From: unruh on
On 2010-03-27, Greg Rose <ggr(a)nope.ucsd.edu> wrote:
> In article <osmqq51kp6ttfictta03qaerek6861feee(a)4ax.com>,
> John Bischoff <mingol(a)roadrunner.com> wrote:
>>Last I heard, PGP provided pretty solid security. Is that still the case?
>
> It is well studied, and backed by reputable
> professionals. It is very solid, IMO. The company
> I work for supplies it standard for all employees
> (although many don't use it, or anything at all).
> I use it on a daily basis, and have never had a
> problem.

Sorry, how would you recognize a problem if it occured? The problem for
encryption is that an enemy reads your messages. How would you know that
has occured?
I agree that pgp has a good reputation and there is nothing that anyone
has discovered that is problematic, but promulgating the idea that
"using it on a daily basis and have never had a problem" is a good way
of evaluating crypto is what allows all kinds of junk to be sold as
encryption technology.


From: unruh on
On 2010-03-27, George Orwell <nobody(a)mixmaster.it> wrote:
> "John Bischoff" <mingol(a)roadrunner.com> wrote in message
> news:osmqq51kp6ttfictta03qaerek6861feee(a)4ax.com...
>> Gentlemen
>> Maybe I have the wrong venue, but than maybe one of you knowledgeable gents will
>> kindly enlighten me.
>> Last I heard, PGP provided pretty solid security. Is that still the case?
>> Is there anything better, and about as easy to use, these days?
>> I'll wish to encrypt a file up to several MB, and maybe a whole drive.
>> I'll wish to use it for two-way, friend-to-friend file sharing.
>> Naturally, the better the resistance to brute force the better.
>> Thanks, gents
>> John
>
> I'd opt for Truecrypt or even better, FreeOTFE.
>
> FreeOTFE especially is so good that it's quietly being blocked or at
> the least discouraged in certain European countries.

That you would make such a statement arouses all of my "snake oil"
sensors. I have no idea if FreeOTFE is a good product or not, but this
is the opposite of an endoresement.

>
From: Greg Rose on
In article <slrnhqsh05.4a5.unruh(a)wormhole.physics.ubc.ca>,
unruh <unruh(a)wormhole.physics.ubc.ca> wrote:
>On 2010-03-27, Greg Rose <ggr(a)nope.ucsd.edu> wrote:
>> In article <osmqq51kp6ttfictta03qaerek6861feee(a)4ax.com>,
>> John Bischoff <mingol(a)roadrunner.com> wrote:
>>>Last I heard, PGP provided pretty solid security. Is that still the case?
>>
>> It is well studied, and backed by reputable
>> professionals. It is very solid, IMO. The company
>> I work for supplies it standard for all employees
>> (although many don't use it, or anything at all).
>> I use it on a daily basis, and have never had a
>> problem.
>
>Sorry, how would you recognize a problem if it occured? The problem for
>encryption is that an enemy reads your messages. How would you know that
>has occured?

First, when I talk about no problems using it, I
am talking about usability! Many problems occur because
something isn't used at all, or is used wrongly.

Second, I personally reviewed PGP code around the
2.3 release. Since that release, there has been
continued compatible evolution, a standard
written, and a complete second implementation
(GPG) which is still available for review. So we
*know* what the underlying crypto primitives are,
we *know* that there is no extra stuff in
messages, so in the absence of new cryptanalytic
results, we *know* that the enemy can't read
encrypted messages eavesdropped in transmission.
(If he accesses your computer all bets are off, of
course.)

>I agree that pgp has a good reputation and there is nothing that anyone
>has discovered that is problematic, but promulgating the idea that
>"using it on a daily basis and have never had a problem" is a good way
>of evaluating crypto is what allows all kinds of junk to be sold as
>encryption technology.

It's a good way of evaluating usability. I agree
I could have been clearer on that point, but
I still think it's important. Frankly, I think
the security part of it is a given, for the reasons
expanded upon above.

Greg.
--
From: Mehdi Tibouchi on
Greg Rose wrote in message <holt75$qp$1(a)ihnp4.ucsd.edu>:
>
> and a complete second implementation
> (GPG) which is still available for review.

The only actual review of GPG by a professional cryptographer I am aware
of is P. Nguyen's rather pessimistic paper at Eurocrypt 2004:

http://www.di.ens.fr/~pnguyen/pub.html#Ng04

From: Joseph Ashwood on

"John Bischoff" <mingol(a)roadrunner.com> wrote in message
news:osmqq51kp6ttfictta03qaerek6861feee(a)4ax.com...
> Gentlemen
> Maybe I have the wrong venue, but than maybe one of you knowledgeable
> gents will
> kindly enlighten me.
> Last I heard, PGP provided pretty solid security. Is that still the case?
> Is there anything better, and about as easy to use, these days?
> I'll wish to encrypt a file up to several MB, and maybe a whole drive.
> I'll wish to use it for two-way, friend-to-friend file sharing.
> Naturally, the better the resistance to brute force the better.


Provided you don't have any special considerations, PGP is a solid choice.
It is reasonably well analyzed, as noted compatible open source
implementation (GPG), should be secure to thousands of PetaBytes, etc. By
"special considerations" I mean that I wouldn't trust PGP/GPG for any
secrets that could compromise my ability to continue living, but almost
anything short of that there shouldn't be any problems.

You should send a couple of simple test files first, open them without
decryption to make sure you're configured to encrypt, then decrypt them and
verify correctness. Probably not a big issue, but it does provide an easy
sanity check.

As long as PGP fits well in the communication method you choose, use it.
Joe

First  |  Prev  |  Next  |  Last
Pages: 1 2 3
Prev: Counted Hash Basics
Next: Certicate chain