Recent from talks
Contribute something
Nothing was collected or created yet.
Pretty Good Privacy
View on WikipediaThis article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
| Pretty Good Privacy | |
|---|---|
| Original authors |
|
| Developer | Broadcom Inc. |
| Initial release | 1991 |
| Stable release | 11.4.0 Maintenance Pack 2
/ May 23, 2023[2] |
| Written in | C |
| Operating system | macOS, Windows[3] |
| Standards | |
| Type | Encryption software |
| License | Commercial proprietary software |
| Website | www |
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.[4]
PGP and similar software follow the OpenPGP standard (RFC 4880), an open standard for encrypting and decrypting data. Modern versions of PGP are interoperable with GnuPG and other OpenPGP-compliant systems.[5]
The OpenPGP standard has received criticism for its long-lived keys and the difficulty in learning it,[6] as well as the Efail security vulnerability that previously arose when select e-mail programs used OpenPGP with S/MIME.[7][8] The new OpenPGP standard (RFC 9580) has also been criticised by the maintainer of GnuPG Werner Koch, who in response created his own specification LibrePGP.[9] This response was dividing, with some embracing his alternative specification,[10] and others considering it to be insecure.[11]
Design
[edit]
PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a username or an e-mail address. The first version of this system was generally known as a web of trust to contrast with the X.509 system, which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Current versions of PGP encryption include options through an automated key management server.
PGP fingerprint
[edit]A public key fingerprint is a shorter version of a public key. From a fingerprint, someone can validate the correct corresponding public key. A fingerprint such as C3A6 5E46 7B54 77DF 3C4C 9790 4D22 B3CA 5B32 FF66 can be printed on a business card.[12][13]
Compatibility
[edit]As PGP evolves, versions that support newer features and algorithms can create encrypted messages that older PGP systems cannot decrypt, even with a valid private key. Therefore, it is essential that partners in PGP communication understand each other's capabilities or at least agree on PGP settings.[14]
Confidentiality
[edit]PGP can be used to send messages confidentially.[15] For this, PGP uses a hybrid cryptosystem by combining symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key generated by the sender. The symmetric key is used only once and is also called a session key. The message and its session key are sent to the receiver. The session key must be sent to the receiver so they know how to decrypt the message, but to protect it during transmission it is encrypted with the receiver's public key. Only the private key belonging to the receiver can decrypt the session key, and use it to symmetrically decrypt the message.
Digital signatures
[edit]PGP supports message authentication through digital signatures to verify whether a message was actually sent by the person or entity claimed to be the sender. The sender uses PGP to create a digital signature for the message with one of several supported public-key algorithms. To do so, PGP computes a hash, or digest, from the plaintext and then creates the digital signature from that hash using the sender's private key.
Web of trust
[edit]Both when encrypting messages and when verifying signatures, it is critical that the public key used to send messages to someone or some entity actually does 'belong' to the intended recipient. Simply downloading a public key from somewhere is not a reliable assurance of that association; deliberate (or accidental) impersonation is possible. From its first version, PGP has always included provisions for distributing user's public keys in an 'identity certification', which is also constructed cryptographically so that any tampering (or accidental garble) is readily detectable. However, merely making a certificate that is impossible to modify without being detected is insufficient; this can prevent corruption only after the certificate has been created, not before. Users must also ensure by some means that the public key in a certificate actually does belong to the person or entity claiming it. A given public key (or more specifically, information binding a user name to a key) may be digitally signed by a third-party user to attest to the association between someone (actually a user name) and the key. There are several levels of confidence that can be included in such signatures. Although many programs read and write this information, few (if any) include this level of certification when calculating whether to trust a key.
The web of trust protocol was first described by Phil Zimmermann in 1992, in the manual for PGP version 2.0:
As time goes on, you will accumulate keys from other people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually accumulate and distribute with their key a collection of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause the emergence of a decentralized fault-tolerant web of confidence for all public keys.
The web of trust mechanism has advantages over a centrally managed public key infrastructure scheme such as that used by S/MIME but has not been universally used. Users have to be willing to accept certificates and check their validity manually or have to simply accept them. No satisfactory solution has been found for the underlying problem.
Certificates
[edit]In the (more recent) OpenPGP specification, trust signatures can be used to support creation of certificate authorities. A trust signature indicates both that the key belongs to its claimed owner and that the owner of the key is trustworthy to sign other keys at one level below their own. A level 0 signature is comparable to a web of trust signature since only the validity of the key is certified. A level 1 signature is similar to the trust one has in a certificate authority because a key signed to level 1 is able to issue an unlimited number of level 0 signatures. A level 2 signature is highly analogous to the trust assumption users must rely on whenever they use the default certificate authority list (like those included in web browsers); it allows the owner of the key to make other keys certificate authorities.
PGP versions have always included a way to cancel ('revoke') public key certificates. A lost or compromised private key will require this if communication security is to be retained by that user. This is, more or less, equivalent to the certificate revocation lists of centralised PKI schemes. Recent PGP versions have also supported certificate expiration dates.
The problem of correctly identifying a public key as belonging to a particular user is not unique to PGP. All public key/private key cryptosystems have the same problem, even if in slightly different guises, and no fully satisfactory solution is known. PGP's original scheme at least leaves the decision as to whether or not to use its endorsement/vetting system to the user, while most other PKI schemes do not, requiring instead that every certificate attested to by a central certificate authority be accepted as correct.
Security quality
[edit]To the best of publicly available information, there is no known method which will allow a person or group to break PGP encryption by cryptographic or computational means. Indeed, in 1995, cryptographer Bruce Schneier characterized an early version as being "the closest you're likely to get to military-grade encryption."[16] Early versions of PGP have been found to have theoretical vulnerabilities and so current versions are recommended.[17] In addition to protecting data in transit over a network, PGP encryption can also be used to protect data in long-term data storage such as disk files. These long-term storage options are also known as data at rest, i.e. data stored, not in transit.
The cryptographic security of PGP encryption depends on the assumption that the algorithms used are unbreakable by direct cryptanalysis with current equipment and techniques.
In the original version, the RSA algorithm was used to encrypt session keys. RSA's security depends upon the one-way function nature of mathematical integer factoring.[18] Similarly, the symmetric key algorithm used in PGP version 2 was IDEA, which might at some point in the future be found to have previously undetected cryptanalytic flaws. Specific instances of current PGP or IDEA insecurities (if they exist) are not publicly known. As current versions of PGP have added additional encryption algorithms, their cryptographic vulnerability varies with the algorithm used. However, none of the algorithms in current use are publicly known to have cryptanalytic weaknesses.
New versions of PGP are released periodically and vulnerabilities fixed by developers as they come to light. Any agency wanting to read PGP messages would probably use easier means than standard cryptanalysis, e.g. rubber-hose cryptanalysis or black-bag cryptanalysis (e.g. installing some form of trojan horse or keystroke logging software/hardware on the target computer to capture encrypted keyrings and their passwords). The FBI has already used this attack against PGP[19][20] in its investigations. However, any such vulnerabilities apply not just to PGP but to any conventional encryption software.
In 2003, an incident involving seized Psion PDAs belonging to members of the Red Brigade indicated that neither the Italian police nor the FBI were able to decrypt PGP-encrypted files stored on them.[21][unreliable source?]
A second incident in December 2006, (see In re Boucher), involving US customs agents who seized a laptop PC that allegedly contained child pornography, indicates that US government agencies find it "nearly impossible" to access PGP-encrypted files. Additionally, a magistrate judge ruling on the case in November 2007 has stated that forcing the suspect to reveal his PGP passphrase would violate his Fifth Amendment rights i.e. a suspect's constitutional right not to incriminate himself.[22][23] The Fifth Amendment issue was opened again as the government appealed the case, after which a federal district judge ordered the defendant to provide the key.[24]
Evidence suggests that as of 2007[update], British police investigators are unable to break PGP,[25] so instead have resorted to using RIPA legislation to demand the passwords/keys. In November 2009 a British citizen was convicted under RIPA legislation and jailed for nine months for refusing to provide police investigators with encryption keys to PGP-encrypted files.[26]
PGP as a cryptosystem has been criticized for complexity of the standard, implementation and very low usability of the user interface[27] including by recognized figures in cryptography research.[28][29] It uses an ineffective serialization format for storage of both keys and encrypted data, which resulted in signature-spamming attacks on public keys of prominent developers of GNU Privacy Guard. Backwards compatibility of the OpenPGP standard results in usage of relatively weak default choices of cryptographic primitives (CAST5 cipher, CFB mode, S2K password hashing).[30] The standard has been also criticized for leaking metadata, usage of long-term keys and lack of forward secrecy. Popular end-user implementations have suffered from various signature-striping, cipher downgrade and metadata leakage vulnerabilities which have been attributed to the complexity of the standard.[31]
History
[edit]Early history
[edit]Phil Zimmermann created the first version of PGP encryption in 1991. The name, "Pretty Good Privacy" was inspired by the name of a grocery store, "Ralph's Pretty Good Grocery", featured in radio host Garrison Keillor's fictional town, Lake Wobegon.[32] This first version included a symmetric-key algorithm that Zimmermann had designed himself, named BassOmatic after a Saturday Night Live sketch. Zimmermann had been a long-time anti-nuclear activist, and created PGP encryption so that similarly inclined people might securely use BBSs and securely store messages and files. No license fee was required for its non-commercial use, and the complete source code was included with all copies.
In a posting of June 5, 2001, entitled "PGP Marks 10th Anniversary",[33] Zimmermann describes the circumstances surrounding his release of PGP:
It was on this day in 1991 that I sent the first release of PGP to a couple of my friends for uploading to the Internet. First, I sent it to Allan Hoeltje, who posted it to Peacenet, an ISP that specialized in grassroots political organizations, mainly in the peace movement. Peacenet was accessible to political activists all over the world. Then, I uploaded it to Kelly Goen, who proceeded to upload it to a Usenet newsgroup that specialized in distributing source code. At my request, he marked the Usenet posting as "US only". Kelly also uploaded it to many BBS systems around the country. I don't recall if the postings to the Internet began on June 5th or 6th. It may be surprising to some that back in 1991, I did not yet know enough about Usenet newsgroups to realize that a "US only" tag was merely an advisory tag that had little real effect on how Usenet propagated newsgroup postings. I thought it actually controlled how Usenet routed the posting. But back then, I had no clue how to post anything on a newsgroup, and didn't even have a clear idea what a newsgroup was.
