Page MenuHome GnuPG

Members

  • This project does not have any members.
  • View All

Watchers (1)

Details

Description

Things which are PQC (Post Quantum Cryptography) related.

For more background on PQC please view also
https://media.gnupg.org/misc/Peter_Gutmann-Why_Quantum_Cryptanalysis_is_Bollocks-2025-11.mp4

With the slides at https://www.cs.auckland.ac.nz/~pgut001/pubs/bollocks.pdf

Recent Activity

Today

ebo moved T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation from Backlog to WIP on the gnupg26 board.
Wed, Feb 25, 8:43 AM · Feature Request, PQC, gnupg26
gniibe changed the status of T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation from Open to Testing.
Wed, Feb 25, 5:16 AM · Feature Request, PQC, gnupg26

Mon, Feb 23

werner edited Description on PQC.
Mon, Feb 23, 2:01 PM
werner edited Description on PQC.
Mon, Feb 23, 9:14 AM

Thu, Feb 19

timegrid added a comment to T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.

I haven't tested it, but it looks good

Thu, Feb 19, 12:52 PM · Feature Request, PQC, gnupg26
ebo moved T7875: GnuPG: Deletion of kyber key fails from Backlog to WIP on the gnupg26 board.
Thu, Feb 19, 10:25 AM · Bug Report, PQC, gnupg26
gniibe changed the status of T7875: GnuPG: Deletion of kyber key fails from Open to Testing.
Thu, Feb 19, 5:20 AM · Bug Report, PQC, gnupg26
gniibe added a comment to T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.

Like this patch?

Thu, Feb 19, 2:35 AM · Feature Request, PQC, gnupg26

Tue, Feb 17

gniibe claimed T7875: GnuPG: Deletion of kyber key fails.
Tue, Feb 17, 8:48 AM · Bug Report, PQC, gnupg26

Fri, Feb 13

gniibe added a comment to T7875: GnuPG: Deletion of kyber key fails.

Here is an attempt of mine this week:

diff --git a/g10/call-agent.c b/g10/call-agent.c
index 5e13a3e52..8949fad17 100644
--- a/g10/call-agent.c
+++ b/g10/call-agent.c
@@ -3290,13 +3290,14 @@ confirm_status_cb (void *opaque, const char *line)
    message.  If FORCE is true the agent is advised not to ask for
    confirmation. */
 gpg_error_t
-agent_delete_key (ctrl_t ctrl, const char *hexkeygrip, const char *desc,
+agent_delete_key (ctrl_t ctrl, const char *keygrip, const char *desc,
                   int force)
 {
   gpg_error_t err;
   char line[ASSUAN_LINELENGTH];
   struct default_inq_parm_s dfltparm;
   struct confirm_parm_s confirm_parm;
+  const char *keygrip2 = NULL;
Fri, Feb 13, 8:07 AM · Bug Report, PQC, gnupg26

Mon, Feb 9

timegrid added a comment to T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.

Sorry for the ambiguity. The request was only about mentioning (bpX) for the first two choices, not to add more combinations.

Mon, Feb 9, 11:45 AM · Feature Request, PQC, gnupg26
werner triaged T8091: Kleopatra: Add kyber choices for x25519/x448 as Low priority.

Physical experiment feature support should better not be widely used.

Mon, Feb 9, 9:41 AM · gpd5x, PQC, Feature Request, kleopatra
werner triaged T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation as Low priority.
Mon, Feb 9, 9:40 AM · Feature Request, PQC, gnupg26
werner added a comment to T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.

Although it is technicall possible to use all combinations, we should limit in the menu them to those as listed above. Too many algorithms pose an interop problem. Thus we provide brainpool because it is required in Germany and the two IETF curves for the general internet (for those who are playing mitigation against against physical experiments).

Mon, Feb 9, 9:40 AM · Feature Request, PQC, gnupg26

Fri, Feb 6

timegrid created T8092: GnuPG: Add algorithm info for all kyber choices on certificate generation.
Fri, Feb 6, 2:31 PM · Feature Request, PQC, gnupg26
timegrid added a comment to T8091: Kleopatra: Add kyber choices for x25519/x448.

