chiark
/
gitweb
/
~mdw
/
catacomb
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
|
inline
| side by side (parent:
366e970
)
progs/key.1: General typesetting improvements.
author
Mark Wooding
<mdw@distorted.org.uk>
Mon, 18 May 2015 22:21:33 +0000
(23:21 +0100)
committer
Mark Wooding
<mdw@distorted.org.uk>
Mon, 18 May 2015 22:21:33 +0000
(23:21 +0100)
progs/key.1
patch
|
blob
|
blame
|
history
diff --git
a/progs/key.1
b/progs/key.1
index 9adb958811a0aebec9fd1c56195f38cacb92c9ec..f301391f9f25cea6c0bafcd5c996755d92614eaa 100644
(file)
--- a/
progs/key.1
+++ b/
progs/key.1
@@
-279,8
+279,8
@@
benefit of users, and isn't interpreted by applications at all.
(Hopefully.)
.TP
.B "attributes"
(Hopefully.)
.TP
.B "attributes"
-A key as zero or more name/value pairs. The names and values are
-arbitrary strings, except they may not contain null bytes. Some
+A key
h
as zero or more name/value pairs. The names and values are
+arbitrary strings, except th
at th
ey may not contain null bytes. Some
attributes may have meaning for particular applications or key types;
others may be assigned global meanings in future.
.SH "COMMAND REFERENCE"
attributes may have meaning for particular applications or key types;
others may be assigned global meanings in future.
.SH "COMMAND REFERENCE"
@@
-323,7
+323,7
@@
The built-in elliptic curves which can be used with the
command.
.TP
.B dh
command.
.TP
.B dh
-The built-in Diffie
-
Hellman groups which can be used with the
+The built-in Diffie
\(en
Hellman groups which can be used with the
.B add \-a dh
command.
.TP
.B add \-a dh
command.
.TP
@@
-463,19
+463,20
@@
Suppresses the progress indication which is usually generated while
time-consuming key generation tasks are being performed.
.TP
.BI "\-L, \-\-lim-lee"
time-consuming key generation tasks are being performed.
.TP
.BI "\-L, \-\-lim-lee"
-When generating Diffie
-Hellman parameters, generate a Lim-Lee prim
e
-
rather than a random (or safe) prime. See the details on Diffie-Hellma
n
-key generation below.
+When generating Diffie
\(enHellman parameters, generate a Lim\(enLe
e
+
prime rather than a random (or safe) prime. See the details o
n
+
Diffie\(enHellman
key generation below.
.TP
.BI "\-K, \-\-kcdsa"
.TP
.BI "\-K, \-\-kcdsa"
-When generating Diffie
-
Hellman parameters, generate a KCDSA-style
-Lim
-Lee prime rather than a random (or safe) prime. See the details on
-
Diffie-
Hellman key generation below.
+When generating Diffie
\(en
Hellman parameters, generate a KCDSA-style
+Lim
\(enLee prime rather than a random (or safe) prime. See the details
+
on Diffie\(en
Hellman key generation below.
.TP
.BI "\-S, \-\-subgroup"
.TP
.BI "\-S, \-\-subgroup"
-When generating Diffie-Hellman parameters with a Lim-Lee prime, choose a
-generator of a prime-order subgroup rather than a subgroup of order
-.RI ( p "- 1)/2."
+When generating Diffie\(enHellman parameters with a Lim\(enLee prime,
+choose a generator of a prime-order subgroup rather than a subgroup of
+order
+.RI ( p "\ \-\ 1)/2."
.PP
The key's type is given by the required
.I type
.PP
The key's type is given by the required
.I type
@@
-513,14
+514,14
@@
and
the public exponent;
.IR d ,
the private exponent, chosen such that
the public exponent;
.IR d ,
the private exponent, chosen such that
-.IR ed \
\(==\
1
+.IR ed \
~\(==\~
1
(mod
(mod
-.RI
( p \ \-\ 1)( q \ \-\
1));
+.RI
lcm( p "\~\-\~1, " q \~\-\~
1));
and some other values useful for optimizing private-key operations:
and some other values useful for optimizing private-key operations:
-.IR q
\*(ss\-1\*(se\ mod\
p ,
-.IR d
\ mod\ p \ \-\
1,
+.IR q
"\*(ss\-1\*(se mod "
p ,
+.IR d
"\~mod " p \~\-\~
1,
and
and
-.IR d
\ mod\ q \ \-\
1.
