<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="openpgp.xsl"?>
<?xml-model href="openpgp.rng" schematypens="http://relaxng.org/ns/structure/1.0" ?>
<registry xmlns="http://www.iana.org/assignments" id="openpgp">
  <title>OpenPGP</title>
  <created>2024-01-19</created>
  <updated>2026-01-12</updated>

  <registry id="openpgp-s2k-types">
    <title>OpenPGP String-to-Key (S2K) Types</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record updated="2024-01-19">
      <value>0</value>
      <description>Simple S2K</description>
      <size>2</size>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580">RFC9580, Section 3.7.1.1</xref>
    </record>
    <record updated="2024-01-19">
      <value>1</value>
      <description>Salted S2K</description>
      <size>10</size>
      <generate>Only when string is high entropy</generate>
      <xref type="rfc" data="rfc9580">RFC9580, Section 3.7.1.2</xref>
    </record>
    <record updated="2024-01-19">
      <value>2</value>
      <description>Reserved value</description>
      <size/>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-01-19">
      <value>3</value>
      <description>Iterated and Salted S2K</description>
      <size>11</size>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580">RFC9580, Section 3.7.1.3</xref>
    </record>
    <record updated="2024-01-19">
      <value>4</value>
      <description>Argon2</description>
      <size>20</size>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580">RFC9580, Section 3.7.1.4</xref>
    </record>
    <record>
      <value>5-99</value>
      <description>Unassigned</description>
      <size/>
      <generate/>
    </record>
    <record updated="2024-07-23">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <size/>
      <generate>As appropriate</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
      <size/>
      <generate/>
    </record>
  </registry>

  <registry id="openpgp-packet-types">
    <title>OpenPGP Packet Types</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>RFC Required</registration_rule>
    <record updated="2024-01-19">
      <value>0</value>
      <critical>Yes</critical>
      <description>Reserved - this Packet Type ID MUST NOT be used</description>
      <shorthand/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-07-22">
      <value>1</value>
      <critical>Yes</critical>
      <description>Public Key Encrypted Session Key Packet</description>
      <shorthand>PKESK</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.1</xref>
    </record>
    <record updated="2024-01-19">
      <value>2</value>
      <critical>Yes</critical>
      <description>Signature Packet</description>
      <shorthand>SIG</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2</xref>
    </record>
    <record updated="2024-07-22">
      <value>3</value>
      <critical>Yes</critical>
      <description>Symmetric Key Encrypted Session Key Packet</description>
      <shorthand>SKESK</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.3</xref>
    </record>
    <record updated="2024-01-19">
      <value>4</value>
      <critical>Yes</critical>
      <description>One-Pass Signature Packet</description>
      <shorthand>OPS</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.4</xref>
    </record>
    <record updated="2024-07-22">
      <value>5</value>
      <critical>Yes</critical>
      <description>Secret Key Packet</description>
      <shorthand>SECKEY</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.1.3</xref>
    </record>
    <record updated="2024-07-22">
      <value>6</value>
      <critical>Yes</critical>
      <description>Public Key Packet</description>
      <shorthand>PUBKEY</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.1.1</xref>
    </record>
    <record updated="2024-07-22">
      <value>7</value>
      <critical>Yes</critical>
      <description>Secret Subkey Packet</description>
      <shorthand>SECSUBKEY</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.1.4</xref>
    </record>
    <record updated="2024-01-19">
      <value>8</value>
      <critical>Yes</critical>
      <description>Compressed Data Packet</description>
      <shorthand>COMP</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.6</xref>
    </record>
    <record updated="2024-01-19">
      <value>9</value>
      <critical>Yes</critical>
      <description>Symmetrically Encrypted Data Packet</description>
      <shorthand>SED</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.7</xref>
    </record>
    <record updated="2024-01-19">
      <value>10</value>
      <critical>Yes</critical>
      <description>Marker Packet</description>
      <shorthand>MARKER</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.8</xref>
    </record>
    <record updated="2024-01-19">
      <value>11</value>
      <critical>Yes</critical>
      <description>Literal Data Packet</description>
      <shorthand>LIT</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.9</xref>
    </record>
    <record updated="2024-01-19">
      <value>12</value>
      <critical>Yes</critical>
      <description>Trust Packet</description>
      <shorthand>TRUST</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.10</xref>
    </record>
    <record updated="2024-01-19">
      <value>13</value>
      <critical>Yes</critical>
      <description>User ID Packet</description>
      <shorthand>UID</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.11</xref>
    </record>
    <record updated="2024-07-22">
      <value>14</value>
      <critical>Yes</critical>
      <description>Public Subkey Packet</description>
      <shorthand>PUBSUBKEY</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.1.2</xref>
    </record>
    <record date="2024-01-19">
      <value>15-16</value>
      <critical/>
      <description>Unassigned</description>
      <shorthand/>
    </record>
    <record updated="2024-01-19">
      <value>17</value>
      <critical>Yes</critical>
      <description>User Attribute Packet</description>
      <shorthand>UAT</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.12</xref>
    </record>
    <record updated="2024-01-19">
      <value>18</value>
      <critical>Yes</critical>
      <description>Symmetrically Encrypted and Integrity Protected Data Packet</description>
      <shorthand>SEIPD</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.13</xref>
    </record>
    <record updated="2024-01-19">
      <value>19</value>
      <critical>Yes</critical>
      <description>Reserved (formerly Modification Detection Code Packet)</description>
      <shorthand/>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.13.1</xref>
    </record>
    <record updated="2024-01-19">
      <value>20</value>
      <critical>Yes</critical>
      <description>Reserved</description>
      <shorthand/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-01-19">
      <value>21</value>
      <critical>Yes</critical>
      <description>Padding Packet</description>
      <shorthand>PADDING</shorthand>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.14</xref>
    </record>
    <record date="2024-07-23">
      <value>22-39</value>
      <critical>Yes</critical>
      <description>Unassigned Critical Packets</description>
      <shorthand/>
    </record>
    <record date="2024-07-23">
      <value>40-59</value>
      <critical>No</critical>
      <description>Unassigned Non-Critical Packets</description>
      <shorthand/>
    </record>
    <record updated="2024-01-19">
      <value>60-63</value>
      <critical>No</critical>
      <description>Private or Experimental Use</description>
      <shorthand/>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-user-attribute-subpacket-types">
    <title>OpenPGP User Attribute Subpacket Types</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-26">
      <value>0</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1</value>
      <description>Image Attribute Subpacket</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.12.1</xref>
    </record>
    <record>
      <value>2-99</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-07-22">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
    </record>
  </registry>

