Whole document tree
    

Whole document tree

Gnu Privacy Guard (GnuPG) Mini Howto (English): Concepts Next Previous Contents

1. Concepts

1.1 Public Key Encryption

Classic methods for encryption only use one key for encryption. The sender encrypts the message with this key. To be able decrypt this the receiver needs to have this very same key. This key must have been given to the receiver in a way, that others won't have had the opportunity to obtain this key. If somebody else does have the key, this method of encryption is useless.

The use of so-called Public Keys can solve this problem. Public Keys is a concept where two keys are involved. One key is a Public Key that can be spread through all sorts of media and may be obtained by anyone. The other key is the Private Key. This key is secret and cannot be spread. This key is only available to the owner. When the system is well implemented the secret key cannot be derived from the public key. Now the sender will crypt the message with the public key belonging to the receiver Then decryption will be done with the secret key of the receiver.

Crucial in this concept is that the secret key remains a secret and should not be given away or become available to anyone else but the owner of this key. YOU CANNOT SEND THIS KEY OVER THE INTERNET. Also it is very unwise to use GnuPG over telnet (one might consider never to use telnet based on the high security risks).

1.2 Digitale Signatures

In order to proove that a message was really sent by the alledged sender the concept of Digital Signatures has been invented. As the name says a message is digitally signed by the sender. By this signatures one can check the authenticity of a message. Using this will reduce the risk for trojan horses (a message that claims to be a patch to a certain problem but actually contains a virus or does something with data on your computer). Also information or data can be verified as comming from a legitimate source and thus be regarded as be real.

A digital signature is made through a combination of the secret key and the text. Using the senders public key the message can be verified. Not only will be checked if the correct sender is involved, also the content will be checked. So one knows that the message comes from the sender and has not been changed during the transportation process.

1.3 Web of trust

A weak point of the Public key algorithms is the spreading of the public codes. A user could bring a public code with false user ID in circulation. If with this particular code messages are made, the intruder can decode and read the messages. If it passes it on then still with a genuine public code coded to the actual recipient, this attack is not noticeable.

The PGP solution (and because of that automatically the GnuPG solution) exists in signing codes. A public key can be signed by other people. This signature acknowledges that the key used by the UID (User Identification) actually belongs to the person it claims to be. It is then up to the user of GnuPG how far the trust in the signature goes. One can consider a key as trustworthy when one trusts the sender of the key and one knows for sure that the key really belongs to the person. Only when you can trust the key of the signer, you can trust the signature. To be absolutely postive that the key is correct one has to compare the finger print over reliable channels before giving absolute trust.

1.4 Boundaries to security

If you have data that you would like to remain confidential, there is more to it than just determining which encoding algorith to use. You should be thinking about your system security in general. Basically we consider PGP to be secure and as I write this documents no incidents of PGP being cracked are known to me.But that doesn't mean that all encoded must be safe then (for instance the NSA wouldn't notify me if they cracked PGP somehow, neither would other people who crack for real malicious grounds). But even if the PGP is fully 'unhackable', other means can used to attack the security. Early February a Trojan Horse had been found that searched for secret PGP keys on the harddisk and FTP-ed them away. If the password has been choosen badly the secret key can easily be cracked.

Another technical possibility (although more difficult) are Trojan Horses that broadcast keyboards entries. Also possible (but very difficult) is to pass the content of a screen along. Then no cracking of scrambled messages needs to be done. For all these risks there need to be a good, well-thought security planthat is actually deployed.

It is not a goal to create paranoia among people, but to point out that a lot needs to be done to be more secure. The most important thing is to realize that ecryption is just one stap to security and is not a total solution. Trojan horses as they appeared in the Melissa virus in March 1999 prooved that many companies are not prepared for that.


Next Previous Contents