PGP found its way onto the Internet and rapidly acquired a considerable following around the world. Users and supporters included dissidents in totalitarian countries (some affecting letters to Zimmermann have been published, some of which have been included in testimony before the US Congress), civil libertarians in other parts of the world (see Zimmermann's published testimony in various hearings), and the 'free communications' activists who called themselves cypherpunks (who provided both publicity and distribution); decades later, CryptoParty activists did much the same via Twitter.
Criminal investigation
[edit]Shortly after its release, PGP encryption found its way outside the United States, and in February 1993 Zimmermann became the formal target of a criminal investigation by the US Government for "munitions export without a license". At the time, cryptosystems using keys larger than 40 bits were considered munitions within the definition of the US export regulations; PGP has never used keys smaller than 128 bits, so it qualified at that time. Penalties for violation, if found guilty, were substantial. After several years, the investigation of Zimmermann was closed without filing criminal charges against him or anyone else.
Zimmermann challenged these regulations in an imaginative way. In 1995, he published the entire source code of PGP in a hardback book,[34] via MIT Press, which was distributed and sold widely. Anybody wishing to build their own copy of PGP could cut off the covers, separate the pages, and scan them using an OCR program (or conceivably enter it as a type-in program if OCR software was not available), creating a set of source code text files. One could then build the application using the freely available GNU Compiler Collection. PGP would thus be available anywhere in the world. The claimed principle was simple: export of munitions—guns, bombs, planes, and software—was (and remains) restricted; but the export of books is protected by the First Amendment. The question was never tested in court with respect to PGP. In cases addressing other encryption software, however, two federal appeals courts have established the rule that cryptographic software source code is speech protected by the First Amendment (the Ninth Circuit Court of Appeals in the Bernstein case and the Sixth Circuit Court of Appeals in the Junger case).
US export regulations regarding cryptography remain in force, but were liberalized substantially throughout the late 1990s. Since 2000, compliance with the regulations is also much easier. PGP encryption no longer meets the definition of a non-exportable weapon, and can be exported internationally except to seven specific countries and a list of named groups and individuals[35] (with whom substantially all US trade is prohibited under various US export controls).
The criminal investigation was dropped in 1996.[36]
PGP 3 and founding of PGP Inc.
[edit]During this turmoil, Zimmermann's team worked on a new version of PGP encryption called PGP 3. This new version was to have considerable security improvements, including a new certificate structure that fixed small security flaws in the PGP 2.x certificates as well as permitting a certificate to include separate keys for signing and encryption. Furthermore, the experience with patent and export problems led them to eschew patents entirely. PGP 3 introduced the use of the CAST-128 (a.k.a. CAST5) symmetric key algorithm, and the DSA and ElGamal asymmetric key algorithms, all of which were unencumbered by patents.
After the Federal criminal investigation ended in 1996, Zimmermann and his team started a company to produce new versions of PGP encryption. They merged with Viacrypt (to whom Zimmermann had sold commercial rights and who had licensed RSA directly from RSADSI), which then changed its name to PGP Incorporated. The newly combined Viacrypt/PGP team started work on new versions of PGP encryption based on the PGP 3 system. Unlike PGP 2, which was an exclusively command line program, PGP 3 was designed from the start as a software library allowing users to work from a command line or inside a GUI environment. The original agreement between Viacrypt and the Zimmermann team had been that Viacrypt would have even-numbered versions and Zimmermann odd-numbered versions. Viacrypt, thus, created a new version (based on PGP 2) that they called PGP 4. To remove confusion about how it could be that PGP 3 was the successor to PGP 4, PGP 3 was renamed and released as PGP 5 in May 1997.
Network Associates acquisition
[edit]In December 1997, PGP Inc. was acquired by Network Associates, Inc. ("NAI"). Zimmermann and the PGP team became NAI employees. NAI was the first company to have a legal export strategy by publishing source code. Under NAI, the PGP team added disk encryption, desktop firewalls, intrusion detection, and IPsec VPNs to the PGP family. After the export regulation liberalizations of 2000 which no longer required publishing of source, NAI stopped releasing source code.[37]
Asset split
[edit]In early 2001, Zimmermann left NAI. He served as Chief Cryptographer for Hush Communications, who provide an OpenPGP-based e-mail service, Hushmail. He has also worked with Veridis and other companies. In October 2001, NAI announced that its PGP assets were for sale and that it was suspending further development of PGP encryption. The only remaining asset kept was the PGP E-Business Server (the original PGP Commandline version). In February 2002, NAI canceled all support for PGP products, with the exception of the renamed commandline product.[38][39]
McAfee
[edit]NAI, now known as McAfee, continued to sell and support the commandline product under the name McAfee E-Business Server until 2013.[40] In 2010, Intel Corporation acquired McAfee. In 2013, the McAfee E-Business Server was transferred to Software Diversified Services (SDS), which now sells, supports, and develops it under the name SDS E-Business Server.[40][38]
For the enterprise, Townsend Security currently[when?] offers a commercial version of PGP for the IBM i and IBM z mainframe platforms. Townsend Security partnered with Network Associates in 2000 to create a compatible version of PGP for the IBM i platform. Townsend Security again ported PGP in 2008, this time to the IBM z mainframe. This version of PGP relies on a free z/OS encryption facility, which utilizes hardware acceleration. SDS also offers a commercial version of PGP (SDS E-Business Server) for the IBM z mainframe.
PGP Corporation
[edit]In August 2002, several ex-PGP team members formed a new company, PGP Corporation, and bought the PGP assets (except for the command line version) from NAI. The new company was funded by Rob Theis of Doll Capital Management (DCM) and Terry Garnett of Venrock Associates. PGP Corporation supported existing PGP users and honored NAI's support contracts. Zimmermann served as a special advisor and consultant to PGP Corporation while continuing to run his own consulting company. In 2003, PGP Corporation created a new server-based product called PGP Universal. In mid-2004, PGP Corporation shipped its own command line version called PGP Command Line, which integrated with the other PGP Encryption Platform applications. In 2005, PGP Corporation made its first acquisition: the German software company Glück & Kanja Technology AG,[41] which became PGP Deutschland AG.[42] In 2010, PGP Corporation acquired Hamburg-based certificate authority TC TrustCenter and its parent company, ChosenSecurity, to form its PGP TrustCenter[43] division.[44]
After the 2002 purchase of NAI's PGP assets, PGP Corporation offered worldwide PGP technical support from its offices in Draper, Utah; Offenbach, Germany; and Tokyo, Japan.
Symantec
[edit]On April 29, 2010, Symantec Corp. announced that it would acquire PGP Corporation for $300 million with the intent of integrating it into its Enterprise Security Group.[45] This acquisition was finalized and announced to the public on June 7, 2010. The source code of PGP Desktop 10 is available for peer review.[46]
In May 2018, a bug named EFAIL was discovered in certain implementations of PGP which from 2003 could reveal the plaintext contents of emails encrypted with it.[47][48] The chosen mitigation for this vulnerability in PGP Desktop is to mandate the use SEIP protected packets in the ciphertext, which can lead to old emails or other encrypted objects to be no longer decryptable after upgrading to the software version that has the mitigation.[49]
Broadcom
[edit]On August 9, 2019, Broadcom Inc. announced they would be acquiring the Enterprise Security software division of Symantec, which includes PGP Corporation.
PGP Corporation encryption applications
[edit]- This section describes commercial programs available from PGP Corporation. For information on other programs compatible with the OpenPGP specification, see External links below.
While originally used primarily for encrypting the contents of e-mail messages and attachments from a desktop client, PGP products have been diversified since 2002 into a set of encryption applications that can be managed by an optional central policy server. PGP encryption applications include e-mails and attachments, digital signatures, full disk encryption, file and folder security, protection for IM sessions, batch file transfer encryption, and protection for files and folders stored on network servers and, more recently, encrypted or signed HTTP request/responses by means of a client-side (Enigform) and a server-side (mod openpgp) module. There is also a WordPress plugin available, called wp-enigform-authentication, that takes advantage of the session management features of Enigform with mod_openpgp.
The PGP Desktop 9.x family includes PGP Desktop Email, PGP Whole Disk Encryption, and PGP NetShare. Additionally, a number of Desktop bundles are also available. Depending on the application, the products feature desktop e-mail, digital signatures, IM security, whole disk encryption, file, and folder security, encrypted self-extracting archives, and secure shredding of deleted files. Capabilities are licensed in different ways depending on the features required.
The PGP Universal Server 2.x management console handles centralized deployment, security policy, policy enforcement, key management, and reporting. It is used for automated e-mail encryption in the gateway and manages PGP Desktop 9.x clients. In addition to its local keyserver, PGP Universal Server works with the PGP public keyserver—called the PGP Global Directory—to find recipient keys. It has the capability of delivering e-mail securely when no recipient key is found via a secure HTTPS browser session.
With PGP Desktop 9.x managed by PGP Universal Server 2.x, first released in 2005, all PGP encryption applications are based on a new proxy-based architecture. These newer versions of PGP software eliminate the use of e-mail plug-ins and insulate the user from changes to other desktop applications. All desktop and server operations are now based on security policies and operate in an automated fashion. The PGP Universal server automates the creation, management, and expiration of keys, sharing these keys among all PGP encryption applications.
The Symantec PGP platform has now undergone a rename. PGP Desktop is now known as Symantec Encryption Desktop (SED), and the PGP Universal Server is now known as Symantec Encryption Management Server (SEMS). The current shipping versions are Symantec Encryption Desktop 10.3.0 (Windows and macOS platforms) and Symantec Encryption Server 3.3.2.
