GNU Privacy Guard

Not to be confused with PGP.
GNU Privacy Guard
The GNU Privacy Guard logo
Original author(s) Werner Koch
Developer(s) GNU Project
Initial release 7 September 1999 (1999-09-07)[1]
Stable release(s) [±]
Stable 2.0.30 / March 31, 2016 (2016-03-31)[2]
Modern 2.1.16 / November 18, 2016 (2016-11-18)[3]
Classic 1.4.21 / August 17, 2016 (2016-08-17)[4]
Preview release(s) [±]
"Modern": 2.1.1-beta35 (November 24, 2014 (2014-11-24)[5]) [±]
Repository git.gnupg.org/cgi-bin/gitweb.cgi
Written in C
Operating system Microsoft Windows, OS X, RISC OS, Android, Linux
Type OpenPGP
License GNU GPLv3
Website gnupg.org

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.[6] GnuPG is compliant with RFC 4880, which is the IETF standards track specification of OpenPGP. Modern versions of PGP and Veridis' Filecrypt are interoperable with GnuPG and other OpenPGP-compliant systems.

GnuPG is part of the GNU project, and has received major funding from the German government.[7]

Overview

GnuPG is a hybrid-encryption software program because it uses a combination of conventional symmetric-key cryptography for speed, and public-key cryptography for ease of secure key exchange, typically by using the recipient's public key to encrypt a session key which is only used once. This mode of operation is part of the OpenPGP standard and has been part of PGP from its first version.

The GnuPG 1.x series uses an integrated cryptographic library, while the GnuPG 2.x series replaces this with Libgcrypt.

GnuPG encrypts messages using asymmetric keypairs individually generated by GnuPG users. The resulting public keys may be exchanged with other users in a variety of ways, such as Internet key servers. They must always be exchanged carefully to prevent identity spoofing by corrupting public key ↔ "owner" identity correspondences. It is also possible to add a cryptographic digital signature to a message, so the message integrity and sender can be verified, if a particular correspondence relied upon has not been corrupted.

GnuPG also supports symmetric encryption algorithms. By default, GnuPG uses the CAST5 symmetrical algorithm. GnuPG does not use patented or otherwise restricted software or algorithms. Instead, GnuPG uses a variety of other, non-patented algorithms.[8]

For a long time it did not support the IDEA encryption algorithm used in PGP. It was in fact possible to use IDEA in GnuPG by downloading a plugin for it, however this might require a license for some uses in countries in which IDEA was patented. Starting with versions 1.4.13 and 2.0.20, GnuPG supports IDEA because the last patent of IDEA expired in 2012. Support of IDEA is intended "to get rid of all the questions from folks either trying to decrypt old data or migrating keys from PGP to GnuPG",[9] and hence is not recommended for regular use.

As of versions 2.0.26 and 1.4.18, GnuPG supports the following algorithms:

More recent releases of GnuPG 2.x ("stable" and "modern" series) expose most cryptographic functions and algorithms Libgcrypt (its cryptographic library) provides, including support for elliptic curve cryptography (ECDSA, ECDH and EdDSA)[10] in the "modern" series (i.e. since GnuPG 2.1).

History

GnuPG was initially developed by Werner Koch.[11][12] Version 1.0.0, which was the first production version, was released on September 7, 1999, almost two years after the first GnuPG release (version 0.0.0).[1][11] The German Federal Ministry of Economics and Technology funded the documentation and the port to Microsoft Windows in 2000.[12]

GnuPG is a system compliant to the OpenPGP standard, thus the history of OpenPGP is of importance; it was designed to interoperate with PGP, the email encryption program initially designed and developed by Phil Zimmermann.[13][14]

On February 7, 2014, a GnuPG crowdfunding effort closed, raising 36,732 euros for a new web site and infrastructure improvements.[15]

Branches

As of August 2016, there are three actively maintained branches of GnuPG:

"Modern" (2.1) and "stable" (2.0) cannot be installed at the same time. However, it is possible to install "classic" (1.4) along with any GnuPG 2.x (i.e. "modern" or "stable") version.[10]

Before the release of GnuPG 2.0, all releases originated from a single branch; i.e. before November 13, 2006 no multiple release branches were maintained in parallel. These former, sequentially succeeding (up to 1.4) release branches were:

Platforms

Although the basic GnuPG program has a command-line interface, there exist various front-ends that provide it with a graphical user interface. For example, GnuPG encryption support has been integrated into KMail and Evolution, the graphical e-mail clients found in KDE and GNOME, the most popular Linux desktops. There are also graphical GnuPG front-ends, for example Seahorse for GNOME and KGPG for KDE. For the OS X, the MacGPG project provides a number of Aqua front-ends for OS integration of encryption and key management as well as GnuPG installations via Installer packages.[21]

Furthermore, the GPGTools Installer[22] installs all related OpenPGP applications (GPG Keychain Access), plugins (GPGMail) and dependencies (MacGPG) to use GnuPG based encryption. Instant messaging applications such as Psi and Fire can automatically secure messages when GnuPG is installed and configured. Web-based software such as Horde also makes use of it. The cross-platform extension Enigmail provides GnuPG support for Mozilla Thunderbird and SeaMonkey. Similarly, Enigform provides GnuPG support for Mozilla Firefox. FireGPG was discontinued June 7, 2010.[23]

In 2005, g10 Code GmbH and Intevation GmbH released Gpg4win, a software suite that includes GnuPG for Windows, GNU Privacy Assistant, and GnuPG plug-ins for Windows Explorer and Outlook. These tools are wrapped in a standard Windows installer, making it easier for GnuPG to be installed and used on Windows systems.