Note: In vsd it must be restricted to the bp algorithms then

Fri, Feb 6, 2:00 PM · gpd5x, PQC, Feature Request, kleopatra
timegrid created T8091: Kleopatra: Add kyber choices for x25519/x448.
Fri, Feb 6, 1:57 PM · gpd5x, PQC, Feature Request, kleopatra

Thu, Jan 29

werner closed T7640: ML-DSA for libgcrypt, a subtask of T6637: PQC for Libgcrypt, as Resolved.
Thu, Jan 29, 2:19 PM · PQC, libgcrypt
werner closed T7640: ML-DSA for libgcrypt as Resolved.
Thu, Jan 29, 2:19 PM · PQC, libgcrypt

Jan 13 2026

ebo edited projects for T7397: Kleopatra: Support Kyber generation, added: gpd5x (gpd-5.0.0); removed gpd5x.
Jan 13 2026, 12:46 PM · gpd5x (gpd-5.0.0), kleopatra, PQC

Jan 9 2026

werner removed a project from T6815: PQC encryption for GnuPG: gnupg26.

it does not make sense to have a workboard item for this parent ticket.

Jan 9 2026, 1:40 PM · OpenPGP, PQC, gnupg
ebo closed T7315: Allow export and import of PQC secret keys., a subtask of T6815: PQC encryption for GnuPG, as Resolved.
Jan 9 2026, 12:29 PM · OpenPGP, PQC, gnupg
ebo closed T7315: Allow export and import of PQC secret keys. as Resolved.

Tested with Gpg4win-5.0.0-beta479

Jan 9 2026, 12:29 PM · gnupg26, OpenPGP, PQC, gnupg

Nov 24 2025

werner triaged T7944: GnuPG: full-gen-key for kyber keys without passphrase will ask for passphrase twice as Low priority.

That is a feature not a bug. Make also sense if your threat model is store-trafic-no-decrypt-later. If you can get the key you will also be abale to get the cleartext. Any nobody can remember a passphrase on par with the claimed Kyber security level.

Nov 24 2025, 6:01 PM · PQC, Feature Request, gnupg26

Nov 19 2025

werner moved T7315: Allow export and import of PQC secret keys. from WIP to QA on the gnupg26 board.
Nov 19 2025, 5:47 PM · gnupg26, OpenPGP, PQC, gnupg

Nov 16 2025

werner changed the status of T7315: Allow export and import of PQC secret keys. from Open to Testing.
Nov 16 2025, 6:50 PM · gnupg26, OpenPGP, PQC, gnupg
werner changed the status of T7315: Allow export and import of PQC secret keys., a subtask of T6815: PQC encryption for GnuPG, from Open to Testing.
Nov 16 2025, 6:50 PM · OpenPGP, PQC, gnupg

Nov 14 2025

werner moved T7315: Allow export and import of PQC secret keys. from Backlog to WIP on the gnupg26 board.
Nov 14 2025, 4:01 PM · gnupg26, OpenPGP, PQC, gnupg
werner renamed T7315: Allow export and import of PQC secret keys. from Allow exporting of PQC keys. to Allow export and import of PQC secret keys..
Nov 14 2025, 3:56 PM · gnupg26, OpenPGP, PQC, gnupg
werner triaged T7932: Support gpg --passwd for Kyber as Normal priority.
Nov 14 2025, 3:45 PM · OpenPGP, PQC, gnupg

Oct 27 2025

timegrid added a comment to T7875: GnuPG: Deletion of kyber key fails.

Note that currently Kleopatra (gpg4win 5 beta) fails to delete the key, which might impact other operations. I'm currently trying to figure out, if some other bugs/quirks are a subsequent error or not.

Oct 27 2025, 12:33 PM · Bug Report, PQC, gnupg26
werner triaged T7875: GnuPG: Deletion of kyber key fails as Normal priority.

Workaround is to use --with-keygrip and delete both <keygrip>.key files. Problem here is that one part may be on a smartcard or one part might be shared (although not allowed) with other keys.

Oct 27 2025, 12:17 PM · Bug Report, PQC, gnupg26

Sep 19 2025

William closed T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys as Resolved.
Sep 19 2025, 6:21 PM · PQC, gnupg26, Bug Report

Aug 27 2025

werner changed the status of T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys from Open to Testing.
Aug 27 2025, 9:54 AM · PQC, gnupg26, Bug Report
gniibe claimed T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys.