Also available are PGP Command-Line, which enables command line-based encryption and signing of information for storage, transfer, and backup, as well as the PGP Support Package for BlackBerry which enables RIM BlackBerry devices to enjoy sender-to-recipient messaging encryption.
New versions of PGP applications use both OpenPGP and the S/MIME, allowing communications with any user of a NIST specified standard.[50]
OpenPGP
[edit]Within PGP Inc., there was still concern surrounding patent issues. RSADSI was challenging the continuation of the Viacrypt RSA license to the newly merged firm. The company adopted an informal internal standard that they called "Unencumbered PGP" which would "use no algorithm with licensing difficulties". Because of PGP encryption's importance worldwide, many wanted to write their own software that would interoperate with PGP 5. Zimmermann became convinced that an open standard for PGP encryption was critical for them and for the cryptographic community as a whole. In July 1997, PGP Inc. proposed to the IETF that there be a standard called OpenPGP. They gave the IETF permission to use the name OpenPGP to describe this new standard as well as any program that supported the standard. The IETF accepted the proposal and started the OpenPGP Working Group.[citation needed]
OpenPGP is on the Internet Standards Track and is under active development. Many e-mail clients provide OpenPGP-compliant email security as described in RFC 3156. The current specification is RFC 9580 (July 2024), the successor to RFC 4880. RFC 9580 specifies a suite of required algorithms consisting of X25519, Ed25519, SHA2-256 and AES-128. In addition to these algorithms, the standard recommends X448, Ed448, SHA2-384, SHA2-512 and AES-256. Beyond these, many other algorithms are supported.
- PGP
- OpenPGP
- PGP/MIME
OpenPGP's encryption can ensure the secure delivery of files and messages, as well as provide verification of who created or sent the message using a process called digital signing. The open source office suite LibreOffice implemented document signing with OpenPGP as of version 5.4.0 on Linux.[52] Using OpenPGP for communication requires participation by both the sender and recipient. OpenPGP can also be used to secure sensitive files when they are stored in vulnerable places like mobile devices or in the cloud.[53] In late 2023, a schism occurred in the OpenPGP world: IETF's OpenPGP working group decided to choose a "crypto-refresh" update strategy for the RFC 4880 specification, rather than a more gradual "4880bis" path preferred by Werner Koch, author of GnuPG. As a result, Koch took his draft, now abandoned by the workgroup, and forked it into a "LibrePGP" specification.[9]
Implementations
[edit]The Free Software Foundation has developed its own OpenPGP-compliant software suite called GNU Privacy Guard, freely available together with all source code under the GNU General Public License and is maintained separately from several graphical user interfaces that interact with the GnuPG library for encryption, decryption, and signing functions (see KGPG, Seahorse, MacGPG).[undue weight? – discuss] Several other vendors[specify] have also developed OpenPGP-compliant software.
The development of an open source OpenPGP-compliant library, OpenPGP.js, written in JavaScript and supported by the Horizon 2020 Framework Programme of the European Union,[54] has allowed web-based applications to use PGP encryption in the web browser.
PGP keys are supported in Mozilla Thunderbird (Built-in in version 78 onwards on PC,[55] and with the OpenKeychain app as of version 9 on Android[56]), GitHub,[57] and GitLab.[58]
Limitations
[edit]With the advancement of cryptography, parts of PGP and OpenPGP have been criticized for being dated:
- The long length of PGP public keys, caused by the use of RSA and additional data other than the actual cryptographic key[59]
- Lack of forward secrecy[59]
- Use of outdated algorithms by default in several implementations[59]
- Difficulty for the users to comprehend and poor usability[29]
- Lack of ubiquity[29]
In October 2017, the ROCA vulnerability was announced, which affects RSA keys generated by buggy Infineon firmware used on Yubikey 4 tokens, often used with OpenPGP. Many published PGP keys were found to be susceptible.[60] Yubico offers free replacement of affected tokens.[61]
See also
[edit]References
[edit]- ^ "Where to Get PGP". philzimmermann.com. Phil Zimmermann & Associates LLC. February 28, 2006. Archived from the original on February 26, 2014. Retrieved March 10, 2016.
- ^ "Symantec Endpoint Encryption 11.4.0 Maintenance Pack 2 Release Notes". techdocs.broadcom.com. Archived from the original on October 5, 2024. Retrieved February 16, 2024.
- ^ "System requirements for Symantec Endpoint Encryption Client". techdocs.broadcom.com. Archived from the original on October 5, 2024. Retrieved February 16, 2024.
- ^ Zimmermann, Philip R. (1999). "Why I Wrote PGP". Essays on PGP. Phil Zimmermann & Associates LLC. Archived from the original on June 24, 2018. Retrieved July 6, 2014.
- ^ "Gnu Privacy Guard". GnuPG.org. Archived from the original on April 29, 2015. Retrieved May 26, 2015.
- ^ Latacora (July 16, 2019). "The PGP Problem". Retrieved November 22, 2024.
- ^ "Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels" (PDF).
- ^ Yen, Andy (May 15, 2018). "No, PGP is not broken, not even with the Efail vulnerabilities". Proton. Retrieved January 22, 2025.
- ^ a b "A schism in the OpenPGP world [LWN.net]". lwn.net. Archived from the original on February 22, 2024. Retrieved February 14, 2024.
- ^ Tse, Ronald; Olshevsky, Nickolay (July 22, 2024). "RNP proudly supports LibrePGP". RNP. Retrieved January 22, 2025.
- ^ Gallagher, Andrew (September 11, 2024). "A Summary of Known Security Issues in LibrePGP". Retrieved January 22, 2025.
- ^ Furley, Paul M. "PGP public key example". There are shorter ways of referring to PGP keys. Archived from the original on December 21, 2018.
can print it on my business card instead of trying to print my whole public key
- ^ Marcia Hofmann [@marciahofmann] (January 20, 2015). "my new business card (with image)" (Tweet). Retrieved July 30, 2020 – via Twitter.
- ^ "PGP User's Guide, Volume II: Special Topics". web.pa.msu.edu. Archived from the original on November 6, 2020. Retrieved November 1, 2020.
- ^ Atkins, D.; Stallings, W.; Zimmermann, P. (August 1996). PGP Message Exchange Formats. doi:10.17487/RFC1991. RFC 1991.
- ^ Schneier, Bruce (October 9, 1995). Applied Cryptography. New York: Wiley. p. 587. ISBN 0-471-11709-9.
- ^ Messmer, Ellen (August 28, 2000). "Security flaw found in Network Associates' PGP". Network World. Vol. 17, no. 35. Southbourough, Massachusetts: IDG. p. 81. Archived from the original on October 5, 2024. Retrieved May 2, 2017 – via Google Books.
- ^ Nichols, Randall (1999). ICSA Guide to Cryptography. McGraw Hill. p. 267. ISBN 0-07-913759-8.
- ^ "United States v. Scarfo (Key-Logger Case)". Epic.org. Archived from the original on October 8, 2021. Retrieved February 8, 2010.
- ^ McCullagh, Declan (July 10, 2007). "Feds use keylogger to thwart PGP, Hushmail | Tech news blog – CNET News.com". News.com. Archived from the original on March 24, 2017. Retrieved February 8, 2010.
- ^ Grigg, Ian (2003). "PGP Encryption Proves Powerful". Archived from the original on October 5, 2024. Retrieved February 15, 2022.
- ^ McCullagh, Declan (December 14, 2007). "Judge: Man can't be forced to divulge encryption passphrase | The Iconoclast - politics, law, and technology - CNET News.com". News.com. Archived from the original on October 5, 2024. Retrieved February 8, 2010.
- ^ McCullagh, Declan (January 18, 2008). "Feds appeal loss in PGP compelled-passphrase case | The Iconoclast - politics, law, and technology - CNET News.com". News.com. Archived from the original on October 10, 2008. Retrieved February 8, 2010.
- ^ McCullagh, Declan (February 26, 2009). "Judge orders defendant to decrypt PGP-protected laptop". CNET news. Archived from the original on January 9, 2022. Retrieved April 22, 2009.
- ^ John Leyden (November 14, 2007). "Animal rights activist hit with RIPA key decrypt demand". The Register. Archived from the original on August 10, 2017. Retrieved August 10, 2017.
- ^ Chris Williams (November 24, 2009). "UK jails schizophrenic for refusal to decrypt files". The Register. p. 2. Archived from the original on October 5, 2024. Retrieved August 10, 2017.
- ^ Staff, Ars (December 10, 2016). "Op-ed: I'm throwing in the towel on PGP, and I work in security". Ars Technica. Archived from the original on July 17, 2019. Retrieved July 17, 2019.
- ^ "What's the matter with PGP?". A Few Thoughts on Cryptographic Engineering. August 13, 2014. Archived from the original on October 5, 2024. Retrieved July 17, 2019.
- ^ a b c Marlinspike, Moxie (February 24, 2015). "GPG And Me". Archived from the original on October 5, 2024. Retrieved June 21, 2020.
- ^ "Latacora - The PGP Problem". latacora.micro.blog. July 16, 2019. Archived from the original on October 5, 2024. Retrieved July 17, 2019.
- ^ "Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels" (PDF). Archived (PDF) from the original on June 26, 2019. Retrieved July 17, 2019.
- ^ Holtsnider, Bill; Jaffe, Brian D. (2006). IT manager's handbook: getting your new job done (2nd ed.). Morgan Kaufmann. p. 373. ISBN 978-0-08-046574-6.
- ^ "PGP Marks 10th Anniversary". Phil Zimmermann. Archived from the original on March 9, 2022. Retrieved August 23, 2010.
- ^ Zimmermann, Philip (1995). PGP Source Code and Internals. MIT Press. ISBN 0-262-24039-4.
- ^ "Lists to Check". US Department of Commerce, Bureau of Industry and Security. Archived from the original on January 12, 2010. Retrieved December 4, 2011.
- ^ Zimmermann, Phil. "Significant Moments in PGP's History: Zimmermann Case Dropped". philzimmermann.com. Archived from the original on October 5, 2024. Retrieved February 16, 2024.