Limitations

As a command-line-based system, GnuPG 1.x is not written as an API that may be incorporated into other software. To overcome this, GPGME (abbreviated from GnuPG Made Easy) was created as an API wrapper around GnuPG that parses the output of GnuPG and provides a stable and maintainable API between the components.[24] This currently requires an out-of-process call to the GnuPG executable for many GPGME API calls; as a result, possible security problems in an application do not propagate to the actual crypto code due to the process barrier. Various graphical front-ends based on GPGME have been created.

Since GnuPG 2.0, many of GnuPG's functions are available directly as C APIs in Libgcrypt.[25]

Vulnerabilities

The OpenPGP standard specifies several methods of digitally signing messages. In 2003, due to an error in a change to GnuPG intended to make one of those methods more efficient, a security vulnerability was introduced.[26] It affected only one method of digitally signing messages, only for some releases of GnuPG (1.0.2 through 1.2.3), and there were fewer than 1000 such keys listed on the key servers.[27] Most people did not use this method, and were in any case discouraged from doing so, so the damage caused (if any, since none has been publicly reported) would appear to have been minimal. Support for this method has been removed from GnuPG versions released after this discovery (1.2.4 and later).

Two further vulnerabilities were discovered in early 2006; the first being that scripted uses of GnuPG for signature verification may result in false positives,[28] the second that non-MIME messages were vulnerable to the injection of data which while not covered by the digital signature, would be reported as being part of the signed message.[29] In both cases updated versions of GnuPG were made available at the time of the announcement.

Application support

Notable applications, frontends and browser extensions that support GPG include the following:

In May 2014, The Washington Post reported on a 12-minute video guide "GPG for Journalists" posted to Vimeo in January 2013[30] by a user named anon108. The Post identified anon108 as fugitive NSA whistleblower Edward Snowden, who it said made the tutorial—"narrated by a digitally disguised voice whose speech patterns sound similar to those of Snowden"—to teach journalist Glenn Greenwald email encryption. Greenwald said that he could not confirm the authorship of the video.[31]

See also

References

  1. 1 2 3 "Release Notes". GnuPG. Retrieved 2014-01-30.
  2. Koch, Werner (2016-03-31). "[Announce] GnuPG 2.0.29 released". gnupg-announce (Mailing list). Retrieved 2016-09-30.
  3. Koch, Werner (2016-11-18). "[Announce] GnuPG 2.1.16 released". gnupg-announce (Mailing list). Retrieved 2016-12-06.
  4. Koch, Werner (2016-08-17). "[Announce] Security fixes for Libgcrypt and GnuPG 1.4 [CVE-2016-6316]". gnupg-announce (Mailing list). Retrieved 2016-09-30.
  5. Werner Koch (2014-11-24). "Beta for 2.1.1 available". gnupg.org. Retrieved 2014-11-24.
  6. "Gnu Privacy Guard". GnuPG.org.
  7. "Bundesregierung fördert Open Source" (in German). Heise Online. 1999-11-15. Retrieved July 24, 2013.
  8. "GnuPG Features". Retrieved October 1, 2009.
  9. Koch, Werner (2012-12-21). "GnuPG 1.4.13 released" (Mailing list). gnupg-users. Retrieved 2013-05-19.
  10. 1 2 3 Werner Koch (2014-11-06). "[Announce] GnuPG 2.1.0 "modern" released". gnupg.org. Retrieved 2014-11-06.
  11. 1 2 Angwin, Julia (5 February 2015). "The World's Email Encryption Software Relies on One Guy, Who is Going Broke". ProPublica. Retrieved 6 February 2015.
  12. 1 2 Wayner, Peter (19 November 1999). "Germany Awards Grant for Encryption". The New York Times. Retrieved 2014-08-08.
  13. "Gnu Privacy Guard". OpenPGP.org. Retrieved 2014-02-26.
  14. "Where to Get PGP". Philzimmermann.com. Retrieved 2014-02-26.
  15. "GnuPG: New web site and infrastructure". goteo.org. Retrieved 2014-03-09.
  16. Werner Koch (2006-11-13). "[Announce] GnuPG 2.0 released". gnupg.org. Retrieved 2014-01-30.
  17. Werner Koch (2004-12-16). "[Announce] GnuPG stable 1.4 released". gnupg.org. Retrieved 2004-12-16.
  18. Werner Koch (2002-09-06). "[Announce]GnuPG 1.2 released". gnupg.org. Retrieved 2014-11-06.
  19. Werner Koch (2004-08-26). "[Announce] GnuPG 1.2.6 released". gnupg.org. Retrieved 2014-11-06.
  20. Werner Koch (2002-04-30). "[Announce] GnuPG 1.0.7 released". gnupg.org. Retrieved 2014-11-06.
  21. "Mac GNU Privacy Guard". sourceforge. Retrieved 2008-04-29.
  22. "GPGTools Installer". GPG Tools. Retrieved 2011-03-22.
  23. "FireGPG's developers blog". Retrieved July 24, 2013.
  24. "GPGME (GnuPG Made Easy)". gnupg.org. February 11, 2015. Retrieved March 3, 2015.
  25. "Libraries". GNUPG. Retrieved 2 December 2015.
  26. Phong Q. Nguyen "Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3." EUROCRYPT 2004: 555570
  27. GnuPG's ElGamal signing keys compromised Werner Koch, November 27, 2003
  28. False positive signature verification in GnuPG Werner Koch, February 15, 2006
  29. GnuPG does not detect injection of unsigned data, Werner Koch, March 9, 2006
  30. "GPG for Journalists - Windows edition - Encryption for Journalists". Vimeo. Retrieved 2016-10-14.
  31. "Edward Snowden sent Glenn Greenwald this video guide about encryption for journalists. Greenwald ignored it.". The Washington Post. May 14, 2014.
This article is issued from Wikipedia - version of the 10/21/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.