEAD-OCB decryption of data, using the session key.</t>

<t>HKDF info:</t>

<figure><artwork><![CDATA[
  d2 02 07 02 06
]]></artwork></figure>

<t>HKDF output:</t>

<figure><artwork><![CDATA[
  71 66 2a 11 ee 5b 4e 08 14 4e 6d e8 83 a0 09 99
  eb de 12 bb 57 0d cf
]]></artwork></figure>

<t>Message key:</t>

<figure><artwork><![CDATA[
  71 66 2a 11 ee 5b 4e 08 14 4e 6d e8 83 a0 09 99
]]></artwork></figure>

<t>Initialization vector:</t>

<figure><artwork><![CDATA[
  eb de 12 bb 57 0d cf
]]></artwork></figure>

<t>Chunk #0:</t>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  eb de 12 bb 57 0d cf 00 00 00 00 00 00 00 00
]]></artwork></figure>

<t>Additional authenticated data:</t>

<figure><artwork><![CDATA[
  d2 02 07 02 06
]]></artwork></figure>

<t>Decrypted chunk #0.</t>

<t>Literal data packet with the string contents <spanx style="verb">Hello, world!</spanx>:</t>

<figure><artwork><![CDATA[
  cb 13 62 00 00 00 00 00 48 65 6c 6c 6f 2c 20 77
  6f 72 6c 64 21
]]></artwork></figure>

<t>Padding packet:</t>

<figure><artwork><![CDATA[
  d5 0e ae 6a a1 64 9b 56 aa 83 5b 26 13 90 2b d2
]]></artwork></figure>

<t>Authenticating final tag:</t>

<t>Final nonce:</t>

<figure><artwork><![CDATA[
  eb de 12 bb 57 0d cf 00 00 00 00 00 00 00 01
]]></artwork></figure>

<t>Final additional authenticated data:</t>

<figure><artwork><![CDATA[
  d2 02 07 02 06 00 00 00 00 00 00 00 25
]]></artwork></figure>

</section>
<section anchor="complete-aead-ocb-encrypted-packet-sequence"><name>Complete AEAD-OCB encrypted packet sequence</name>

<figure><sourcecode type="application/pgp-encrypted" name="v5skesk-aes128-ocb.pgp"><![CDATA[
-----BEGIN PGP MESSAGE-----

wz8FHQcCCwMIVqKY0vXjZFP/z8xcEWZO2520JZDX3EaweMXAQZzFGzpGh8sy5bcD
HOfGaXV2W1wh2SrvTMBcP+rSaQIHAgYgpmH3MfyaMDK1YjMmAn46XY21dI6+/wsM
WRDQns3WQf+f04VidYA1vEl1TOG/P/+n2tCjuBBPUTPPQqQQCoPu9MobSAGohGv0
K82nyM6dZeIS8wHLzZj9yt5pSod61CRzI/boVw==
-----END PGP MESSAGE-----
]]></sourcecode></figure>

</section>
</section>
<section anchor="sample-aead-gcm-encryption-and-decryption"><name>Sample AEAD-GCM encryption and decryption</name>

<t>This example encrypts the cleartext string <spanx style="verb">Hello, world!</spanx> with the password <spanx style="verb">password</spanx>, using AES-128 with AEAD-GCM encryption.</t>

<section anchor="sample-parameters-2"><name>Sample Parameters</name>

<t>S2K:</t>

<figure><artwork><![CDATA[
  Iterated and Salted S2K
]]></artwork></figure>

<t>Iterations:</t>

<figure><artwork><![CDATA[
  65011712 (255), SHA2-256
]]></artwork></figure>

<t>Salt:</t>

<figure><artwork><![CDATA[
  e9 d3 97 85 b2 07 00 08
]]></artwork></figure>

</section>
<section anchor="sample-symmetric-key-encrypted-session-key-packet-v5-2"><name>Sample symmetric-key encrypted session key packet (v5)</name>

<t>Packet header:</t>

<figure><artwork><![CDATA[
  c3 3c
]]></artwork></figure>

<t>Version, algorithms, S2K fields:</t>

<figure><artwork><![CDATA[
  05 1a 07 03 0b 03 08 e9 d3 97 85 b2 07 00 08 ff
  b4 2e
]]></artwork></figure>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  b4 2e 7c 48 3e f4 88 44 57 cb 37 26
]]></artwork></figure>

<t>Encrypted session key and AEAD tag:</t>

<figure><artwork><![CDATA[
  0c 0c 4b f3 f2 cd 6c b7 b6 e3 8b 5b f3 34 67 c1
  c7 19 44 dd 59 03 46 66 2f 5a de 61 ff 84 bc e0
]]></artwork></figure>