  <registry id="openpgp-image-attribute-encoding-format">
    <title>OpenPGP Image Attribute Encoding Format</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-26">
      <value>0</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-01-19">
      <value>1</value>
      <description>JPEG <xref type="uri" data="https://www.itu.int/rec/T-REC-T.871-201105-I">JFIF</xref></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>2-99</value>
      <description>Unassigned</description>
    </record>
    <record updated="2024-07-22">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
    </record>
  </registry>

  <registry id="openpgp-signature-subpacket-types">
    <title>OpenPGP Signature Subpacket Types</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>0</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>2</value>
      <description>Signature Creation Time</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.11</xref>
    </record>
    <record date="2024-01-19">
      <value>3</value>
      <description>Signature Expiration Time</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.18</xref>
    </record>
    <record date="2024-01-19">
      <value>4</value>
      <description>Exportable Certification</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.19</xref>
    </record>
    <record date="2024-01-19">
      <value>5</value>
      <description>Trust Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.21</xref>
    </record>
    <record date="2024-01-19">
      <value>6</value>
      <description>Regular Expression</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.22</xref>
    </record>
    <record date="2024-01-19">
      <value>7</value>
      <description>Revocable</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.20</xref>
    </record>
    <record date="2024-01-19">
      <value>8</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>9</value>
      <description>Key Expiration Time</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.13</xref>
    </record>
    <record date="2024-01-19">
      <value>10</value>
      <description>Placeholder for backward compatibility</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>11</value>
      <description>Preferred Symmetric Ciphers for v1 SEIPD</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.14</xref>
    </record>
    <record date="2024-01-19">
      <value>12</value>
      <description>Revocation Key (deprecated)</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.23</xref>
    </record>
    <record date="2024-01-19">
      <value>13-15</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>16</value>
      <description>Issuer Key ID</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.12</xref>
    </record>
    <record date="2024-01-19">
      <value>17-19</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>20</value>
      <description>Notation Data</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.24</xref>
    </record>
    <record date="2024-01-19">
      <value>21</value>
      <description>Preferred Hash Algorithms</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.16</xref>
    </record>
    <record date="2024-01-19">
      <value>22</value>
      <description>Preferred Compression Algorithms</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.17</xref>
    </record>
    <record date="2024-01-19">
      <value>23</value>
      <description>Key Server Preferences</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.25</xref>
    </record>
    <record date="2024-01-19">
      <value>24</value>
      <description>Preferred Key Server</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.26</xref>
    </record>
    <record date="2024-01-19">
      <value>25</value>
      <description>Primary User ID</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.27</xref>
    </record>
    <record date="2024-01-19">
      <value>26</value>
      <description>Policy URI</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.28</xref>
    </record>
    <record date="2024-01-19">
      <value>27</value>
      <description>Key Flags</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.29</xref>
    </record>
    <record date="2024-01-19">
      <value>28</value>
      <description>Signer's User ID</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.30</xref>
    </record>
    <record date="2024-01-19">
      <value>29</value>
      <description>Reason for Revocation</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.31</xref>
    </record>
    <record date="2024-01-19">
      <value>30</value>
      <description>Features</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.32</xref>
    </record>
    <record date="2024-01-19">
      <value>31</value>
      <description>Signature Target</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.33</xref>
    </record>
    <record date="2024-01-19">
      <value>32</value>
      <description>Embedded Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.34</xref>
    </record>
    <record date="2024-01-19">
      <value>33</value>
      <description>Issuer Fingerprint</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.35</xref>
    </record>
    <record date="2024-01-19">
      <value>34</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>35</value>
      <description>Intended Recipient Fingerprint</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.36</xref>
    </record>
    <record date="2024-01-19">
      <value>37</value>
      <description>Reserved (Attested Certifications)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>38</value>
      <description>Reserved (Key Block)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>39</value>
      <description>Preferred AEAD Ciphersuites</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.15</xref>
    </record>
    <record>
      <value>40-99</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-01-19">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-127</value>
      <description>Unassigned</description>
    </record>
  </registry>

  <registry id="openpgp-key-server-preference-flags">
    <title>OpenPGP Key Server Preference Flags</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>This is a variable length bit field.
    </note>
    <record updated="2024-01-19">
      <value>0x80...</value>
      <description>No-modify</description>
      <definition>The keyholder requests that this key only be modified or 
        updated by the keyholder or an administrator of the key server.
      </definition>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-reason-revocation-revocation-octet">
    <title>OpenPGP Reason for Revocation (Revocation Octet)</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record updated="2024-07-23">
      <value>0</value>
      <description>No reason specified (Key Revocation or Certification Revocation signatures)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-07-22">
      <value>1</value>
      <description>Key is superseded (Key Revocation signatures)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-07-22">
      <value>2</value>
      <description>Key material has been compromised (Key Revocation signatures)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record updated="2024-01-19">
      <value>3</value>
      <description>Key is retired and no longer used (Key Revocation signatures)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>4-31</value>
      <description>Unassigned</description>
    </record>
    <record updated="2024-07-22">
      <value>32</value>
      <description>User ID information is no longer valid (Certification Revocation signatures)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>33-99</value>
      <description>Unassigned</description>
    </record>
    <record updated="2024-01-19">
      <value>100-110</value>
      <description>Private Use</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-features-flags">
    <title>OpenPGP Features Flags</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <note>This is a variable length bit field.
    </note>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-07-22">
      <value>0x01...</value>
      <description>Version 1 Symmetrically Encrypted and Integrity Protected Data packet</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.13.1</xref>
    </record>
    <record date="2024-01-19">
      <value>0x02...</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x04...</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>0x08...</value>
      <description>Version 2 Symmetrically Encrypted and Integrity Protected Data packet</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.13.2</xref>
    </record>
  </registry>

