|
![]() |
![]()
Pretty Good Privacy |
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Pretty Good Privacy
What is Pretty Good Privacy (PGP)?
Briefly, PGP is software that allows you to send and recieve email and files knowing that
the sender of information is who they claim to be
the information hasn't been tampered with en route
that only the intended recipient can read the communique
PGP is available for almost every modern computing system available. PGP is inextricably linked to it's author, Philip Zimmermann, and his persecution by the U.S. Government. (The story behind the Zimmermann Legal Defense Fund is a must-read.)
PGP in a nutshell
Here is the canned email I used to send people who asked about PGP in those dark days before the web existed:
X-Distribution-Policy: re-distribute freely; attribute appropriately.
Date: Tue 14 Dec 1993 00:37:12 -0800
There are various reasons to use encryption: you don't want anyone to get a hold of the symphony you're writing, you don't want your co-workers to know your sexual orientation, you want to protect your source code, and so on.
How secure do you want your data to be? Protecting your anniversary shopping list from your WordPerfect-using spouse necessitates a very different level of security than protecting trade secrets from your competitors. Since encryption is basically a transformation of plaintext to ciphertext, more secure transformations take more time (and are more of an inconvience to you).
Simple transformations will let you hide plaintext from the casual viewer. rot13, which rotates the letters 13 places, ie. 'A' becomes 'N', may provide the level of security you need. Compression software will transform your data into an unreadable form unless the viewer knows the software you used to compress it; if it allows you to password-protect the compressed archives then you're pretty well covered (and you'll be using less disk space).
Industrial-strength data encryption comes in many forms. UNIX "crypt" provides good encryption. Commercial software that implements the Data Encryption Standard (DES) offers low, middle, and high levels of security. DES-1 was recently broken with a network of PCs, DES-2 is still considered secure. DES can't be sent outside of the USA because its key-size is artificially limited (the key-size determines the level of security, all other things being equal).
The cremé de la cremé of data encryption is Philip Zimmerman's PGP (Pretty Good Privacy), available for (I think) UN*X, DOS, Windows, Mac, and Amiga. PGP exploits the fact that very large numbers can be very difficult to factor. PGP creates a key-pair using prime numbers. One you make public, the other you keep private. To send me a message you combine my public key with your private key. When I get the message, I read the message I use your public key with my private key. We get each other's public keys via email from each other or a key-server. (All this is part of the PGP docs, which are unpolished but worth the reading.) I'll also be glad to help you out.
I have other information about cryptography algorithms and software available.
You might also be interested in reading the scattered exchanges of the cypherpunks; send to cypherpunks-request@toad.com the message
SUBSCRIBE firstname lastname
(where of course you substitute your firstname and lastname). Enjoy!
PRZ's PGP Book
As an author, I can say that Phil's share of a the money you spend on a book is almost certainly less than ten per cent of the cover price. Buy Philip's book if you want a book about PGP. Donating to the Zimmermann Legal Defense Fund gets money to the people who have helped Phil in a more direct way.
Using PGP to Authenticate Routing Information
Merit, Inc. maintains the Internet routing database. Merit has ported PGP version 2.6 into the RIPE routing registry software. The new privacy feature makes it possible to use PGP's popular cryptographic algorithm to authenticate data submitted through e-mail to the Routing Arbiter Database (RADB) and other RIPE-181-style registries. To implement PGP, simply enter 'PGP- FROM my.email.address' in the RADB Maintainer object's 'auth:' field. You then use a public domain PGP client to sign your e-mail with your secret key. The RADB software uses your public key to verify your signature. The PGP encryption schema is known to be very difficult to break. PGP can also provide confidentiality by encrypting any data in such a way that only the recipient can read the message. For more information, contact Laurent Joncheray.
|
Have you found errors nontrivial or marginal, factual, analytical and illogical, arithmetical, temporal, or even typographical? Please let me know; drop me email. Thanks! |