</section>
<section anchor="starting-aead-gcm-decryption-of-the-session-key"><name>Starting AEAD-GCM decryption of the session key</name>

<t>The derived key is:</t>

<figure><artwork><![CDATA[
  25 02 81 71 5b ba 78 28 ef 71 ef 64 c4 78 47 53
]]></artwork></figure>

<t>HKDF info:</t>

<figure><artwork><![CDATA[
  c3 05 07 03
]]></artwork></figure>

<t>HKDF output:</t>

<figure><artwork><![CDATA[
  de ec e5 81 8b c0 aa b9 0f 8a fb 02 fa 00 cd 13
]]></artwork></figure>

<t>Authenticated Data:</t>

<figure><artwork><![CDATA[
  c3 05 07 03
]]></artwork></figure>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  b4 2e 7c 48 3e f4 88 44 57 cb 37 26
]]></artwork></figure>

<t>Decrypted session key:</t>

<figure><artwork><![CDATA[
  19 36 fc 85 68 98 02 74 bb 90 0d 83 19 36 0c 77
]]></artwork></figure>

</section>
<section anchor="sample-v2-seipd-packet-2"><name>Sample v2 SEIPD packet</name>

<t>Packet header:</t>

<figure><artwork><![CDATA[
  d2 69
]]></artwork></figure>

<t>Version, AES-128, GCM, Chunk size octet:</t>

<figure><artwork><![CDATA[
  02 07 03 06
]]></artwork></figure>

<t>Salt:</t>

<figure><artwork><![CDATA[
  fc b9 44 90 bc b9 8b bd c9 d1 06 c6 09 02 66 94
  0f 72 e8 9e dc 21 b5 59 6b 15 76 b1 01 ed 0f 9f
]]></artwork></figure>

<t>Chunk #0 encrypted data:</t>

<figure><artwork><![CDATA[
  fc 6f c6 d6 5b bf d2 4d cd 07 90 96 6e 6d 1e 85
  a3 00 53 78 4c b1 d8 b6 a0 69 9e f1 21 55 a7 b2
  ad 62 58 53 1b
]]></artwork></figure>

<t>Chunk #0 authentication tag:</t>

<figure><artwork><![CDATA[
  57 65 1f d7 77 79 12 fa 95 e3 5d 9b 40 21 6f 69
]]></artwork></figure>

<t>Final (zero-sized chunk #1) authentication tag:</t>

<figure><artwork><![CDATA[
  a4 c2 48 db 28 ff 43 31 f1 63 29 07 39 9e 6f f9
]]></artwork></figure>

</section>
<section anchor="decryption-of-data-2"><name>Decryption of data</name>

<t>Starting AEAD-GCM decryption of data, using the session key.</t>

<t>HKDF info:</t>

<figure><artwork><![CDATA[
  d2 02 07 03 06
]]></artwork></figure>

<t>HKDF output:</t>

<figure><artwork><![CDATA[
  ea 14 38 80 3c b8 a4 77 40 ce 9b 54 c3 38 77 8d
  4d 2b dc 2b
]]></artwork></figure>

<t>Message key:</t>

<figure><artwork><![CDATA[
  ea 14 38 80 3c b8 a4 77 40 ce 9b 54 c3 38 77 8d
]]></artwork></figure>

<t>Initialization vector:</t>

<figure><artwork><![CDATA[
  4d 2b dc 2b
]]></artwork></figure>

<t>Chunk #0:</t>

<t>Nonce:</t>

<figure><artwork><![CDATA[
  4d 2b dc 2b 00 00 00 00 00 00 00 00
]]></artwork></figure>

<t>Additional authenticated data:</t>

<figure><artwork><![CDATA[
  d2 02 07 03 06
]]></artwork></figure>

<t>Decrypted chunk #0.</t>

<t>Literal data packet with the string contents <spanx style="verb">Hello, world!</spanx>:</t>

<figure><artwork><![CDATA[
  cb 13 62 00 00 00 00 00 48 65 6c 6c 6f 2c 20 77
  6f 72 6c 64 21
]]></artwork></figure>

<t>Padding packet:</t>

<figure><artwork><![CDATA[
  d5 0e 1c e2 26 9a 9e dd ef 81 03 21 72 b7 ed 7c
]]></artwork></figure>

<t>Authenticating final tag:</t>

<t>Final nonce:</t>

<figure><artwork><![CDATA[
  4d 2b dc 2b 00 00 00 00 00 00 00 01
]]></artwork></figure>

<t>Final additional authenticated data:</t>

<figure><artwork><![CDATA[
  d2 02 07 03 06 00 00 00 00 00 00 00 25
]]></artwork></figure>

</section>
<section anchor="complete-aead-gcm-encrypted-packet-sequence"><name>Complete AEAD-GCM encrypted packet sequence</name>