  <registry id="openpgp-new-packet-versions">
    <title>OpenPGP New Packet Versions (OBSOLETE)</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Registry closed</registration_rule>
    <note>Those wishing to use the removed "New Packet Versions" registry 
should instead register new versions of the relevant packets in the 
"OpenPGP Key and Signature Versions", "OpenPGP Key IDs and 
Fingerprints", and "OpenPGP Encrypted Message Packet Versions" 
registries.
    </note>
  </registry>
  
  <registry id="openpgp-key-flags">
    <title>OpenPGP Key Flags</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>This is a variable length bit field.
    </note>
    <record date="2024-07-23">
      <value>0x01...</value>
      <description>This key may be used to make User ID certifications (Signature Type IDs 0x10-0x13) or Direct Key signatures (Signature Type ID 0x1F) over other keys.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x02...</value>
      <description>This key may be used to sign data.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x04...</value>
      <description>This key may be used to encrypt communications.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x08...</value>
      <description>This key may be used to encrypt storage.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x10...</value>
      <description>The private component of this key may have been    
split by a secret-sharing mechanism.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x20...</value>
      <description>This key may be used for authentication.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x80...</value>
      <description>The private component of this key may be in the    
possession of more than one person.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x0004...</value>
      <description>Reserved (ADSK)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>0x0008...</value>
      <description>Reserved (timestamping)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-public-key-algorithms">
    <title>OpenPGP Public Key Algorithms</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>The field specifications enclosed in square brackets
for PKESK Format represent fields that may or may not be present,
depending on the PKESK version.</note>
    <record date="2024-01-19">
      <value>0</value>
      <description>Reserved</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-24">
      <value>1</value>
      <description>RSA (Encrypt or Sign) <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf">FIPS186</xref></description>
      <public>MPI(n), MPI(e) <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.1</xref></public>
      <secret>MPI(d), MPI(p), MPI(q), MPI(u)</secret>
      <signature>MPI(m^d mod n) <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.1</xref></signature>
      <pkesk>MPI(m^e mod n) <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.3</xref></pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-24">
      <value>2</value>
      <description>RSA Encrypt-Only <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf">FIPS186</xref></description>
      <public>MPI(n), MPI(e) <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.1</xref></public>
      <secret>MPI(d), MPI(p), MPI(q), MPI(u)</secret>
      <signature>N/A</signature>
      <pkesk>MPI(m^e mod n) <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.3</xref></pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-24">
      <value>3</value>
      <description>RSA Sign-Only <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf">FIPS186</xref></description>
      <public>MPI(n), MPI(e) <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.1</xref></public>
      <secret>MPI(d), MPI(p), MPI(q), MPI(u)</secret>
      <signature>MPI(m^d mod n) <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.1</xref></signature>
      <pkesk>N/A</pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>4-15</value>
      <description>Unassigned</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
    </record>
    <record date="2024-07-22">
      <value>16</value>
      <description>Elgamal (Encrypt-Only) <xref type="uri" data="https://doi.org/10.1109/tit.1985.1057074">ELGAMAL</xref></description>
      <public>MPI(p), MPI(g), MPI(y) <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.3</xref></public>
      <secret>MPI(x)</secret>
      <signature>N/A</signature>
      <pkesk>MPI(g^k mod p), MPI(m * y^k mod p) <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.4</xref></pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>17</value>
      <description>DSA (Digital Signature Algorithm) <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf">FIPS186</xref></description>
      <public>MPI(p), MPI(q), MPI(g), MPI(y) <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.2</xref></public>
      <secret>MPI(x)</secret>
      <signature>MPI(r), MPI(s) <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.2</xref></signature>
      <pkesk>N/A</pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>18</value>
      <description>ECDH public key algorithm</description>
      <public>OID, MPI(point in curve-specific point format), KDFParams <xref type="rfc" data="rfc9580">RFC9580, Sections 9.2.1 and 5.5.5.6</xref></public>
      <secret>MPI(value in curve-specific format) <xref type="rfc" data="rfc9580">RFC9580, Section 9.2.1</xref></secret>
      <signature>N/A</signature>
      <pkesk>MPI(point in curve-specific point format), size octet, encoded key <xref type="rfc" data="rfc9580">RFC9580, Sections 9.2.1, 5.1.5, and 11.5</xref></pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>19</value>
      <description>ECDSA public key algorithm <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf">FIPS186</xref></description>
      <public>OID, MPI(point in SEC1 format) <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.4</xref></public>
      <secret>MPI(value)</secret>
      <signature>MPI(r), MPI(s) <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.2</xref></signature>
      <pkesk>N/A</pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>20</value>
      <description>Reserved (formerly Elgamal Encrypt or Sign)</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>21</value>
      <description>Reserved for Diffie-Hellman (X9.42, as defined for IETF-S/MIME)</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>22</value>
      <description>EdDSALegacy (deprecated)</description>
      <public>OID, MPI(point in prefixed native format) <xref type="rfc" data="rfc9580">RFC9580, Sections 11.2.2 and 5.5.5.5</xref></public>
      <secret>MPI(value in curve-specific format) <xref type="rfc" data="rfc9580">RFC9580, Section 9.2.1</xref></secret>
      <signature>MPI, MPI <xref type="rfc" data="rfc9580">RFC9580, Sections 9.2.1 and 5.2.3.3</xref></signature>
      <pkesk>N/A</pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>23</value>
      <description>Reserved (AEDH)</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>24</value>
      <description>Reserved (AEDSA)</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>25</value>
      <description>X25519</description>
      <public>32 octets <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.7</xref></public>