+.IR d
"\~mod " q \~\-\~
1.
The values
.I n
and
The values
.I n
and
@@
-539,15
+540,15
@@
and
to be
.I strong
primes: both
to be
.I strong
primes: both
-.IR p \
\-\
1
+.IR p \
~\-\~
1
and
and
-.IR p \
+\
1
-have large prime factors \
-
call them
+.IR p \
~+\~
1
+have large prime factors \
(en
call them
.I r
and
.I s
.I r
and
.I s
-respectively \
-
and
-.IR r \
\-\
1
+respectively \
(en
and
+.IR r \
~\-\~
1
also has a large prime factor;
.I q
has similar properties.
also has a large prime factor;
.I q
has similar properties.
@@
-559,12
+560,12
@@
corrssponding public and private exponents is sufficient to be able to
factor the modulus and recover other users' private keys.
.TP
.B "dh-param"
factor the modulus and recover other users' private keys.
.TP
.B "dh-param"
-Generates parameters for use with the Diffie
-
Hellman key exchange
+Generates parameters for use with the Diffie
\(en
Hellman key exchange
protocol, and many related systems, such as ElGamal encryption and
signatures, and even DSA. (The separate DSA algorithm uses the
generator described in FIPS186-1.)
.IP
protocol, and many related systems, such as ElGamal encryption and
signatures, and even DSA. (The separate DSA algorithm uses the
generator described in FIPS186-1.)
.IP
-The Diffie
-
Hellman parameters are a prime modulus
+The Diffie
\(en
Hellman parameters are a prime modulus
.I p
and a generator
.I g
.I p
and a generator
.I g
@@
-583,10
+584,10
@@
If no
.I q
size is selected using the
.B \-B
.I q
size is selected using the
.B \-B
-option and the Lim
-
Lee prime options are disabled, then
+option and the Lim
\(en
Lee prime options are disabled, then
.I p
is chosen to be a `safe' prime (i.e.,
.I p
is chosen to be a `safe' prime (i.e.,
-.IR p
\ =\ 2 q \ +\
1,
+.IR p
"\~= 2" q \~+\~
1,
with
.I q
prime). Finding safe primes takes a very long time. In this case, the
with
.I q
prime). Finding safe primes takes a very long time. In this case, the
@@
-596,31
+597,33
@@
is fixed as 4.
.IP
If a size is chosen for
.I q
.IP
If a size is chosen for
.I q
-and Lim
-
Lee primes are not selected then the prime
+and Lim
\(en
Lee primes are not selected then the prime
.I q
is generated and
.I p
is chosen so that
.I q
is generated and
.I p
is chosen so that
-.IR p \
\-\
1
+.IR p \
~\-\~
1
is a multiple of
.IR q .
.IP
If the
.B \-L
is a multiple of
.IR q .
.IP
If the
.B \-L
-option was given, Lim-Lee primes are selected: the parameters are chosen
-such that
-.IR p \ =\ 2\ q \*(us0\*(ue\ q \*(us1\*(ue\ q \*(us2\*(ue\ ...\ +\ 1,
+option was given, Lim\(enLee primes are selected: the parameters are
+chosen such that
+.IR p "\~= 2\~" q \*(us0\*(ue
+.IR q \*(us1\*(ue
+.IR q \*(us2\*(ue\~...\~+\~1,
where the
where the
-.IR q \*(us i\*(ue
+.IR q \*(us i
\*(ue
are primes at least as large as the setting given by the
.B \-B
option (or 256 bits, if no setting was given).
.IP
If the
.B \-K
are primes at least as large as the setting given by the
.B \-B
option (or 256 bits, if no setting was given).