The U.S. Attorney's Office for the Northern District of California has decided that your client, Philip Zimmermann, will not be prosecuted in connection with the posting to USENET in June 1991 of the encryption program Pretty Good Privacy. The investigation is closed.
– page also contains NPR morning radio recording on this matter - ^ "Important Information About PGP & Encryption". proliberty.com. Archived from the original on January 28, 2022. Retrieved March 24, 2015.
- ^ a b "Long Live E-Business Server for Enterprise-Scale Encryption" (PDF). Software Diversified Services. August 11, 2013. Archived (PDF) from the original on March 3, 2022. Retrieved June 30, 2015.
- ^ Conger, Kate (April 3, 2017). "Intel Security is McAfee again". TechCrunch. Archived from the original on October 5, 2024. Retrieved January 8, 2018.
- ^ a b "McAfee partners with Software Diversified Services to deliver E-Business Server sales and support". January 17, 2014. Archived from the original on March 4, 2016. Retrieved June 30, 2015.
- ^ "glueckkanja.com". glueckkanja.com. Archived from the original on April 11, 2021. Retrieved August 6, 2013.
- ^ "pgp.de". pgp.de. Archived from the original on April 25, 2019. Retrieved August 6, 2013.
- ^ "pgptrustcenter.com". pgptrustcenter.com. January 26, 2010. Archived from the original on January 9, 2014. Retrieved August 6, 2013.
- ^ "News Room – Symantec Corp". Pgp.com. Archived from the original on May 10, 2010. Retrieved March 23, 2012.
- ^ "Symantec buys encryption specialist PGP for $300M". Computerworld. April 29, 2010. Archived from the original on July 4, 2014. Retrieved April 29, 2010.
- ^ "Symantec PGP Desktop Peer Review Source Code". Symantec.com. September 23, 2012. Archived from the original on November 16, 2011. Retrieved August 6, 2013.
- ^ "Critical PGP and S/MIME bugs can reveal encrypted emails—uninstall now [Updated]". arstechnica.com. May 14, 2018. Archived from the original on October 5, 2024. Retrieved May 14, 2018.
- ^ "EFAIL". efail.de. Archived from the original on May 14, 2018. Retrieved May 18, 2018.
- ^ "Cannot decrypt PGP Zip files created with earlier releases of Encryption Desktop". Archived from the original on October 18, 2021. Retrieved October 18, 2021.
- ^ "Archived NIST Technical Series Publication" (PDF). nist.gov. Archived (PDF) from the original on July 14, 2024. Retrieved July 14, 2024.
- ^ a b David, Shaw; Lutz, Donnerhacke; Rodney, Thayer; Hal, Finney; Jon, Callas (2007). "OpenPGP Message Format". tools.ietf.org. doi:10.17487/RFC4880. Archived from the original on July 13, 2012. Retrieved April 19, 2018.
- ^ "OpenPGP signature support in LibreOffice". Thorsten's Weblog. July 28, 2017. Archived from the original on November 1, 2017. Retrieved December 10, 2017.
- ^ Geier, Eric (August 22, 2014). "How to use OpenPGP to encrypt your email messages and files in the cloud". PC World. Archived from the original on May 18, 2018. Retrieved March 1, 2022.
- ^ OpenPGPjs-Team. "OpenPGPjs". Archived from the original on July 9, 2017. Retrieved January 2, 2017.
- ^ "Thunderbird 78 Has Finally Got Built-In Calendar And OpenPGP Support". LinuxReviews. October 8, 2020. Retrieved May 14, 2025.
- ^ Jack Wallen (November 13, 2024). "How to add PGP support on Android for added security and privacy". ZDNET. Retrieved May 14, 2025.
- ^ "Using GPG keys on GitHub: Creating and updating expired keys". Inspirezone. April 18, 2021. Retrieved May 14, 2025.
- ^ Madison Moore (August 23, 2025). "GitLab 9.5, Xcode 9, IEEE standard for quantum computing, and Chrome Enterprise — SD Times news digest: August 23, 2017". SD Times. Retrieved May 14, 2025.
- ^ a b c Green, Matthew (August 13, 2014). "What's the matter with PGP?". A Few Thoughts on Cryptographic Engineering. Archived from the original on October 5, 2024. Retrieved December 19, 2016.
- ^ Nemec, Matus; Sys, Marek; Svenda, Petr; Klinec, Dusan; Matyas, Vashek (2017). "The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli" (PDF). Archived (PDF) from the original on November 12, 2017.
- ^ "Yubico Replacement Program". Archived from the original on December 22, 2018. Retrieved June 13, 2018.
Further reading
[edit]- Garfinkel, Simson (1995). PGP: Pretty Good Privacy. O'Reilly & Associates. ISBN 1-56592-098-8.
- Levy, Steven (January 8, 2001). Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age. Penguin Books. ISBN 0140244328.
- Lucas, Michael W. (April 1, 2006). PGP & GPG Email for the Practical Paranoid. No Starch Press. ISBN 978-1-59327-071-1.
- Zimmermann, Phil (June 1991). "Why I Wrote PGP". Retrieved March 3, 2008.
External links
[edit]Pretty Good Privacy
View on GrokipediaTechnical Design
Core Algorithms and Hybrid Cryptosystem
Pretty Good Privacy (PGP) employs a hybrid cryptosystem that integrates symmetric-key encryption for bulk data with public-key cryptography for secure key exchange, enabling efficient protection of messages, files, and emails. The process begins with optional compression of the plaintext using algorithms like ZIP, followed by computation of a message digest via a hash function for integrity verification or signing. A random symmetric session key is then generated and used to encrypt the compressed data in cipher feedback (CFB) mode. This session key is asymmetrically encrypted using the recipient's public key and attached to the encrypted payload, allowing only the private key holder to recover the session key and decrypt the message. This design balances the computational efficiency of symmetric ciphers for large payloads with the key distribution advantages of asymmetric methods, avoiding the need to securely transmit long-term symmetric keys.[5] In its foundational implementation by Phil Zimmermann in 1991, PGP version 1.0 utilized RSA for public-key encryption and signatures, paired with an initial symmetric cipher later replaced by IDEA due to vulnerabilities in the prototype Bass-O-Matic algorithm. Hashing relied on MD5 for digests. Subsequent versions and the OpenPGP standard (RFC 4880, published November 2007) expanded support to multiple algorithms to enhance flexibility and security. Symmetric ciphers include IDEA (128-bit), TripleDES (168-bit), CAST5 (128-bit), Blowfish (variable), and AES (128-, 192-, or 256-bit keys), with AES recommended for modern use due to its resistance to known attacks.[5][6] Public-key algorithms encompass RSA (typically 1024-4096 bits for encrypt-or-sign), ElGamal (encrypt-only), and DSA (sign-only), alongside elliptic curve variants like ECDSA and ECDH in extensions. Hash algorithms feature MD5 (now deprecated), SHA-1, SHA-256, SHA-384, and SHA-512, selected based on security strength; implementations must support SHA-256 or stronger for new signatures to mitigate collision vulnerabilities in older hashes. The hybrid structure ensures backward compatibility while permitting upgrades, as algorithm preferences are negotiated via key flags and user configurations.[5]Key Management and Web of Trust
In OpenPGP implementations of Pretty Good Privacy (PGP), key management begins with the generation of asymmetric key pairs, consisting of a public key for encryption and verification and a corresponding private key for decryption and signing, using algorithms such as Ed25519 for signatures and X25519 for encryption, as mandated by the standard. Primary keys serve for certification, while optional subkeys handle specific operations like signing or encryption to compartmentalize risks if compromised. Private keys are encrypted with a user passphrase and stored securely, with key material formatted in packets including creation time, algorithm identifiers, and multiprecision integers or octet strings for parameters.[7] Public keys are distributed via transferable public key packets that bundle the primary key, user identities, subkeys, and associated signatures, enabling exchange through email, keyservers, or direct file transfer without a central registry. Key identification relies on 8-byte key IDs or longer fingerprints (20 bytes for version 4 keys, 32 for version 6) derived from SHA-256 hashes, facilitating lookup while mitigating collision risks. Revocation is managed through dedicated signatures—key revocation (type 0x20) or subkey revocation (type 0x28)—issued by the key owner or a pre-designated revoker, often prepared in advance as revocation certificates specifying reasons like compromise or supersession; these signatures propagate to invalidate the key for future validations upon distribution.[7] The web of trust model provides decentralized validation of key authenticity and identity bindings, eschewing hierarchical certificate authorities in favor of user-generated certification signatures (e.g., positive certification type 0x13) that attest to the linkage between a public key and a user ID. Users sign keys of personally verified individuals, forming transitive chains where trust propagates through interconnected signatures; software then computes key validity by evaluating path lengths, signature counts, and assigned trust levels from subpackets (levels 0–2, with depth and amount indicators up to 255). Owner trust assignments—ranging from undefined to ultimate in tools like GnuPG—gauge the reliability of a keyholder as a certifier, enabling marginal, full, or strong validity ratings based on the strongest sets of introducers.[7][8] This model supports resilient, peer-to-peer assurance but relies on active participation and keyserver synchronization for effective propagation, with trust computations remaining implementation-specific to accommodate varying security policies.[9]Digital Signatures and Message Authentication
Digital signatures in Pretty Good Privacy (PGP) enable verification of a message's origin and detection of any alterations, leveraging asymmetric cryptography to bind the content to the sender's identity. The process begins with the sender computing a cryptographic hash of the message using algorithms such as SHA-256 or SHA-512, producing a fixed-size digest that represents the data's integrity. This hash is then encrypted with the sender's private key via a public-key algorithm like RSA or DSA, yielding the digital signature, which is appended to the message as a signature packet in the OpenPGP format.[10][11] Upon receipt, the verifier recomputes the hash of the message and decrypts the signature using the sender's corresponding public key. If the decrypted value matches the recomputed hash, the signature is valid, confirming both authenticity—since only the private key holder could have produced it—and integrity, as any modification would alter the hash. PGP supports various signature types, including binary documents (type 0x00) for raw data and text documents (type 0x01) that normalize line endings before hashing to handle email-specific formatting. Detached signatures allow separate verification of files without embedding, while inline signatures integrate directly into messages, often combined with compression and encryption in a sign-then-encrypt workflow to obscure content from intermediaries.[12][13] Message authentication in PGP relies primarily on these digital signatures rather than symmetric message authentication codes (MACs), providing non-repudiation alongside integrity and origin validation. Signature packets include hashed subpackets for timestamps, issuer keys, and preferences, with unhashed subpackets for revocations or notations, ensuring flexibility in certification. Early PGP versions used MD5 and RSA exclusively, but OpenPGP standardized support for multiple hash functions (e.g., SHA-1, deprecated due to collision vulnerabilities identified in 2017) and algorithms like ElGamal, with modern implementations favoring elliptic curve variants for efficiency. For symmetrically encrypted messages lacking signatures, OpenPGP optionally employs a Modification Detection Code (MDC) packet—a SHA-1 hash of the decrypted session key and data—to guard against padding oracle attacks, though this offers integrity without authentication.[14][15] Key management integrates with signatures through self-signatures on user IDs and subkeys, but message-level authentication emphasizes direct signing to mitigate man-in-the-middle risks in untrusted channels. Vulnerabilities, such as weak hashes in legacy signatures, have prompted deprecation notices in RFC 4880 errata, urging migration to stronger primitives like SHA-256 with 2048-bit or larger keys.[16][17]Compatibility and Protocol Extensions