      <secret>32 octets</secret>
      <signature>N/A</signature>
      <pkesk>32 octets, size octet, encoded key <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.6</xref></pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>26</value>
      <description>X448</description>
      <public>56 octets <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.8</xref></public>
      <secret>56 octets</secret>
      <signature>N/A</signature>
      <pkesk>56 octets, size octet, encoded key <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.7</xref></pkesk>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>27</value>
      <description>Ed25519</description>
      <public>32 octets <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.9</xref></public>
      <secret>32 octets</secret>
      <signature>64 octets <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.4</xref></signature>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>28</value>
      <description>Ed448</description>
      <public>57 octets <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.10</xref></public>
      <secret>57 octets</secret>
      <signature>114 octets <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3.5</xref></signature>
      <pkesk/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>29</value>
      <description>Unassigned</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
    </record>
    <record date="2026-01-09">
      <value>30</value>
      <description>ML-DSA-65+Ed25519</description>
      <public>32 octets Ed25519 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="6">Table 6</xref>),
      1952 octets ML-DSA-65 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="7">Table 7</xref>)</public>
      <secret>32 octets Ed25519 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="6">Table 6</xref>), 
      32 octets ML-DSA-65 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="7">Table 7</xref>)</secret>
      <signature>64 octets Ed25519 signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="6">Table 6</xref>),
      3309 octets ML-DSA-65 signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="7">Table 7</xref>)</signature>
      <pkesk>N/A</pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="5.2"/>
    </record>
    <record date="2026-01-09">
      <value>31</value>
      <description>ML-DSA-87+Ed448</description>
      <public>57 octets Ed448 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="6">Table 6</xref>),
      2592 octets ML-DSA-87 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="7">Table 7</xref>)</public>
      <secret>57 octets Ed448 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="6">Table 6</xref>), 
      32 octets ML-DSA-87 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="7">Table 7</xref>)</secret>
      <signature>114 octets Ed448 signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="6">Table 6</xref>),
      4627 octets ML-DSA-87 signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="7">Table 7</xref>)</signature>
      <pkesk>N/A</pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="5.2"/>
    </record>
    <record date="2026-01-09">
      <value>32</value>
      <description>SLH-DSA-SHAKE-128s</description>
      <public>32 octets public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</public>
      <secret>64 octets secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</secret>
      <signature>7856 octets signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</signature>
      <pkesk>N/A</pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="6.1"/>
    </record>
    <record date="2026-01-09">
      <value>33</value>
      <description>SLH-DSA-SHAKE-128f</description>
      <public>32 octets public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</public>
      <secret>64 octets secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</secret>
      <signature>17088 octets signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</signature>
      <pkesk>N/A</pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="6.1"/>
    </record>
    <record date="2026-01-09">
      <value>34</value>
      <description>SLH-DSA-SHAKE-256s</description>
      <public>64 octets public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</public>
      <secret>128 octets secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</secret>
      <signature>29792 octets signature (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="8">Table 8</xref>)</signature>
      <pkesk>N/A</pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="6.1"/>
    </record>
    <record date="2026-01-09">
      <value>35</value>
      <description>ML-KEM-768+X25519</description>
      <public>32 octets X25519 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="3">Table 3</xref>),
      1184 octets ML-KEM-768 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="4">Table 4</xref>)</public>
      <secret>32 octets X25519 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="3">Table 3</xref>), 
      64 octets ML-KEM-768 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="4">Table 4</xref>)</secret>
      <signature>N/A</signature>
      <pkesk>32 octets X25519 ciphertext, 1088 octets ML-KEM-768 ciphertext, 1 octet remaining length, [1 octet algorithm ID 
        in case of v3 PKESK,] n octets wrapped session key <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="4.3.1"/></pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="4.2"/>
    </record>
    <record date="2026-01-09">
      <value>36</value>
      <description>ML-KEM-1024+X448</description>
      <public>56 octets X448 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="3">Table 3</xref>),
      1568 octets ML-KEM-1024 public key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="4">Table 4</xref>)</public>
      <secret>56 octets X448 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="3">Table 3</xref>), 
      64 octets ML-KEM-1024 secret key (<xref type="draft" data="RFC-ietf-openpgp-pqc-16" table="4">Table 4</xref>)</secret>
      <signature>N/A</signature>
      <pkesk>56 octets X448 ciphertext, 1568 octets ML-KEM-1024 ciphertext, 1 octet remaining length, [1 octet algorithm ID in 
        case of v3 PKESK,] n octets wrapped session key <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="4.3.1"/></pkesk>
      <xref type="draft" data="RFC-ietf-openpgp-pqc-16" section="4.2"/>
    </record>
    <record>
      <value>37-99</value>
      <description>Unassigned</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
    </record>
    <record date="2024-01-19" updated="2024-07-22">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
      <public/>
      <secret/>
      <signature/>
      <pkesk/>
    </record>
  </registry>
 
  <registry id="openpgp-symmetric-key-algorithms">
    <title>OpenPGP Symmetric Key Algorithms</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>When registering a new symmetric cipher with a block size of 64 or
128 bits and a key size that is a multiple of 64 bits, no new
considerations are needed.

If the new cipher has a different block size, there needs to be
additional documentation describing how to use the cipher in CFB
mode.