.IP
If the
.B \-K
-option was given, KCDSA-style Lim
-
Lee primes are selected: the
+option was given, KCDSA-style Lim
\(en
Lee primes are selected: the
parameters are chosen such that
parameters are chosen such that
-.IR p
\ =\ 2\ q\ v \ +\
1,
+.IR p
"\~= 2" qv \~+\~
1,
where
.IR p,
.I q
where
.IR p,
.I q
@@
-639,7
+642,8
@@
is chosen to generate the subgroup of order
otherwise,
.I g
will generate the group of order
otherwise,
.I g
will generate the group of order
-.RI ( p \ \-\ 1)/2\ =\ q \*(us0\*(ue\ q \*(us1\*(ue\ q \*(us2\*(ue\ ...
+.RI ( p "\~\-\~1)/2\~= " q "\*(us0\*(ue " q \*(us1\*(ue
+.IR q \*(us2\*(ue\~...
.IP
Finally, the
.B \-C
.IP
Finally, the
.B \-C
@@
-648,23
+652,23
@@
from the provided group specification, which may either be the the name
of one of the built-in groups (say
.B "key show dh"
for a list) or a triple
of one of the built-in groups (say
.B "key show dh"
for a list) or a triple
-.RI ( p ,\
q ,\
g ).
+.RI ( p ,\
~ q ,\~
g ).
separated by commas. No random generation is done in this case: the
given parameters are simply stored.
.TP
.B "dh"
separated by commas. No random generation is done in this case: the
given parameters are simply stored.
.TP
.B "dh"
-Generates a public/private key pair for use with offline Diffie
-
Hellman,
+Generates a public/private key pair for use with offline Diffie
\(en
Hellman,
ElGamal, DSA or similar discrete-logarithm-based systems. It selects a
private key
ElGamal, DSA or similar discrete-logarithm-based systems. It selects a
private key
-.IR x \
<\
q ,
+.IR x \
~<\~
q ,
and computes the public key
and computes the public key
-.IR y
\ =\ g\*(ssx\*(se \ mod\
p .
+.IR y
"\~= " g \*(ss x "\*(se mod\~"
p .
.TP
.B "dsa-param"
Generates parameters for the DSA algorithm. DSA parameters are also
.TP
.B "dsa-param"
Generates parameters for the DSA algorithm. DSA parameters are also
-suitable for use with Diffie
-
Hellman and ElGamal system.
+suitable for use with Diffie
\(en
Hellman and ElGamal system.
.IP
.IP
-The main difference between DSA and Diffie
-
Hellman parameter generation
+The main difference between DSA and Diffie
\(en
Hellman parameter generation
is thatthe DSA parameter generation
algorithm creates a
.I seed
is thatthe DSA parameter generation
algorithm creates a
.I seed
@@
-689,12
+693,12
@@
be 160 bits, and the choice of 768 bits for
gives commensurate security.
.TP
.B "dsa"
gives commensurate security.
.TP
.B "dsa"
-Generates a public/private key pair for DSA. As for Diffie
-
Hellman
+Generates a public/private key pair for DSA. As for Diffie
\(en
Hellman
keys, it selects a
private key
keys, it selects a
private key
-.IR x \
<\
q ,
+.IR x \
~<\~
q ,
and computes the public key
and computes the public key
-.IR y
\ =\ g\*(ssx\*(se \ mod\
p .
+.IR y
"\~= " g \*(ss x "\*(se mod\~"
p .
.TP
.B "bbs"
Generates a public/private key pair for the Blum-Blum-Shub random-number
.TP
.B "bbs"
Generates a public/private key pair for the Blum-Blum-Shub random-number
@@
-705,7
+709,7
@@
The key components are prime numbers
.I p
and
.IR q ,
.I p
and
.IR q ,
-both congruent to 3 (mod\
4), and their product
+both congruent to 3 (mod\
~
4), and their product
.IR n .
The public key is simply the modulus
.IR n ;
.IR n .
The public key is simply the modulus
.IR n ;
@@
-723,9
+727,9
@@
are
.I strong
(see the discussion of strong primes above, in the section on RSA keys),
and that
.I strong
(see the discussion of strong primes above, in the section on RSA keys),
and that
-.RI ( p \
\-\
1)/2
+.RI ( p \
~\-\~
1)/2
and
and
-.RI ( q \
\-\
1)/2
+.RI ( q \
~\-\~
1)/2
are relatively prime, giving a maximum possible period length.
.IP
The key size requested by the
are relatively prime, giving a maximum possible period length.
.IP
The key size requested by the