The OpenPGP protocol, formalized in RFC 4880 published in November 2007, establishes a standardized message format to promote interoperability across PGP implementations, including open-source variants like GnuPG and commercial products adhering to the specification.[5] Core requirements mandate support for essential algorithms such as TripleDES (ID 2), CAST5 (ID 3), AES-128 (ID 7), DSA (ID 17), ElGamal (ID 20), and SHA-1 (ID 2), ensuring basic message exchange functions without proprietary dependencies.[18] This framework obsoletes earlier standards like RFC 2440 (1998) and RFC 1991 (1996) while preserving essential structures for cross-system compatibility.[5] Backward compatibility with legacy PGP versions, particularly 2.6.x from the early 1990s, is achieved through dual packet formats: old-format headers (one-octet length tags 0-15) for broad legacy support and new-format headers (with bit 6 set for partial body lengths and tags up to 63) for enhanced features.[19] Implementations must accept version 3 (V3) keys and signatures—common in pre-OpenPGP PGP—though generation of V3 artifacts is deprecated in favor of version 4 (V4) for improved security like longer key IDs and subkey separation.[20] For instance, public-subkey packets (tag 14) are ignored by PGP 2.6.x without failure, and simple S2K derivation with MD5 and IDEA may be retained solely for decrypting old messages.[21] Unrecognized elements, such as newer compression exceeding 13-bit ZIP limits in PGP 2.6.x, trigger graceful degradation rather than total rejection.[22] Protocol extensions enable incremental evolution while minimizing disruption, primarily through IANA-registered identifiers for new algorithms and extensible subpacket structures.[23] Symmetric-key algorithms expanded beyond PGP's original IDEA (ID 1) to include AES variants (IDs 7-10) in RFC 4880, with private ranges (100-110) reserved for experimental additions.[24] Signature subpackets incorporate feature flags (type 30) to advertise capabilities like modified handling or new hashes, and critical bits (bit 7) enforce recognition of mandatory extensions.[25] Private packet tags (60-63) allow vendor-specific or trial features without conflicting with standard parsers, which ignore unknown subpackets unless critical.[26] A prominent example is RFC 6637 (June 2012), which integrates elliptic curve cryptography (ECC) via new public-key algorithm IDs—18 for ECDH and 19 for ECDSA—supporting NIST curves P-256, P-384, and P-521 in uncompressed MPI format within existing key packets.[27] This extension maintains compatibility by leveraging V4 key structures and avoiding alterations to core packet composition, with profiles defining minimal implementations (e.g., P-256 with AES-128 and SHA-256).[28] Ongoing drafts propose further extensions, such as post-quantum algorithms with IDs 22-35 for lattice-based schemes, but these remain non-standardized as of 2025 and require explicit feature signaling for adoption.[29] Such mechanisms ensure that extensions enhance functionality—e.g., stronger ciphers or quantum resistance—without invalidating prior compliant data.[13]Historical Development
Origins with Phil Zimmermann (1991–1993)
Phil Zimmermann, a software engineer and privacy activist based in Boulder, Colorado, initiated development of Pretty Good Privacy (PGP) in June 1991 as a tool to enable secure electronic mail in an era of growing digital surveillance threats.[1] Motivated by proposed U.S. legislation such as Senate Bill 266, which sought to mandate key escrow mechanisms in encryption devices to facilitate government access, Zimmermann aimed to distribute strong cryptography freely to counter potential erosion of individual privacy rights.[1] He self-funded the project amid personal financial strain, reportedly missing five mortgage payments during the first half of 1991 while coding the software on MS-DOS systems.[30] PGP version 1.0, the initial release, implemented a hybrid cryptosystem combining asymmetric public-key encryption for key exchange with symmetric encryption for bulk data, drawing on established algorithms like RSA and IDEA to provide authentication, confidentiality, and non-repudiation for messages.[1] Zimmermann released PGP 1.0 as freeware via the nascent Internet in June 1991, positioning it as a human rights instrument accessible to dissidents, journalists, and ordinary users facing insecure networks.[31] This distribution method bypassed commercial channels and export controls on cryptographic software, allowing rapid proliferation despite U.S. regulations classifying such tools as munitions.[2] From 1991 to 1993, Zimmermann iterated on PGP, releasing version 2.0 in 1992 with enhancements including support for multiple algorithms and improved key management, while maintaining its core emphasis on usability for non-experts.[32] The software's "web of trust" model for key validation emerged during this period as an alternative to centralized certificate authorities, fostering decentralized verification among users.[1] By 1993, PGP had garnered a dedicated following for its empirical resistance to interception, though its unpatented integration of licensed technologies like RSA drew early scrutiny from patent holders.[2]Legal Challenges and Government Investigation (1993–1996)
In February 1993, the United States government initiated a criminal investigation into Phil Zimmermann, the creator of Pretty Good Privacy (PGP), for allegedly violating the Arms Export Control Act and associated International Traffic in Arms Regulations (ITAR).[33] These regulations classified cryptographic software employing strong algorithms like RSA as munitions, requiring an export license for dissemination outside the U.S.; PGP's public availability on the internet, which enabled international access without formal export, prompted scrutiny by the U.S. Customs Service and Department of Justice.[34] Zimmermann maintained that he developed PGP for domestic privacy needs amid concerns over surveillance, such as those during the Gulf War, and did not intentionally export it, attributing its global spread to third-party uploads.[35] The probe focused on whether online posting constituted illegal export, potentially carrying penalties of up to ten years imprisonment and $1 million in fines per violation.[36] The investigation escalated throughout 1993, involving grand jury subpoenas to Zimmermann and associates, seizure of computers, and examination of PGP's source code for export control compliance.[37] On October 12, 1993, Zimmermann testified before the House Foreign Affairs Subcommittee on Economic Policy, Trade, and the Environment, arguing that export restrictions stifled U.S. innovation while failing to curb global cryptography proliferation, as the underlying mathematics were unpatentable and widely known.[37] He highlighted that PGP's algorithms, including 1024-bit RSA keys, provided robust protection against unauthorized access, and controls treated privacy tools as weapons equivalent to tanks.[38] The three-year ordeal imposed severe financial strain, with Zimmermann accruing over $300,000 in legal fees, leading to personal bankruptcy filings by him and collaborators.[34] By 1995, mounting legal challenges to ITAR's application to software, combined with PGP's source code publication in printed form via MIT Press—circumventing digital export rules—weakened the government's position.[33] On January 11, 1996, the Department of Justice announced the closure of the investigation without indictment, stating no further action would be taken against Zimmermann or related parties.[35] U.S. Attorney Henry Hubbard cited the probe's conclusion after reviewing evidence, though specifics on the decision—potentially influenced by policy shifts amid the Clipper chip's failure and industry lobbying—remained undisclosed.[33] The outcome underscored tensions between national security imperatives and free speech in software distribution, paving the way for PGP's commercialization.[34]Commercialization via PGP Inc. (1996–1997)
Following the U.S. government's decision to drop its criminal investigation into PGP's export without indictment in early 1996, Phil Zimmermann founded PGP Inc. to formalize and expand the software's commercialization.[2] The company incorporated to develop proprietary versions of PGP tailored for enterprise use, including enhanced support services and compliance with U.S. export regulations, thereby enabling sales of full-strength cryptographic products to businesses while distinguishing these from freeware distributions.[39] In 1996, PGP Inc. merged with ViaCrypt, a prior licensee that had been producing commercial PGP implementations since the early 1990s, integrating ViaCrypt's established customer base and licensing infrastructure to accelerate market penetration.[39] Under PGP Inc., development focused on version 5.0, which introduced improvements such as better integration with emerging standards drafts and support for multiple platforms, including Windows and Linux, to appeal to corporate clients seeking reliable email encryption and file security tools.[40] PGP 5.0 was released in mid-1997, with U.S. commercial and freeware editions for Linux following in September, marking the company's first major proprietary release and emphasizing usability enhancements like simplified key management for non-technical users in organizational settings.[41][40] This version facilitated revenue through licensed distributions, addressing prior limitations from patent disputes over algorithms like RSA by leveraging resolved licensing agreements. PGP Inc.'s brief independent operation culminated in its acquisition by Network Associates Inc. (NAI) in December 1997 for $36 million, just weeks after the PGP 5.0 rollout, shifting control to a larger security firm capable of broader distribution and integration with enterprise antivirus products.[3] This transaction provided Zimmermann and the team with resources for further innovation but also introduced corporate priorities that later influenced PGP's evolution.[42]Corporate Acquisitions and Asset Splits (1999–2002)
