PGP on shaky ground
The standard for Web encryption programs is being abandoned by its vendor, leaving plenty of questions and problems for users.
Computerworld - Bad things do happen to good code. So learned Phil Zimmermann, author of Pretty Good Privacy (PGP), which in the early 1990s became the de facto standard for cryptology development on the Internet, according to analysts and user groups.
While working with human rights advocates in 1991, Zimmermann released his powerful encryption, signing and authentication freeware, which did away with the need for third-party key authorities to issue and manage the keys that lock and unlock data.
In fact, the mathematical encryption algorithm was so good that Zimmermann nearly went to jail after one of his associates posted the algorithm's source code on the Web and it caught the attention of the U.S. Customs Service. The federal government wasn't happy that such a powerful secrecy tool had become available to anyone who wanted it and had the technical skills to use the complex program. It took a three-year legal battle before Zimmermann was eventually cleared of violating the International Traffic in Arms Regulations for exporting munitions.
Phil Zimmermann, author of Pretty Good Privacy
"As Network Associates drops PGP, it drops the ease of use and high level of integration PGP achieved in the desktop computing environment," says Julian Koh, a network engineer at Northwestern University in Evanston, Ill., who uses PGP for file and mail encryption inside Northwestern's network. "They've also dropped support for that product. So if someone's using the latest version of PGP on XP and they install a Microsoft service pack for XP, it could break their PGP. And there's not going to be any update from Network Associates to patch PGP."
Because of PGP's history as free software, the number of companies that have installed it is unknown. But large organizations such as Lockheed Martin Corp. use PGP on a limited basis for critical communications and file encryption, according to a spokesperson at the Bethesda, Md.-based company. And PGP is also being used in a lot of Web site scripting, says Adam Back, a security consultant in Montreal who has used PGP for eight
- Learn More About Peer 1 Hosting's Mission Critical Cloud Mission Critical Cloud from Peer 1 Hosting is enterprise-ready, creating a perfect point of adoption whether you need an off-premise solution for development
- What Makes a Cloud Solution Truly Enterprise-Grade? Future enterprise cloud capabilities will evolve from five core elements...
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade.
- Peer 1's Mission Critical Cloud: Your Cloud, Your Way Peer 1 Hosting's Mission Critical Cloud offers the ultimate in flexible customization of infrastructure, resources and support. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!