When gpg encrypt is called from the command line, how is a key chosen to do the encryption?

I am using GnuPG. When gpg encrypt is called from the command line, how is a key chosen to do the encryption? It appears to me that -r, or –recipient, supplies a user id and that is the simple answer. I believe all of the ex… Continue reading When gpg encrypt is called from the command line, how is a key chosen to do the encryption?

Is sha256 a good function to derive 256 bit keys from a secret of sufficient length and entropy?

Assuming I have a secret key of sufficient length and entropy (I get to decide the length and have a good random source).

I would like to generate 256 length keys by hashing the root key with the name of each key, ex:

key1 = sha256(root… Continue reading Is sha256 a good function to derive 256 bit keys from a secret of sufficient length and entropy?