If the new cipher has an unusual key size, then padding needs to be
considered for X25519 and X448 key wrapping, which currently needs no
padding.
    </note>
    <record date="2024-01-19">
      <value>0</value>
      <description>Plaintext or unencrypted data</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>1</value>
      <description>IDEA <xref type="uri" data="https://link.springer.com/chapter/10.1007/3-540-46877-3_35">IDEA</xref></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>2</value>
      <description>TripleDES (or DES-EDE) <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf">SP800-67</xref> with 168-bit
key derived from 192</description>
       <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>3</value>
      <description>CAST5 with 128-bit key <xref type="rfc" data="rfc2144"/></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>4</value>
      <description>Blowfish with 128-bit key, 16 rounds <xref type="uri" data="https://www.schneier.com/academic/archives/1994/09/description_of_a_new.html">BLOWFISH</xref></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>5</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>6</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>7</value>
      <description>AES with 128-bit key <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf">AES</xref></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>8</value>
      <description>AES with 192-bit key</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>9</value>
      <description>AES with 256-bit key</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>10</value>
      <description>Twofish with 256-bit key <xref type="uri" data="https://www.schneier.com/wp-content/uploads/2016/02/paper-twofish-paper.pdf">TWOFISH</xref></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>11</value>
      <description>Camellia with 128-bit key <xref type="rfc" data="rfc3713"/></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>12</value>
      <description>Camellia with 192-bit key</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>13</value>
      <description>Camellia with 256-bit key</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>14-99</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-01-19" updated="2024-07-22">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-252</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-07-24">
      <value>253-255</value>
      <description>Reserved to avoid collision with Secret Key Encryption 
(see the <xref type="uri" data="https://www.iana.org/assignments/openpgp/openpgp.xhtml#openpgp-secret-key-encryption">OpenPGP Secret Key Encryption (S2K Usage Octet)</xref> registry 
and <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.3</xref>)</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-hash-algorithms">
    <title>OpenPGP Hash Algorithms</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>When registering a new hash algorithm, if the algorithm is also to
be used with RSA signing schemes, it must also have an entry in the
"OpenPGP Hash Algorithm Identifiers for RSA Signatures' use of
EMSA-PKCS1-v1_5 Padding" registry.
    </note>
    <record date="2024-01-26">
      <value>0</value>
      <description>Reserved</description>
      <name/>
      <salt/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1</value>
      <description>MD5 <xref type="rfc" data="rfc1321"/></description>
      <name>"MD5"</name>
      <salt>N/A</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>2</value>
      <description>SHA-1 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">FIPS180</xref></description>
      <name>"SHA1"</name>
      <salt>N/A</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>3</value>
      <description>RIPEMD-160 <xref type="uri" data="https://www.iso.org/standard/67116.html">RIPEMD-160</xref></description>
      <name>"RIPEMD160"</name>
      <salt>N/A</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>4-7</value>
      <description>Reserved</description>
      <name/>
      <salt/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>8</value>
      <description>SHA2-256 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">FIPS180</xref></description>
      <name>"SHA256"</name>
      <salt>16</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>9</value>
      <description>SHA2-384 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">FIPS180</xref></description>
      <name>"SHA384"</name>
      <salt>24</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>10</value>
      <description>SHA2-512 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">FIPS180</xref></description>
      <name>"SHA512"</name>
      <salt>32</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>11</value>
      <description>SHA2-224 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf">FIPS180</xref></description>
      <name>"SHA224"</name>
      <salt>16</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>12</value>
      <description>SHA3-256 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">FIPS202</xref></description>
      <name>"SHA3-256"</name>
      <salt>16</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>13</value>
      <description>Reserved</description>
      <name/>
      <salt/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>14</value>
      <description>SHA3-512 <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf">FIPS202</xref></description>
      <name>"SHA3-512"</name>
      <salt>32</salt>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>15-99</value>
      <description>Unassigned</description>
      <name/>
      <salt/>
    </record>
    <record date="2024-07-24">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <name/>
      <salt/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
      <name/>
      <salt/>
    </record>
  </registry>