In late 1999 and early 2000, Network Associates underwent a major internal restructuring, dividing its operations into semi-autonomous units to streamline management and focus on core competencies; this included establishing PGP Security Inc. as a dedicated division responsible for the PGP encryption product line.[43] The move aimed to preserve PGP's development amid broader company challenges, such as integrating prior acquisitions and addressing market pressures in antivirus and network security sectors. However, PGP Security faced resource constraints and shifting priorities under new leadership, leading to reduced investment in open-source code releases and feature expansions that had been hallmarks of earlier PGP iterations.[44] Tensions escalated in 2001 when PGP creator Phil Zimmermann resigned from Network Associates on February 19, citing irreconcilable differences over the company's reluctance to publish full PGP source code and its pivot toward proprietary enhancements at the expense of community-driven improvements.[45][44] Zimmermann, who had remained with the firm post-1997 acquisition, argued that withholding source code undermined PGP's foundational ethos of transparency and auditability, a stance rooted in the software's origins as freeware to counter export restrictions. In October 2001, Network Associates announced it would divest non-core assets, including the PGP desktop encryption and Gauntlet firewall product lines, as part of a broader strategy to refocus on antivirus offerings amid declining revenues and competitive erosion in enterprise security.[46] By March 2002, Network Associates formally dissolved the PGP Security unit, offloading the Gauntlet firewall to third parties while selectively integrating select PGP technologies into its McAfee antivirus suite to bolster endpoint protection features.[47] This partial asset split reflected the conglomerate's assessment that standalone PGP maintenance was unprofitable in a market favoring bundled security solutions. In July 2002, Network Associates completed the sale of PGP's desktop and wireless encryption assets to a newly formed entity, PGP Corporation, backed by investors including Kleiner Perkins Caufield & Byers; the transaction price was not publicly disclosed, though it enabled PGP Corporation to revive development under leaders like CEO Phil Dunkleberger and CTO Jon Callas, who prioritized enterprise-grade enhancements without the distractions of Network Associates' diversified portfolio.[48][49] The divestiture marked a pivotal asset separation, restoring PGP to independent stewardship and averting potential stagnation under corporate consolidation.[50]Open Source Transition and OpenPGP Emergence (1997–2000s)
In June 1997, PGP Inc. released PGP version 5.0, which included a full rewrite of the codebase since the original 1991 version and introduced version 4 key formats that became foundational to subsequent standards. This release supported international cryptographic algorithms compliant with U.S. export regulations relaxed in prior years and anticipated the need for interoperability beyond proprietary implementations. Later that year, in July 1997, PGP Inc. proposed to the Internet Engineering Task Force (IETF) the creation of an open, non-proprietary standard called OpenPGP, granting the IETF permission to use the name for a protocol derived from PGP's message formats and operations.[51] This initiative addressed growing demands for vendor-neutral specifications amid PGP's commercialization, enabling third-party developers to create compatible software without licensing proprietary code. The proposal led to the formation of the OpenPGP Working Group, which produced RFC 2440 ("OpenPGP Message Format") in November 1998, defining packet structures, algorithms (such as RSA, IDEA, and CAST-5), and procedures for encryption, signing, and key management. RFC 2440 emphasized backward compatibility with earlier PGP versions while promoting extensible, public-domain cryptographic primitives. The standardization effort coincided with the emergence of open-source implementations, as proprietary PGP restricted access for free software advocates. On December 20, 1997, Werner Koch released the initial version of GNU Privacy Guard (GnuPG), an open-source reimplementation compatible with PGP and the draft OpenPGP specifications, developed in response to calls for libre alternatives following Richard Stallman's advocacy.[51] GnuPG, licensed under the GNU General Public License, quickly became a cornerstone for email encryption and code signing in open-source ecosystems, with its 1.0 stable release in 1999 further solidifying adoption.[52] By the early 2000s, OpenPGP's framework facilitated diverse tools like Bouncy Castle libraries and early mobile implementations, decoupling protocol evolution from PGP Inc.'s commercial trajectory after its 1997 acquisition by Network Associates, which focused on enterprise products.[2] This transition enhanced scrutiny and innovation through public review, though it also introduced implementation variances addressed in later RFCs like 4880 (2007).[53]Standards and Implementations
Evolution of the OpenPGP Standard
The OpenPGP standard originated from efforts to standardize the proprietary PGP protocol for broader interoperability, with initial formalization occurring through Internet Engineering Task Force (IETF) documents in the mid-1990s. RFC 1991, published in August 1996, defined basic PGP message exchange formats, including public-key encryption and digital signatures using algorithms like RSA and IDEA. This laid groundwork but remained tied to PGP-specific implementations. In November 1998, RFC 2440 introduced the OpenPGP message format, obsoleting RFC 1991 and establishing an open specification for packet-based structures supporting hybrid encryption, compression, and signing, independent of any single vendor. The standard emphasized modularity, allowing symmetric ciphers (e.g., CAST5), hash functions (e.g., SHA-1), and key types to be negotiated via packet tags. RFC 4880, released in November 2007, represented a significant revision of RFC 2440, introducing version 4 packet formats for keys and signatures to enhance flexibility and security.[53] Key changes included support for subkey binding with expiration dates, revocable user attributes, and improved handling of multiple hash algorithms, while deprecating weaker options like MD5 and addressing ambiguities in earlier parsing rules. This version became the de facto baseline for most implementations, enabling better resistance to certain attacks like chosen-ciphertext vulnerabilities through clarified padding requirements. Subsequent extensions via companion RFCs expanded capabilities: RFC 5581 (June 2009) added the Camellia symmetric cipher, RFC 6637 (June 2012) integrated elliptic curve cryptography (ECC) for keys and signatures using curves like NIST P-256, and RFC 7435 (October 2014) incorporated EdDSA and X25519 for post-quantum readiness precursors.[54] The standard continued evolving under the IETF's OpenPGP Working Group to address cryptographic weaknesses and modern threats. Updates like RFC 9580, published in July 2024, obsolete RFC 4880 by mandating stronger defaults (e.g., deprecating RSA keys below 2048 bits, requiring SHA-2 or better hashes), introducing AEAD modes for authenticated encryption, and supporting post-quantum algorithms via hybrid schemes.[7] This refresh, developed over years of drafts, aimed to mitigate risks from outdated primitives exposed in empirical analyses, such as SHA-1 collisions, while maintaining backward compatibility through optional features.[55] Implementations must now handle version 7 packets for these advancements, reflecting a shift toward proactive security hardening amid advancing computational threats.Major Open-Source Implementations
GnuPG, also known as GNU Privacy Guard, serves as the foremost open-source implementation of the OpenPGP standard outlined in RFC 4880, enabling encryption, digital signatures, and key management for secure data and communications.[52] Initially developed by Werner Koch in 1997 amid U.S. export controls limiting proprietary PGP distribution, GnuPG provides a complete, libre alternative with support for symmetric and asymmetric cryptography, including RSA, DSA, and later elliptic curve variants, alongside features like smartcard integration via access modules for hardware tokens.[56][52] Its command-line interface, extensible architecture, and cross-platform compatibility—spanning Linux, Windows, macOS, and embedded systems—have made it integral to tools like email clients (e.g., Thunderbird with Enigmail successor) and package managers, with ongoing releases addressing vulnerabilities and incorporating modern ciphers such as AES and EdDSA.[52] Sequoia-PGP represents a newer Rust-based implementation emphasizing memory safety, modular design, and enhanced security auditing through formal methods where feasible, comprising crates for low-level packet parsing and high-level operations.[57] Developed as an alternative to GnuPG to mitigate historical implementation bugs, it prioritizes correctness in handling edge cases like malformed packets and supports OpenPGP features with a focus on deterministic builds to reduce supply-chain risks.[58] Its adoption has grown in environments valuing Rust's type safety, such as secure messaging prototypes and key servers. For developer ecosystems, Bouncy Castle offers a low-level OpenPGP provider in Java and C#, facilitating integration into applications via the Java Cryptography Architecture (JCA) with APIs for key generation, encryption, and verification using algorithms like SHA and IDEA derivatives.[59] Similarly, OpenPGP.js provides a JavaScript library compliant with RFC 9580 (superseding RFC 4880), enabling client-side encryption in browsers and Node.js environments without native dependencies, though it trades some performance for portability across devices.[60] These libraries extend OpenPGP utility beyond standalone tools, powering custom protocols in software like Android apps and web services.[61]Proprietary and Commercial Variants
Following the resolution of legal challenges in 1996, PGP Inc. was established by Phil Zimmermann to develop and sell proprietary versions of PGP software, marking the shift toward commercial offerings with closed-source implementations. These included enhanced features for enterprise use, such as improved key management and integration capabilities, while maintaining compatibility with earlier freeware versions. Network Associates acquired PGP Inc. in 1997 and continued proprietary development, releasing versions like PGP 6.x and 7.x, which supported both commercial licensing for businesses and limited freeware distributions, but retained proprietary core encryption engines.[2] In 2002, after Network Associates discontinued PGP product lines, the intellectual property and development assets were transferred to the newly formed PGP Corporation, which resumed proprietary software production. PGP Corporation released PGP 8.0 that year, available in both commercial and freeware editions with source code for peer review in the free version, followed by subsequent updates emphasizing enterprise-grade tools. Key products included PGP Desktop, a client application for encrypting emails, files, and whole disks, and PGP Universal Server, a gateway solution for automated policy-based encryption, decryption, and key recovery in organizational environments. These variants offered vendor-supported updates, compliance certifications, and scalability features absent in purely open-source alternatives.[2][62] PGP Corporation was acquired by Symantec on June 7, 2010, for approximately $300 million in cash, leading to the integration and rebranding of its proprietary PGP technologies into the Symantec Encryption portfolio. Products such as PGP Desktop became Symantec Encryption Desktop, providing endpoint encryption for data at rest and in transit, while server offerings evolved into Symantec Encryption Server for centralized management and whole-disk encryption capabilities like PGP Whole Disk Encryption. Symantec's versions prioritized enterprise interoperability, FIPS compliance, and professional support services, distinguishing them through licensed, closed-source enhancements over open-source OpenPGP implementations like GnuPG. Following Broadcom's 2019 acquisition of Symantec's enterprise security business, these products continued under PGP Encryption branding, with ongoing support for legacy deployments as of 2025.[63][64][32][65]Security Analysis
Historical Strengths and Empirical Validation
