-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Watch the word wrap: http://developer.earthweb.com/earthweb/cda/dlink.resource-jhtml.72.1081. |repository||softwaredev|content|article|2000|10|03|SDLairdZim|SDLairdZ im~xml.0.jhtml?cda=true (PGP Signature applied with appreciation to PRZ) Meet Phil Zimmermann, creator of the Pretty Good Privacy (PGP) encryption suite and one of the world's best-known cryptographers. Published October 04, 2000 By Cameron Laird Page 1 of 2 1 2 Programmers can be celebrities too. Just ask Philip (Phil) Zimmermann. He's spent most of the last decade as a folk hero, and admits to having enjoyed that status. Just this summer, he suffered the flip side of fame as wildly inflated rumors circulated about his role in compromising the security of the PGP encryption suite, and he watched his e-mail inbox fill with venom. A Human Rights Project He recognizes it comes with the territory. Zimmermann is probably the world's best-known cryptographer. He created the Pretty Good Privacy (PGP) encryption suite in 1991. Since then, it has come to dominate the market for programming protection of online confidentiality. PGP has been heralded for its role in protecting numerous political dissidents around the world, and earned Zimmermann the prestigious Norbert Wiener Award for responsible use of technology in 1996, as well as the 1995 Chrysler Award for Innovation in Design, and a 1998 Lifetime Achievement Award from Secure Computing Magazine, along with at least a dozen other distinctions. It also brought him into highly public patent disputes with RSA Data Security Inc., and a nightmarish multi-year criminal investigation by the United States government. It began as a human rights campaign. As the '90s opened, Zimmermann was an experienced programmer -- and a pretty good one by all accounts, including his own -- specializing in data security and communications and real-time embedded systems. Electronic communications technologies were becoming widely available, and politically significant: combinations of underground radio, video tapes, satellite news updates, and e-mail are generally acknowledged to have been indispensable in the popular overthrow of Iran's Shah, Eastern Europe's Bolsheviks, and several dictatorships throughout the third world. Technical challenges remained. How, for example, could human rights monitors communicate their on-site findings without risking recrimination or distortion? How might any citizen communicate freely and fearlessly over channels subject to tapping? One technical solution was encryption: "scrambling" a message so it was unreadable except to the sender and intended receiver. Zimmermann had worked on commercial encryption systems during the '80s, and he envisioned that it could be applied more widely. He developed PGP as an "add-on" that any e-mail user could install to ensure confidentiality. A Response to Legislation And it worked. It also became controversial, which brought more attention, and encouraged even more users to experiment with it. Nowadays it's become part of the popular culture of computing. It has been so widely disseminated that even many industry participants who rely on it know nothing about Zimmermann, and assume it was first created for the commercial applications -- retail sales, banking, and so on-in which it is used today. Zimmermann, however, emphasizes that for him it remains a human-rights project. PGP was born in controversy. Zimmermann wrote version 1.0 as a response to United States Senate Bill 266. If it had been passed, this legislation would have required all communications vendors to embed "back doors" to permit government agencies to tap their products. He rushed a release of 1.0 into the hands of his computing friends, at least one of whom began to distribute it on bulletin boards throughout North America. Its circulation meant that any criminality resulting from passage of the bill would have been difficult to enforce. Code-sharing didn't stop at national borders, though, and there was nothing hypothetical about it: export of PGP outside the U.S. (with possible exceptions involving Canada) was definitely illegal. Everyone involved agreed that the Office of Defense Trade Control's enforcement of the International Traffic in Arms Regulations (ITAR) extended to cryptographic software. Whom to Prosecute? Whom could the US Department of Justice indict, though? Zimmermann just programmed and talked; he was careful not to engage in any "munitions exports" himself. Despite these precautions, criminal charges were brought against him. The programming and civil rights communities joined to create a legal defense fund. After three years of what Zimmermann calmly categorizes as "persecution," prosecutors dropped the case in early 1996 with as little comment as they had earlier justified it. Controversy didn't end there. Even before the criminal indictment, RSA notified Zimmermann that it considered PGP an infringement of its patents. Zimmermann had been careful to engage only in "educational use" of applicable documents and inventions. He consistently emphasized in his presentations that users were responsible for securing applicable licenses. The RSA battle ended