  <registry id="openpgp-compression-algorithms">
    <title>OpenPGP Compression Algorithms</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>0</value>
      <description>Uncompressed</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>1</value>
      <description>ZIP <xref type="rfc" data="rfc1951"/></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>2</value>
      <description>ZLIB <xref type="rfc" data="rfc1950"/></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>3</value>
      <description>BZip2 <xref type="uri" data="https://sourceware.org/bzip2/">BZ2</xref></description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>4-99</value>
      <description>Unassigned</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22" updated="2024-07-22">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-secret-key-encryption">
    <title>OpenPGP Secret Key Encryption (S2K Usage Octet)</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>0</value>
      <description>Unprotected</description>
      <encparam>-</encparam>
      <enc>v3 or v4 keys: [cleartext secrets || check(secrets)]
        v6 keys: [cleartext secrets]</enc>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-22">
      <value>Known symmetric cipher algo ID (see <xref type="rfc" data="rfc9580">RFC9580, Section 9.3</xref>)</value>
      <description>LegacyCFB</description>
      <encparam>IV</encparam>
      <enc>CFB(MD5(passphrase), secrets || check(secrets))</enc>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>253</value>
      <description>AEAD</description>
      <encparam>params-length (v6-only), cipher-algo, AEAD-mode, S2K-specifier-length (v6-only), S2K-specifier, nonce</encparam>
      <enc>AEAD(HKDF(S2K(passphrase), info), secrets, packetprefix)</enc>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>254</value>
      <description>CFB</description>
      <encparam>params-length (v6-only), cipher-algo, S2K-specifier-length (v6-only), S2K-specifier, IV</encparam>
      <enc>CFB(S2K(passphrase), secrets || SHA1(secrets))</enc>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>255</value>
      <description>MalleableCFB</description>
      <encparam>cipher-algo, S2K-specifier, IV</encparam>
      <enc>CFB(S2K(passphrase), secrets || check(secrets))</enc>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-signature-types">
    <title>OpenPGP Signature Types</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>0x00</value>
      <description>Binary Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.1</xref>
    </record>
    <record date="2024-01-19">
      <value>0x01</value>
      <description>Text Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.2</xref>
    </record>
    <record date="2024-01-19">
      <value>0x02</value>
      <description>Standalone Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.3</xref>
    </record>
    <record>
      <value>0x03-0x0F</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-07-22">
      <value>0x10</value>
      <description>Generic Certification Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.4</xref>
    </record>
    <record date="2024-07-22">
      <value>0x11</value>
      <description>Persona Certification Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.5</xref>
    </record>
    <record date="2024-07-22">
      <value>0x12</value>
      <description>Casual Certification Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.6</xref>
    </record>
    <record date="2024-07-22">
      <value>0x13</value>
      <description>Positive Certification Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.7</xref>
    </record>
    <record>
      <value>0x14-0x17</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-01-19">
      <value>0x18</value>
      <description>Subkey Binding Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.8</xref>
    </record>
    <record date="2024-01-19">
      <value>0x19</value>
      <description>Primary Key Binding Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.9</xref>
    </record>
    <record>
      <value>0x1A-0x1E</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-01-19">
      <value>0x1F</value>
      <description>Direct Key Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.10</xref>
    </record>
    <record date="2024-07-22">
      <value>0x20</value>
      <description>Key Revocation Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.11</xref>
    </record>
    <record>
      <value>0x21-0x27</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-07-22">
      <value>0x28</value>
      <description>Subkey Revocation Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.12</xref>
    </record>
    <record>
      <value>0x29-0x2F</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-07-22">
      <value>0x30</value>
      <description>Certification Revocation Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.13</xref>
    </record>
    <record>
      <value>0x31-0x3F</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-01-19">
      <value>0x40</value>
      <description>Timestamp Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.14</xref>
    </record>
    <record>
      <value>0x41-0x4F</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-07-22">
      <value>0x50</value>
      <description>Third-Party Confirmation Signature</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.15</xref>
    </record>
    <record>
      <value>0x51-0xFE</value>
      <description>Unassigned</description>
    </record>
    <record date="2024-01-19">
      <value>0xFF</value>
      <description>Reserved</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.1.16</xref>
    </record>    
  </registry>

  <registry id="openpgp-signature-notation-data-subpacket-notation-flags">
    <title>OpenPGP Signature Notation Data Subpacket Notation Flags</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>0x80000000 (first bit of the first octet)</value>
      <shorthand>human-readable</shorthand>
      <description>Notation value is UTF-8 text</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-signature-notation-data-subpacket-types">
    <title>OpenPGP Signature Notation Data Subpacket Types</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>Notation names are arbitrary Unicode strings encoded in UTF-8. They
reside in two namespaces: the IETF namespace and the user namespace.

This registry documents the IETF namespace. The names in this
registry MUST NOT contain the "@" character (0x40), since the
presence of that character indicates the user namespace.
    </note>
  </registry>

  <registry id="openpgp-key-ids-fingerprints">
    <title>OpenPGP Key IDs and Fingerprints</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>RFC Required</registration_rule>
    <note>When a new key version is defined, the "OpenPGP Key and Signature
Versions" registry should also be updated.
    </note>
    <record date="2024-01-19">
      <value>3</value>
      <description>MD5(MPIs without length octets)</description>
      <length>128</length>
      <id>low 64 bits of RSA modulus</id>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.4.1</xref>
    </record>
    <record date="2024-01-19">
      <value>4</value>
      <description>SHA1(normalized pubkey packet)</description>
      <length>160</length>
      <id>last 64 bits of fingerprint</id>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.4.2</xref>
    </record>
    <record date="2024-01-19">
      <value>6</value>
      <description>SHA256(normalized pubkey packet)</description>
      <length>256</length>
      <id>first 64 bits of fingerprint</id>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.4.3</xref>
    </record>
  </registry>

  <registry id="openpgp-image-attribute-versions">
    <title>OpenPGP Image Attribute Versions</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>1</value>
      <xref type="rfc" data="rfc9580">RFC9580, Section 5.12.1</xref>
    </record>
  </registry>

  <registry id="openpgp-armor-header-lines">
    <title>OpenPGP Armor Header Lines</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>BEGIN PGP MESSAGE</value>
      <description>Used for signed, encrypted, or compressed files.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>BEGIN PGP PUBLIC KEY BLOCK</value>
      <description>Used for armoring public keys.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>BEGIN PGP PRIVATE KEY BLOCK</value>
      <description>Used for armoring private keys.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>BEGIN PGP SIGNATURE</value>
      <description>Used for detached signatures, OpenPGP/MIME signatures, and cleartext signatures.</description>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-armor-header-keys">
    <title>OpenPGP Armor Header Keys</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>Version</value>
      <description>Implementation information</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 6.2.2.1</xref>
    </record>
    <record date="2024-01-19">
      <value>Comment</value>
      <description>Arbitrary text</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 6.2.2.2</xref>
    </record>
    <record date="2024-01-19">
      <value>Hash</value>
      <description>Hash algorithms used in some v4 cleartext signed messages</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 6.2.2.3</xref>
    </record>
    <record date="2024-01-19">
      <value>Charset</value>
      <description>Character set</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 6.2.2.4</xref>
    </record>
  </registry>

