PGP on shaky ground
The standard for Web encryption programs is being abandoned by its vendor, leaving plenty of questions and problems for users.
Computerworld - Bad things do happen to good code. So learned Phil Zimmermann, author of Pretty Good Privacy (PGP), which in the early 1990s became the de facto standard for cryptology development on the Internet, according to analysts and user groups.
While working with human rights advocates in 1991, Zimmermann released his powerful encryption, signing and authentication freeware, which did away with the need for third-party key authorities to issue and manage the keys that lock and unlock data.
In fact, the mathematical encryption algorithm was so good that Zimmermann nearly went to jail after one of his associates posted the algorithm's source code on the Web and it caught the attention of the U.S. Customs Service. The federal government wasn't happy that such a powerful secrecy tool had become available to anyone who wanted it and had the technical skills to use the complex program. It took a three-year legal battle before Zimmermann was eventually cleared of violating the International Traffic in Arms Regulations for exporting munitions.
Phil Zimmermann, author of Pretty Good Privacy
"As Network Associates drops PGP, it drops the ease of use and high level of integration PGP achieved in the desktop computing environment," says Julian Koh, a network engineer at Northwestern University in Evanston, Ill., who uses PGP for file and mail encryption inside Northwestern's network. "They've also dropped support for that product. So if someone's using the latest version of PGP on XP and they install a Microsoft service pack for XP, it could break their PGP. And there's not going to be any update from Network Associates to patch PGP."
Because of PGP's history as free software, the number of companies that have installed it is unknown. But large organizations such as Lockheed Martin Corp. use PGP on a limited basis for critical communications and file encryption, according to a spokesperson at the Bethesda, Md.-based company. And PGP is also being used in a lot of Web site scripting, says Adam Back, a security consultant in Montreal who has used PGP for eight
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!