What's really in PGP 5.5?

Martin Minow minow at apple.com
Thu Oct 9 10:43:57 PDT 1997



-----BEGIN PGP SIGNED MESSAGE-----

Anonymous, claiming to be Monty Cantsin, writes about PGP 5.5:
>
>Decrypting files and decrypting messages are not the same problem.
>The PGP product has SMTP support - it is explicitly designed to weaken
>transmitted messages.  Just like Clipper.
>
No, it isn't "just like Clipper." Messages encrypted with PGP 5.5
can be decrypted or verified by PGP 5.0 or other implementations that
can decode the PGP message and encryption format. Also, PGP 5.0 or other
complient implementations can send encrypted and signed messages to
PGP 5.5 users.

The transmitted message is as "weak" as the quality of the encryption,
the number of people who have access to the secret key, and the
quality of their passwords. It is also as "weak" as the physical
security that prevents passwords from leaking (i.e., by Tempest
or black bag wiretaps inside the secure user's workstation).

Given all of the other risks, encrypting to a corporate private
key doesn't seem to me to significantly increase the risk.

The real risk, to my view, is that some future implementation will
require the secondary key, and will require that that secondary
key be stored in a "government accessable" database. This, however,
seems a bit remote and, given that PGP publishes their source code,
reasonably easy to detect.

Martin Minow
minow at apple.com


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBND0KUG23+ciinrc5AQGvMgP9HKE4s/3FbjfFpvfC230wvHkjDd2HWyC1
lhVa/i9ayO8pZC/k+V06pGTZLcZ89a4X2r3fQGjj0QNghuotkV9xVVD9AzLTLX88
YPp2DQWDCjkWq4PzBB8IR6c+rH6AbuqtDAhfas/Rto/9DI7EJWqi3dZbi7tFm7jj
g2nTAFk9VVo=
=DkbK
-----END PGP SIGNATURE-----







More information about the cypherpunks-legacy mailing list