Pretty Good Privacy (PGP) demonstrated historical strengths through its pioneering hybrid encryption model, which combined asymmetric public-key cryptography for secure key exchange with efficient symmetric ciphers for data encryption, enabling end-to-end protection without relying on trusted third parties. Introduced in 1991, PGP utilized the RSA algorithm for public-key operations and the International Data Encryption Algorithm (IDEA) for symmetric encryption, both selected for their resistance to known attacks at the time; IDEA, in particular, was a novel block cipher designed to withstand differential and linear cryptanalysis. This architecture compressed data prior to encryption to minimize redundancy and enhance resistance to statistical attacks, while digital signatures ensured message integrity and authenticity via hash functions like MD5 initially, later upgraded to stronger options.[2][66] The core cryptographic primitives of PGP have empirically validated their robustness over more than three decades, with no successful cryptanalytic breaks reported against properly implemented and keyed instances despite extensive scrutiny by academic and adversarial researchers. Early versions withstood challenges during the 1990s export control debates, where U.S. government assessments implicitly acknowledged PGP's strength by classifying it as a munition rather than dismissing it as insecure. Subsequent migrations to AES for symmetric encryption and larger RSA or elliptic curve keys have preserved or enhanced this security margin, as AES-256 remains unbroken against brute-force or analytical attacks with current computing power.[67][68] Real-world applications further substantiate PGP's empirical success, as encrypted communications protected by PGP resisted decryption by state actors in cases involving journalists, activists, and whistleblowers, with compromises attributable to key management errors or legal coercion rather than algorithmic failures. For example, PGP's deployment in privacy-sensitive contexts, such as secure file transfers and email among organizations, has maintained data confidentiality without cryptographic breaches, underscoring the protocol's causal efficacy in causal-realist terms against targeted surveillance. Audits and ongoing implementations in standards like OpenPGP confirm that, when configured with modern parameters (e.g., 4096-bit RSA or EdDSA keys, SHA-256 hashing, AES-256), PGP achieves security levels equivalent to its component primitives.[32][69]Known Vulnerabilities and Implementation Flaws
In 2018, researchers disclosed EFAIL, a class of vulnerabilities affecting OpenPGP and S/MIME implementations in email clients, enabling attackers to exfiltrate plaintext from encrypted messages via active attacks that manipulate MIME structures or exploit cipher block chaining (CBC) mode padding oracles.[70] These flaws arose from how clients like Thunderbird and Outlook processed encrypted content, such as rendering HTML or base64-decoding parts, allowing remote content to leak up to 35 bytes per request, potentially recovering full messages over multiple queries if the attacker controlled the network or email server.[71] EFAIL impacted 10 of 35 tested OpenPGP clients and stemmed partly from the protocol's reliance on unauthenticated encryption modes without built-in protections against such exfiltration, though core cryptographic primitives remained intact.[70] GnuPG, a primary OpenPGP implementation, has faced multiple code-level bugs, including CVE-2018-12020, where weak string-to-key (S2K) derivation functions allowed brute-force recovery of passphrases from memory dumps or side-channel leaks due to inefficient counting in iterated hashing.[72] Another issue, CVE-2019-13050, enabled denial-of-service via "poisoned" public keys flooded with excessive signatures, bloating keyrings and slowing validation to the point of unusability, exploitable through keyserver imports dating back to design choices in signature handling.[73] Subsequent fixes in GnuPG 2.2.23 addressed related DoS vectors in versions 2.2.21 and 2.2.22 (CVE-2020-25125), where malformed packets triggered infinite loops during decryption.[73] Implementation flaws have also appeared in derived tools, such as OpenPGP.js, where CVE-2025-47934 permitted spoofing of signatures and encrypted emails by mishandling detached signature verification, allowing attackers to forge valid-appearing messages without key access.[74] Historical parsers in GnuPG exhibited invalid reads (CVE-2015-1607), risking crashes or disclosures from malformed keyrings, underscoring persistent risks in boundary handling across versions.[75] Despite patches, these incidents highlight how protocol flexibility—intended for interoperability—exposes surfaces to client-specific errors, with no fundamental breaks in algorithms like RSA or AES when used with strong parameters, but requiring vigilant updates to mitigate.[76]Usability Barriers and Human Factors
Despite its cryptographic robustness, Pretty Good Privacy (PGP) has faced persistent usability challenges stemming from its complex key management processes, which require users to generate asymmetric key pairs, securely exchange public keys, verify key authenticity via fingerprints or the web-of-trust model, and revoke compromised keys—tasks that demand technical expertise often absent in non-specialist users.[77] These barriers contribute to high error rates, as evidenced by a 1999 laboratory study of PGP 5.0 involving 22 novice participants, where none successfully met core security objectives such as encrypting messages to the correct recipient without inadvertently disclosing plaintext, even after explicit training and repeated exposure.[78] Human factors exacerbate these issues, including cognitive overload from opaque interfaces that fail to provide intuitive feedback on actions like distinguishing encryption from signing or detecting key mismatches. In the same study, participants frequently misinterpreted PGP's "pen and paper" metaphors for signing, leading to skipped verifications and false senses of security, with errors persisting across trials due to inadequate error recovery mechanisms.[78] The web-of-trust model, intended to decentralize key validation, further confounds users by requiring subjective trust assessments across interconnected signatures, often resulting in unverified or malicious keys being accepted; empirical analysis of keyserver data from 2019 revealed that only a small fraction of PGP keys exhibit active usage patterns indicative of proper validation practices.[79][80] Follow-up evaluations of modern PGP implementations, such as a 2015 study on Mailvelope, confirmed ongoing difficulties, with users struggling to integrate encryption into webmail workflows and verify key fingerprints accurately, achieving success rates below 50% for threat detection tasks like identifying substituted keys.[81] Key fingerprint representation remains a bottleneck, as short identifiers (e.g., 32-bit key IDs) are prone to collisions exploitable in man-in-the-middle attacks, while full 160-bit fingerprints are cumbersome for manual comparison, leading to reliance on insecure shortcuts like visual similarity checks.[82] These human-centric flaws, rooted in mismatched mental models between user expectations and PGP's decentralized design, have limited adoption to technically proficient communities, with surveys indicating that even experts overlook routine safeguards like key revocation in dynamic environments.[77][83]Exposure to Modern Threats Including Quantum Computing
OpenPGP implementations, including those based on PGP, rely on public-key algorithms such as RSA and elliptic curve variants for key exchange and digital signatures, which are vulnerable to quantum computing attacks via Shor's algorithm.[84] Shor's algorithm enables efficient factorization of large integers and solving of discrete logarithm problems, potentially allowing decryption of encrypted sessions or forgery of signatures using sufficiently powerful quantum computers. In contrast, the symmetric encryption components of OpenPGP, such as AES-256, face only a quadratic speedup threat from Grover's algorithm, rendering them quantum-resistant with appropriately sized keys.[84] The "harvest now, decrypt later" strategy poses an immediate risk, where adversaries collect encrypted data today for future quantum decryption, underscoring the need for migration to post-quantum algorithms.[85] As of 2025, no cryptographically relevant quantum computer exists, but projections indicate potential scalability within 10-20 years, prompting proactive standardization efforts. The IETF has advanced drafts for integrating post-quantum public-key algorithms into OpenPGP, including lattice-based schemes like Kyber for encryption and Dilithium or SPHINCS+ for signatures, to maintain compatibility while enhancing resistance.[86] GnuPG, the primary open-source OpenPGP implementation, has explored support for these algorithms but faces challenges with key size overhead—post-quantum keys can exceed 3 KB, complicating infrastructure and performance.[87] ProtonMail has prototyped quantum-safe OpenPGP extensions using hybrid classical-post-quantum schemes to bridge the transition, emphasizing interoperability.[85] However, widespread adoption lags due to the absence of finalized NIST-approved integrations in core OpenPGP tools, leaving legacy deployments exposed until full protocol updates occur.[88] Beyond quantum threats, modern classical attacks exploit implementation weaknesses in OpenPGP, such as timing side-channels in key generation or malleability in certain cipher modes, though these are mitigated in updated libraries like Libgcrypt.[4] Nation-state actors have demonstrated capabilities to brute-force weaker keys or exploit metadata leaks in PGP-encrypted communications, amplifying risks in high-stakes environments.[89] Comprehensive audits recommend hybrid cryptography and key rotation to address these evolving vectors, prioritizing empirical validation over theoretical assurances.[90]Controversies and Criticisms
US Government Suppression and Export Control Battles
In 1991, Phil Zimmermann developed and publicly released Pretty Good Privacy (PGP), an email encryption software utilizing strong public-key cryptography, which quickly spread internationally via the internet without an export license.[2] The U.S. government classified strong cryptographic software as a munition under the Arms Export Control Act and International Traffic in Arms Regulations (ITAR), requiring prior approval for exports to prevent adversaries from accessing tools that could evade surveillance.[36] This classification stemmed from national security concerns, viewing encryption as dual-use technology akin to weapons, though critics argued it hindered U.S. innovation and global privacy standards.[37] By 1993, the U.S. Customs Service launched a three-year criminal investigation into Zimmermann, alleging violations of export controls due to PGP's unrestricted online availability, which enabled foreign downloads.[35] The probe, involving the Departments of Justice and State, scrutinized whether PGP's dissemination constituted illegal export of controlled technology, potentially subjecting Zimmermann to fines or imprisonment; he faced financial strain from legal defense and withheld testimony under advice of counsel during congressional hearings.[37] Concurrently, broader "Crypto Wars" efforts included proposals like the Clipper Chip for key escrow, reflecting government resistance to unescrowed strong encryption.[36] The investigation concluded on January 11, 1996, when U.S. Attorney Michael J. Yamaguchi announced its closure without indictments, citing insufficient evidence and legal challenges asserting that cryptographic source code constituted protected speech under the First Amendment.[33] [35] Federal courts, in cases like Bernstein v. United States (1996), reinforced this by striking down prior restraints on encryption exports as unconstitutional.[36] Export controls eased thereafter; President Clinton's 1996 executive order liberalized rules for commercial encryption up to 56-bit keys, with full deregulation for open-source and most commercial software by 2000, allowing PGP's unrestricted global distribution except to embargoed nations.[91] These battles highlighted tensions between security imperatives and free expression, ultimately favoring broader access to privacy tools despite initial suppression attempts.[38]Design Flaws and Overstated Privacy Claims