  <registry id="openpgp-ecc-curve-oids-usage">
    <title>OpenPGP ECC Curve OIDs and Usage</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <note>When a new elliptic curve is registered for use with OpenPGP, it
should also be added to the "OpenPGP ECC Curve-specific Wire
Formats" registry. If it is used for ECDH, also add it to the
"OpenPGP ECDH KDF and KEK Parameters" registry.
    </note>
    <record date="2024-01-19">
      <value>1.2.840.10045.3.1.7</value>
      <len>8</len>
      <octets>2A 86 48 CE 3D 03 01 07</octets>
      <description>NIST P-256</description>
      <usage>ECDSA, ECDH</usage>
      <fsize>32</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.132.0.34</value>
      <len>5</len>
      <octets>2B 81 04 00 22</octets>
      <description>NIST P-384</description>
      <usage>ECDSA, ECDH</usage>
      <fsize>48</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.132.0.35</value>
      <len>5</len>
      <octets>2B 81 04 00 23</octets>
      <description>NIST P-521</description>
      <usage>ECDSA, ECDH</usage>
      <fsize>66</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.36.3.3.2.8.1.1.7</value>
      <len>9</len>
      <octets>2B 24 03 03 02 08 01 01 07</octets>
      <description>brainpoolP256r1</description>
      <usage>ECDSA, ECDH</usage>
      <fsize>32</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.36.3.3.2.8.1.1.11</value>
      <len>9</len>
      <octets>2B 24 03 03 02 08 01 01 0B</octets>
      <description>brainpoolP384r1</description>
      <usage>ECDSA, ECDH</usage>
      <fsize>48</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.36.3.3.2.8.1.1.13</value>
      <len>9</len>
      <octets>2B 24 03 03 02 08 01 01 0D</octets>
      <description>brainpoolP512r1</description>
      <usage>ECDSA, ECDH</usage>
      <fsize>64</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.6.1.4.1.11591.15.1</value>
      <len>9</len>
      <octets>2B 06 01 04 01 DA 47 0F 01</octets>
      <description>Ed25519Legacy</description>
      <usage>EdDSALegacy</usage>
      <fsize>32</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>1.3.6.1.4.1.3029.1.5.1</value>
      <len>10</len>
      <octets>2B 06 01 04 01 97 55 01 05 01</octets>
      <description>Curve25519Legacy</description>
      <usage>ECDH</usage>
      <fsize>32</fsize>
      <xref type="rfc" data="rfc9580"/>
    </record>    
  </registry>

  <registry id="openpgp-curve-specific-wire-formats">
    <title>OpenPGP ECC Curve-Specific Wire Formats</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>NIST P-256</value>
      <point>SEC1</point>
      <ecdhkey>integer</ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>NIST P-384</value>
      <point>SEC1</point>
      <ecdhkey>integer</ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>NIST P-521</value>
      <point>SEC1</point>
      <ecdhkey>integer</ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>brainpoolP256r1</value>
      <point>SEC1</point>
      <ecdhkey>integer</ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>brainpoolP384r1</value>
      <point>SEC1</point>
      <ecdhkey>integer</ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>brainpoolP512r1</value>
      <point>SEC1</point>
      <ecdhkey>integer</ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>Ed25519Legacy</value>
      <point>N/A</point>
      <ecdhkey>N/A</ecdhkey>
      <eddsakey>32 octets of secret</eddsakey>
      <eddsasigfirst>32 octets of R</eddsasigfirst>
      <eddsasigsec>32 octets of S</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>Curve25519Legacy</value>
      <point>prefixed native</point>
      <ecdhkey>integer <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.5.6.1.1</xref></ecdhkey>
      <eddsakey>N/A</eddsakey>
      <eddsasigfirst>N/A</eddsasigfirst>
      <eddsasigsec>N/A</eddsasigsec>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-hash-alg-ids-rsa-sig-emsa-pkcs1-v1_5-padding">
    <title>OpenPGP Hash Algorithm Identifiers for RSA Signatures' Use of EMSA-PKCS1-v1_5 Padding</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>MD5</value>
      <oid>1.2.840.113549.2.5</oid>
      <prefix>0x30, 0x20, 0x30, 0x0C, 0x06, 0x08, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, 0x05, 0x00, 0x04, 0x10</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA-1</value>
      <oid>1.3.14.3.2.26</oid>
      <prefix>0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>RIPEMD-160</value>
      <oid>1.3.36.3.2.1</oid>
      <prefix>0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x24, 0x03, 0x02, 0x01, 0x05, 0x00, 0x04, 0x14</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA2-256</value>
      <oid>2.16.840.1.101.3.4.2.1</oid>
      <prefix>0x30, 0x31, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA2-384</value>
      <oid>2.16.840.1.101.3.4.2.2</oid>
      <prefix>0x30, 0x41, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA2-512</value>
      <oid>2.16.840.1.101.3.4.2.3</oid>
      <prefix>0x30, 0x51, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA2-224</value>
      <oid>2.16.840.1.101.3.4.2.4</oid>
      <prefix>0x30, 0x2D, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA3-256</value>
      <oid>2.16.840.1.101.3.4.2.8</oid>
      <prefix>0x30, 0x31, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x08, 0x05, 0x00, 0x04, 0x20</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>SHA3-512</value>
      <oid>2.16.840.1.101.3.4.2.10</oid>
      <prefix>0x30, 0x51, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x0a, 0x05, 0x00, 0x04, 0x40</prefix>
      <xref type="rfc" data="rfc9580"/>
    </record>    
  </registry>

  <registry id="openpgp-aead-algorithms">
    <title>OpenPGP AEAD Algorithms</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-26">
      <value>0</value>
      <description>Reserved</description>
      <nonce/>
      <auth/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>1</value>
      <description>EAX <xref type="uri" data="https://seclab.cs.ucdavis.edu/papers/eax.pdf">EAX</xref></description>
      <nonce>16</nonce>
      <auth>16</auth>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>2</value>
      <description>OCB <xref type="rfc" data="rfc7253"/></description>
      <nonce>15</nonce>
      <auth>16</auth>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-07-23">
      <value>3</value>
      <description>GCM <xref type="uri" data="https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-38d.pdf">SP800-38D</xref></description>
      <nonce>12</nonce>
      <auth>16</auth>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>4-99</value>
      <description>Unassigned</description>
      <nonce/>
      <auth/>
    </record>
    <record date="2024-01-19">
      <value>100-110</value>
      <description>Private or Experimental Use</description>
      <nonce/>
      <auth/>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record>
      <value>111-255</value>
      <description>Unassigned</description>
      <nonce/>
      <auth/>
    </record>
  </registry>