as undramatically as the ITAR one had. Zimmermann and Public Key Partners (PKP), an RSA affiliate, signed an agreement that Zimmermann would continue not to distribute RSA inventions and PKP would not sue Zimmermann. RSA threatened Zimmermann and the Massachusetts Institute of Technology (MIT) for various alleged infringements. Zimmermann programmed around legal problems, and MIT shielded him from others in pursuit of its own intellectual rights. While the publicity around these disputes served as valuable marketing for PGP, it also made it hard to move on. Hecklers continue to believe, for example, that Zimmermann had secretly acquiesced to government demands and somehow weakened PGP. Although it's hard to prove covert arrangements do not exist, it's equally difficult to imagine how Zimmermann might contaminate source code available for public review, which PGP was. PGP Inc. With the disposal of the government case, Zimmermann founded PGP Inc. in 1996 to finance maintenance and enhancement of PGP. Late the next year, he sold the company to Network Associates (NAI), while agreeing to stay on as senior fellow. The programming fraternity continues to honor Zimmermann in its characteristic ways: T-shirts are silk-screened with him as subject, he speaks regularly at conferences and in the classroom, and people who haven't met him often speculate on Usenet and other public forums about his motives and interests. He is often addressed with the reverence accorded an accomplished software engineer martyred for resistance to governmental invasions of privacy. PGP's Present and Future So where are PGP and Zimmermann in the year 2000? He still has a full schedule. Between his assignments with NAI and independent consulting, he sometimes fails to make adequate time for sleep, let alone pack carefully for his many professional travels. He does little coding these days. However, he sees his contribution as critical, believing that "encryption software architectural decisions must be made by knowledgeable cryptographers, not software engineers." He has very firm opinions, for example, about Gnu Privacy Guard (GnuPG), an open source competitor to PGP. There's no doubt in Zimmermann's mind that GnuPG suffers for being managed by programmers. He offers the Blowfish encryption method as an example: "I would never, ever allow Blowfish to be implemented in PGP, because it's not as good a design as Twofish; Twofish is superior. PGP 7 implements Two fish. Yet we see GnuPG implemented Blowfish." Even the Internet Engineering Task Force (IETF) makes cryptographic mistakes, he says. Zimmermann asserts, "I would never allow El-Gamal signatures to be put in PGP. I don't know how that got in" RFC 2440, which defines the OpenPGP standard. NAI still has a large backlog of serious technical work to do: integration of new algorithms and functionality, ports to new architectures, and more. Embedded systems -- encryption processing within telephones, automobiles, and so on -- are likely to be particularly important during the next few years. Also, the original RSA patent expired just a couple of weeks ago, and NAI is already offering products that exploit this. Minor controversies continue to dog PGP. Just within the last year, two small faults in the released code were discovered. While experts agree that neither one presented any practical danger to the security of PGP-based communications, both sparked arguments about NAI's ability and even its intentions. In the first case, a fault in a specific version for Unix could, in principle, compromise a key generated by a method PGP had always deprecated: automatically, without user input. Then, in mid-August, German researchers spotted an error in PGP's Additional Decryption Key (ADK) functionality. Like the key-generation error, it was quickly fixed, and detailed investigations confirmed it was unlikely that any real keys had ever been tampered with, let alone any messages cracked. However, before all the facts came out, speculation erupted that Zimmermann had personally installed a deliberate vulnerability, or perhaps allowed NAI to do so. Zimmermann promptly published an extensive personal statement through the PGP Web site, and most observers now grant that, as he concludes there, "If NAI tried to put a back door in PGP, all the engineers on the PGP team would quit in a highly visible protest, and I would be talking to the press about it. There is no way that I would let this happen." The Future Is Busy Zimmermann's personal scheduling often leaves him in what he calls "decapitated chicken mode." Apart from the frustration of overload, he likes what he does, and proudly regards it as important technically and politically. He's just beginning to redevelop PGPphone on his own, outside NAI: "I think it's a cool project." He continues to speak before university and industry groups, often in Europe. However painful the name-calling and conspiracy theorizing is to him, he plans many more contributions to cryptography and computing. -----BEGIN PGP SIGNATURE----- Version: PGP 6.0.2 iQA/AwUBOgpEWyavYwibXjmcEQL6BgCgs/fOglVgSiXKVIjsel6IIN1uWhcAoNY8 mEuqj4uT1WKyUFmLGQt4OgAO =tFYW -----END PGP SIGNATURE-----
participants (1)
-
James D. Wilson