Thank you for the report.

Aug 27 2025, 8:10 AM · PQC, gnupg26, Bug Report

Aug 25 2025

werner closed T7792: Adding four additional options after selecting Kyber (encrypt only) when using addkey as Resolved.

Thanks for reporting/requesting.

Aug 25 2025, 4:53 PM · PQC, gnupg26, Feature Request
werner triaged T7791: encryption fails with "Invalid Length" error when using Kyber1024 keys as High priority.
Aug 25 2025, 4:34 PM · PQC, gnupg26, Bug Report
werner triaged T7792: Adding four additional options after selecting Kyber (encrypt only) when using addkey as Normal priority.
Aug 25 2025, 4:30 PM · PQC, gnupg26, Feature Request

Aug 21 2025

werner merged T7787: Support exporting for of Kyber+ECC keys and subkeys into T7315: Allow export and import of PQC secret keys..
Aug 21 2025, 11:19 AM · gnupg26, OpenPGP, PQC, gnupg
werner renamed T7787: Support exporting for of Kyber+ECC keys and subkeys from Cannot export secret keys to Support exporting for of Kyber+ECC keys and subkeys.
Aug 21 2025, 11:17 AM
werner triaged T7787: Support exporting for of Kyber+ECC keys and subkeys as Normal priority.

Well, I will re-use this as a feature request to add this feature. Workaround is to list the key with --with-keygrip and backup the ~/.gnupg/private-keys-v1.d/<keygrip>.key files.

Aug 21 2025, 11:16 AM

Jul 3 2025

gniibe closed T7648: Decryption to a Ky768_Cv25519 key does not work if the Cv25519 key is on a token as Resolved.
Jul 3 2025, 7:14 AM · PQC, Bug Report

Jun 18 2025

werner closed T7014: agent: Enhancement of PKDECRYPT for KEM interface, a subtask of T6815: PQC encryption for GnuPG, as Resolved.
Jun 18 2025, 9:29 AM · OpenPGP, PQC, gnupg

Jun 17 2025

gniibe closed T7277: libgcrypt: Adding Known Answer Tests for KEM as Resolved.

Done in 1.11.1.

Jun 17 2025, 2:28 AM · PQC, libgcrypt

Jun 13 2025

gniibe added a comment to T7640: ML-DSA for libgcrypt.

Reading https://openssl-library.org/files/blog/Request_to_Extend_IETF_WGLC_for_PQ_Key_Specifications.pdf ,
seed (with "S") is included in the private-key.

Jun 13 2025, 3:40 AM · PQC, libgcrypt
gniibe added a comment to T7640: ML-DSA for libgcrypt.

The commit rC23543b6c1497: Add mldsa_compute_keygrip and let private-key include "p". works well for me.

Jun 13 2025, 2:51 AM · PQC, libgcrypt
gniibe added a comment to T7640: ML-DSA for libgcrypt.

To support Dilithium, we need to extend data handling of libgcrypt.
I propose following changes:

  • internal flag of PUBKEY_FLAG_BYTE_STRING to ask opaque MPI for data to be signed/verified.
  • The format of data as: (data(raw)[(flags no-prefix)](value ...)[(label ...)][(random-override ...)]): message, context, and random. Optional no-prefix flag to ask specific way of signing, controlling the internal, for Known Answer Tests (siggen).
Jun 13 2025, 2:50 AM · PQC, libgcrypt

May 19 2025

gniibe added a comment to T7640: ML-DSA for libgcrypt.

Looking the FIPS 204 document, using the following functions (API) is good:

May 19 2025, 7:47 AM · PQC, libgcrypt

May 15 2025

gniibe changed the status of T7648: Decryption to a Ky768_Cv25519 key does not work if the Cv25519 key is on a token from Open to Testing.
May 15 2025, 1:54 AM · PQC, Bug Report

May 14 2025

gouttegd added a comment to T7648: Decryption to a Ky768_Cv25519 key does not work if the Cv25519 key is on a token.

Thank you again for the reactivity! Applied, everything seems to work just fine.

May 14 2025, 10:17 AM · PQC, Bug Report