OpenPGP, the standard underlying PGP implementations, does not encrypt email subject lines or certain MIME headers, exposing this metadata to email providers, network observers, and potential adversaries during transit.[92][93] This design choice stems from compatibility with existing email protocols, which separate headers from body content, but it undermines confidentiality by revealing communication topics and patterns without additional measures like header encryption extensions.[94] The web-of-trust model for public key validation relies on decentralized signatures to establish authenticity, yet empirical analysis shows it suffers from sparse connectivity, with most users unable to form reliable trust paths due to limited key signing events and keyserver synchronization issues.[95] Keyservers, intended to distribute revocation and trust data, have faced scalability problems, spam, and desynchronization, rendering the system ineffective for widespread verification as of 2019.[96] OpenPGP lacks native support for forward secrecy, meaning that compromise of a long-term private key retroactively exposes all prior encrypted messages encrypted under the corresponding public key, a vulnerability absent in protocols like Signal that rotate ephemeral keys per session.[79][97] The message format's complexity, including nested packet structures and optional compression, has facilitated attacks such as EFAIL (disclosed in May 2018), where adversaries manipulate encrypted content in transit to exfiltrate plaintext via client-side rendering flaws.[98][79] Advocates have portrayed PGP as offering robust end-to-end privacy for email, yet this overlooks inherent metadata leakage and the protocol's dependence on flawless user key management, which studies show fails in practice for non-experts.[79][99] Claims of "unbreakable" security, rooted in the strength of algorithms like RSA and AES, ignore design-level exposures to traffic analysis and the absence of protections against quantum threats in default configurations, as no hybrid post-quantum modes were standardized until recent drafts.[79] These limitations have led cryptographers to argue that modern systems would avoid PGP's archaic structure, prioritizing simplicity and metadata resistance over backward compatibility.[79][99]Key Management Risks and Identity Binding Issues
In PGP, private keys are safeguarded primarily by user-chosen passphrases, rendering them susceptible to compromise through weak passphrase selection, brute-force attacks, or theft via malware if stored on compromised devices.[100][101] The long-lived nature of PGP root keys, often retained indefinitely and tied to a user's identity, amplifies this risk by extending the window for exposure without routine rotation, as regenerating and redistributing keys disrupts established trust networks.[79] A notable incident occurred on December 31, 2022, when Bitcoin Core developer Luke Dashjr reported the compromise of his PGP private key—likely via a hacked server—enabling attackers to drain over 200 BTC (valued at approximately $3.3 million) from his wallet through unauthorized transactions.[102] Key revocation poses additional challenges, as it requires access to the private key to generate a valid revocation certificate, which may be impossible if the key is lost or already compromised; even when feasible, propagation across decentralized keyservers is inconsistent, and users rarely check for revocations in practice.[103][104] This is compounded by PGP's encouragement of static keys, where rotation is discouraged due to the effort of re-signing and re-verifying signatures in social graphs, leaving compromised keys active longer than necessary.[79] Empirical usability studies highlight that tasks like revocation are error-prone for non-experts, often overlooked amid the system's complexity.[78] Identity binding in PGP relies on the Web of Trust model, where users sign public keys to vouch for their association with claimed identities, but this decentralized approach falters due to insufficient verification: keyservers allow unverified uploads with arbitrary email claims, enabling impersonation without robust checks.[96] Trust propagation through signature chains is unreliable, as most users accept short or unexamined paths, while experts distrust the system entirely, favoring direct key exchanges over the infrastructure.[79][96] Consequently, the model permits sybil-like attacks or forged bindings, undermining PGP's ability to causally link keys to real-world identities in adversarial settings, with consensus among cryptographers that the Web of Trust has proven fundamentally broken for scalable, secure authentication.[96]Impact and Current Status
Influence on Cryptographic Practices and Privacy Advocacy
PGP's release in 1991 by Phil Zimmermann popularized the application of public-key cryptography to email encryption, combining symmetric algorithms like IDEA or CAST with asymmetric ones such as RSA for efficient, secure data communication, thereby influencing subsequent hybrid cryptosystems in messaging protocols.[1] This approach demonstrated the feasibility of end-to-end encryption for non-experts, prompting the development of interoperable standards; PGP formed the basis for the OpenPGP specification, formalized in RFC 4880 by the Internet Engineering Task Force in 2007, which defines packet formats, key management, and signature mechanisms for broad compatibility.[105] Implementations adhering to OpenPGP, including GnuPG released in 1999, extended PGP's model by supporting modern algorithms like AES while maintaining backward compatibility, embedding these practices into tools for secure file handling and software distribution. PGP introduced the "web of trust" model, a decentralized alternative to centralized certificate authorities, where users mutually certify public keys through signatures, fostering peer-to-peer validation without reliance on hierarchical intermediaries. This paradigm influenced cryptographic practices by emphasizing user autonomy in identity verification, contrasting with X.509-based systems, and inspired key-signing events and keyserver networks that persist in contemporary OpenPGP ecosystems, though it highlighted challenges in scalability and revocation.[105] In privacy advocacy, PGP galvanized opposition to U.S. export restrictions on strong cryptography during the 1990s "crypto wars," as Zimmermann's distribution of the software via the internet evaded munitions controls under the International Traffic in Arms Regulations, leading to a federal investigation from 1993 to 1996 that underscored civilian rights to privacy tools.[1] The case amplified calls for policy reform, contributing to the 1999 relaxation of export rules and bolstering cypherpunk arguments for unrestricted access to encryption as a bulwark against surveillance, with Zimmermann articulating that "strong cryptography... is the best route to privacy" in communications.[1] This advocacy legacy endures in open-source successors like GnuPG, which prioritize accessibility and auditability, influencing broader movements for digital rights amid ongoing debates over government backdoors.[106]Barriers to Widespread Adoption
Despite its technical robustness, PGP's decentralized web of trust model has proven insufficient for scalable identity verification, as users rarely participate in key-signing events or maintain comprehensive trust networks, leading to frequent reliance on unverified keys or key servers prone to compromise.[99] This contrasts with centralized systems like TLS, where certificate authorities provide automated validation, reducing the cognitive burden and enabling broader deployment. Studies on secure communication tools confirm that identity assurance remains a core obstacle, with PGP's approach exacerbating adoption hurdles in diverse user populations.[107] Major email providers, such as Google and Microsoft, have resisted integrating PGP due to its incompatibility with content-scanning features essential for spam detection, advertising, and malware filtering; for instance, Gmail's architecture prioritizes server-side analysis, rendering client-side PGP encryption disruptive to these operations.[99] This institutional inertia creates a coordination barrier, as widespread adoption requires symmetric support from both senders and recipients, yet penetration remains low—estimated at under 1% of email traffic in surveys of technical communities.[108] Misaligned incentives further compound this, with providers favoring proprietary or hybrid encryption schemes that retain data access for compliance and monetization.[109] Technical limitations, including the absence of forward secrecy in core PGP implementations, expose past communications to key compromise risks, deterring users in high-stakes environments where ephemeral keys are standard, as in protocols like Signal.[99] Additionally, PGP's origins as a file-encryption tool limit its seamlessness in real-time messaging, where metadata leakage and lack of deniability persist, prompting shifts toward purpose-built alternatives.[110] Regulatory environments in surveillance-heavy jurisdictions impose further friction, with policies discouraging end-to-end tools that evade lawful access, as evidenced by ongoing debates over encryption backdoors.[110] These factors collectively sustain PGP's niche status, with adoption confined primarily to privacy advocates and activists rather than mainstream consumers or enterprises.[111]Relevance and Alternatives in 2025
In 2025, Pretty Good Privacy (PGP) and its open standard implementation OpenPGP retain relevance primarily in specialized domains such as secure email for journalists, activists, and technical professionals requiring verifiable signatures and flexible key distribution without dependence on proprietary platforms.[112][113] The protocol's hybrid cryptosystem, combining symmetric efficiency with asymmetric security, remains resistant to brute-force attacks when using contemporary parameters like AES-256 for bulk data and elliptic curve cryptography for key exchange.[68] However, its adoption remains limited to a small, technically proficient user base, as evidenced by persistent keyserver queries and integration in tools like GnuPG, rather than mass deployment.[83] PGP's declining prominence stems from inherent complexities in key generation, distribution, and revocation, which deter non-experts amid rising threats like metadata leakage and implementation vulnerabilities.[114] Integrated end-to-end encryption (E2EE) in consumer tools has supplanted PGP for routine secure communication, rendering it "good enough" for most against non-state adversaries but insufficient for seamless usability.[115] Prominent alternatives include managed E2EE email providers like ProtonMail, which internally leverages PGP-inspired mechanisms with zero-access encryption and automatic key handling, processing millions of daily messages while ensuring server-side privacy.[116] Tuta Mail employs AES-256 and RSA hybrids to encrypt subjects and metadata, bypassing PGP's manual workflows for broader accessibility.[117] For file and data encryption, tools like VeraCrypt offer disk-level protection with pluggable algorithms, while developer libraries such as libsodium provide misuse-resistant primitives for custom implementations, emphasizing simplicity over PGP's expansive feature set.[118][114] Messaging protocols like Signal's, with built-in forward secrecy via the Double Ratchet algorithm, address PGP's lacks in ephemeral keys and deniability for real-time exchanges.[115]References
- https://wiki.openstack.org/wiki/OpenPGP_Web_of_Trust