<figure><sourcecode type="application/pgp-encrypted" name="v5skesk-aes128-gcm.pgp"><![CDATA[
-----BEGIN PGP MESSAGE-----

wzwFGgcDCwMI6dOXhbIHAAj/tC58SD70iERXyzcmDAxL8/LNbLe244tb8zRnwccZ
RN1ZA0ZmL1reYf+EvODSaQIHAwb8uUSQvLmLvcnRBsYJAmaUD3LontwhtVlrFXax
Ae0Pn/xvxtZbv9JNzQeQlm5tHoWjAFN4TLHYtqBpnvEhVaeyrWJYUxtXZR/Xd3kS
+pXjXZtAIW9ppMJI2yj/QzHxYykHOZ5v+Q==
-----END PGP MESSAGE-----
]]></sourcecode></figure>

</section>
</section>
<section anchor="sample-messages-encrypted-using-argon2"><name>Sample messages encrypted using Argon2</name>

<t>These messages are the literal data "Hello, world!" encrypted using v1 SEIPD, with Argon2 and the passphrase "password", using different session key sizes.
In each example, the choice of symmetric cipher is the same in both the v4 SKESK packet and v1 SEIPD packet.
In all cases, the Argon2 parameters are t = 1, p = 4, and m = 21.</t>

<section anchor="v4-skesk-using-argon2-with-aes-128"><name>v4 SKESK using Argon2 with AES-128</name>

<figure><sourcecode type="application/pgp-encrypted" name="v4skesk-argon2-aes128.pgp"><![CDATA[
-----BEGIN PGP MESSAGE-----
Comment: Encrypted using AES with 128-bit key
Comment: Session key: 01FE16BBACFD1E7B78EF3B865187374F

wycEBwScUvg8J/leUNU1RA7N/zE2AQQVnlL8rSLPP5VlQsunlO+ECxHSPgGYGKY+
YJz4u6F+DDlDBOr5NRQXt/KJIf4m4mOlKyC/uqLbpnLJZMnTq3o79GxBTdIdOzhH
XfA3pqV4mTzF
-----END PGP MESSAGE-----
]]></sourcecode></figure>

</section>
<section anchor="v4-skesk-using-argon2-with-aes-192"><name>v4 SKESK using Argon2 with AES-192</name>

<figure><sourcecode type="application/pgp-encrypted" name="v4skesk-argon2-aes192.pgp"><![CDATA[
-----BEGIN PGP MESSAGE-----
Comment: Encrypted using AES with 192-bit key
Comment: Session key: 27006DAE68E509022CE45A14E569E91001C2955...
Comment: Session key: ...AF8DFE194

wy8ECAThTKxHFTRZGKli3KNH4UP4AQQVhzLJ2va3FG8/pmpIPd/H/mdoVS5VBLLw
F9I+AdJ1Sw56PRYiKZjCvHg+2bnq02s33AJJoyBexBI4QKATFRkyez2gldJldRys
LVg77Mwwfgl2n/d572WciAM=
-----END PGP MESSAGE-----
]]></sourcecode></figure>

</section>
<section anchor="v4-skesk-using-argon2-with-aes-256"><name>v4 SKESK using Argon2 with AES-256</name>

<figure><sourcecode type="application/pgp-encrypted" name="v4skesk-argon2-aes256.pgp"><![CDATA[
-----BEGIN PGP MESSAGE-----
Comment: Encrypted using AES with 256-bit key
Comment: Session key: BBEDA55B9AAE63DAC45D4F49D89DACF4AF37FEF
Comment: Session key: ...C13BAB2F1F8E18FB74580D8B0

wzcECQS4eJUgIG/3mcaILEJFpmJ8AQQVnZ9l7KtagdClm9UaQ/Z6M/5roklSGpGu
623YmaXezGj80j4B+Ku1sgTdJo87X1Wrup7l0wJypZls21Uwd67m9koF60eefH/K
95D1usliXOEm8ayQJQmZrjf6K6v9PWwqMQ==
-----END PGP MESSAGE-----
]]></sourcecode></figure>

</section>
</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>Thanks to the openpgp design team for working on this document to prepare it for working group consumption: Stephen Farrell, Daniel Kahn Gillmor, Daniel Huigens, Jeffrey Lau, Yutaka Niibe, Justus Winter and Paul Wouters.</t>

<t>Thanks to Werner Koch for the early work on rfc4880bis.</t>

<t>This document also draws on much previous work from a number of other authors, including: Derek Atkins, Charles Breed, Dave Del Torto, Marc Dyksterhouse, Gail Haspert, Gene Hoffman, Paul Hoffman, Ben Laurie, Raph Levien, Colin Plumb, Will Price, David Shaw, William Stallings, Mark Weaver, and Philip R. Zimmermann.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

