Sorry the last post was cut off Sorry about my post
I can see you seem to know a lot about gpg -- thanks. Whatever happened to the tiger hash?? Lastly, do you know the reason that the serpent cipher algorithm never made it into gpg. From the NSA competition, I thought the serpent algorithm came in second --- again Im not sure of the criteria that was used to judge strength -- but wasnt it from this competition that the US gov adopted AES as the national standard? Just a question, b/c from my very elementary understanding of ciphers, it seems like serpent is a very secure standard. I believe looking at the source code (either in pgg or pgp2 -- I cant remember) I even saw a serpent.c file. Thanks for your input _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users