  <registry id="openpgp-encrypted-message-packet-versions">
    <title>OpenPGP Encrypted Message Packet Versions</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>RFC Required</registration_rule>
    <note>When a new version of SEIPD, PKESK, or SKESK are defined, consider
also adding a corresponding flag to the "OpenPGP Features Flags"
registry.
    </note>
    <record date="2024-01-19">
      <encrypted>SED <xref type="rfc" data="rfc9580">RFC9580, Section 5.7</xref></encrypted>
      <symmetric>-</symmetric>
      <public>v2 PKESK <xref type="rfc" data="rfc2440"/></public>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <encrypted>SED <xref type="rfc" data="rfc9580">RFC9580, Section 5.7</xref></encrypted>
      <symmetric>v4 SKESK <xref type="rfc" data="rfc9580">RFC9580, Section 5.3.1</xref></symmetric>
      <public>v3 PKESK <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.1</xref></public>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <encrypted>v1 SEIPD <xref type="rfc" data="rfc9580">RFC9580, Section 5.13.1</xref></encrypted>
      <symmetric>v4 SKESK <xref type="rfc" data="rfc9580">RFC9580, Section 5.3.1</xref></symmetric>
      <public>v3 PKESK <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.1</xref></public>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <encrypted>v2 SEIPD <xref type="rfc" data="rfc9580">RFC9580, Section 5.13.2</xref></encrypted>
      <symmetric>v6 SKESK <xref type="rfc" data="rfc9580">RFC9580, Section 5.3.2</xref></symmetric>
      <public>v6 PKESK <xref type="rfc" data="rfc9580">RFC9580, Section 5.1.2</xref></public>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-key-signature-versions">
    <title>OpenPGP Key and Signature Versions</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>RFC Required</registration_rule>
    <note>When a new key version is defined, the "OpenPGP Key IDs and
Fingerprints" registry should also be updated.
    </note>
    <record date="2024-01-19">
      <signing>3 <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.2.1</xref></signing>
      <sig>3 <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.2</xref></sig>
      <ops>3 <xref type="rfc" data="rfc9580">RFC9580, Section 5.4</xref></ops>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <signing>4 <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.2.2</xref></signing>
      <sig>3 <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.2</xref></sig>
      <ops>3 <xref type="rfc" data="rfc9580">RFC9580, Section 5.4</xref></ops>
      <generate>No</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <signing>4 <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.2.2</xref></signing>
      <sig>4 <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3</xref></sig>
      <ops>3 <xref type="rfc" data="rfc9580">RFC9580, Section 5.4</xref></ops>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <signing>6 <xref type="rfc" data="rfc9580">RFC9580, Section 5.5.2.3</xref></signing>
      <sig>6 <xref type="rfc" data="rfc9580">RFC9580, Section 5.2.3</xref></sig>
      <ops>6 <xref type="rfc" data="rfc9580">RFC9580, Section 5.4</xref></ops>
      <generate>Yes</generate>
      <xref type="rfc" data="rfc9580"/>
    </record>
  </registry>

  <registry id="openpgp-elliptic-curve-point-wire-formats">
    <title>OpenPGP Elliptic Curve Point Wire Formats</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>

    <record date="2024-01-19">
      <value>SEC1</value>
      <description>0x04 || x || y</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 11.2.1</xref>
    </record>
    <record date="2024-01-19">
      <value>Prefixed native</value>
      <description>0x40 || native</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 11.2.2</xref>
    </record>
  </registry>

  <registry id="openpgp-elliptic-curve-scalar-encodings">
    <title>OpenPGP Elliptic Curve Scalar Encodings</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>integer</value>
      <description>An integer encoded in big-endian format as a standard OpenPGP MPI</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 3.2</xref>
    </record>
    <record date="2024-01-19">
      <value>octet string</value>
      <description>An octet string of fixed length that may be shorter on the wire due to leading zeros being stripped by the MPI encoding and may need to be zero-padded before use</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 11.3.1</xref>
    </record>
    <record date="2024-01-19">
      <value>prefixed N octets</value>
      <description>An octet string of fixed length N, prefixed with octet 0x40 to ensure no leading zero octet</description>
      <xref type="rfc" data="rfc9580">RFC9580, Section 11.3.2</xref>
    </record>
  </registry>

  <registry id="openpgp-ecdh-kdf-kek">
    <title>OpenPGP ECDH KDF and KEK Parameters</title>
    <xref type="rfc" data="rfc9580"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Daniel Kahn Gillmor, Andrew Gallagher, Heiko Schäfer</expert>
    <record date="2024-01-19">
      <value>NIST P-256</value>
      <hash>SHA2-256</hash>
      <symmetric>AES-128</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>NIST P-384</value>
      <hash>SHA2-384</hash>
      <symmetric>AES-192</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>NIST P-521</value>
      <hash>SHA2-512</hash>
      <symmetric>AES-256</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>brainpoolP256r1</value>
      <hash>SHA2-256</hash>
      <symmetric>AES-128</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>brainpoolP384r1</value>
      <hash>SHA2-384</hash>
      <symmetric>AES-192</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>brainpoolP512r1</value>
      <hash>SHA2-512</hash>
      <symmetric>AES-256</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>
    <record date="2024-01-19">
      <value>Curve25519Legacy</value>
      <hash>SHA2-256</hash>
      <symmetric>AES-128</symmetric>
      <xref type="rfc" data="rfc9580"/>
    </record>    
  </registry>

  <people/>
</registry>
