What is the list of preferred algorithms?
The list of preferred algorithms is a list of cipher, hash and compression algorithms stored in the self-signature of a key during key generation. When you encrypt a document, GnuPG uses this list (which is then part of a public key) to determine which algorithms to use. Basically it tells other people what algorithms the recipient is able to handle and provides an order of preference.
The list of preferred algorithms is a list of cypher, hash and compression algorithms stored in the self-signature of a key during key generation. When you encrypt a document, GnuPG uses this list (which is then part of a public key) to determine which algorithms to use. Basically it tells other people what algorithms the recipient is able to handle and provides an order of preference.