Release Notes: 2048 bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. 2048 bit DSA keys are now generated to use a 256 bit hash algorithm. Support for v2 OpenPGP cards was added. Support for the Camellia cipher (RFC-5581) was implemented. Support for HKP keyservers over SSL ("HKPS") was added. The algorithm for computing the SIG_ID status was changed to match the one used in version 2.0.10. File locking was improved. A memory leak which made imports of many keys very slow was fixed. Many smaller bugs were fixed.
Release Notes: This release fixes the RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack as described by Genkin, Shamir, and Tromer. Also, by default only the major version number is printed on armored output, a trustdb file is not created when --ttrust-model=always is used, keyid for key packets are printed when --list-packets is used, and the modular exponentiation algorithm has been changed to recover from a small performance loss in version 1.4.14.
Release Notes: With gpg-agent, by default users are now asked via the Pinentry whether they trust an X.509 root key. To prohibit interactive marking of such keys, the new option --no-allow-mark-trusted may be used. The command KEYINFO has options to add info from sshcontrol for gpg-agent. The included ssh agent now supports ECDSA keys. The new option --enable-putty-support allows gpg-agent to act on Windows as a Pageant replacement with full smartcard support. This release supports installation as a portable application under Windows.
Release Notes: Decryption using smartcards keys larger than 3072 now works. A new meta option ignore-invalid-option was introduced to allow using the same option file by other GnuPG versions. The hash algorithm is now printed for sig records in key listings. Invalid keyblock packets are now skipped during import to avoid a DoS. Ports from DNS SRV records are now correctly handled. Many further minor bugs were fixed.
Release Notes: The Yarom/Falkner flush+reload side-channel attack on RSA secret keys is now mitigated. IDEA was fixed for big-endian CPUs. The diagnostics for failed keyserver lookups were improved. Several further bugs and portability issues were fixed.
Release Notes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.