Fact-checked by Grok 2 weeks ago

Pretty Good Privacy

Pretty Good Privacy (PGP) is a computer program for data encryption and decryption that enables cryptographic privacy and authentication for electronic communications, such as email, using a combination of symmetric-key and public-key cryptography. Developed by Phil Zimmermann in 1991 as freeware amid concerns over government surveillance, PGP was designed to allow individuals to secure their messages without relying on trusted third parties for key management. Its public release prompted a U.S. government criminal investigation for alleged violations of export control laws, which classified strong encryption software as munitions, though charges were ultimately dropped in 1996 after years of scrutiny. PGP evolved into the basis for the OpenPGP standard, formalized in RFC 4880 and later updated in RFC 9580, which specifies interoperable formats for encrypted messages, digital signatures, and key management, influencing implementations like GNU Privacy Guard (GnuPG). While praised for democratizing access to robust encryption and enabling secure communication for dissidents and privacy advocates, PGP has faced criticism for usability challenges, long-lived keys vulnerable to compromise, and vulnerabilities like Efail in certain implementations, though its core algorithms remain secure against known attacks when properly used.

Technical Design

Core Algorithms and Hybrid Cryptosystem

Pretty Good Privacy (PGP) employs a that integrates for bulk data with for secure , enabling efficient protection of messages, files, and emails. The process begins with optional of the using algorithms like , followed by computation of a digest via a for integrity verification or signing. A random symmetric is then generated and used to encrypt the compressed data in cipher feedback (CFB) mode. This is asymmetrically encrypted using the recipient's public key and attached to the encrypted payload, allowing only the private key holder to recover the and decrypt the message. This design balances the computational efficiency of symmetric ciphers for large payloads with the key distribution advantages of asymmetric methods, avoiding the need to securely transmit long-term symmetric keys. In its foundational implementation by in 1991, PGP version 1.0 utilized for public-key encryption and signatures, paired with an initial symmetric cipher later replaced by IDEA due to vulnerabilities in the prototype Bass-O-Matic algorithm. Hashing relied on for digests. Subsequent versions and the OpenPGP standard (RFC 4880, published November 2007) expanded support to multiple algorithms to enhance flexibility and security. Symmetric ciphers include IDEA (128-bit), TripleDES (168-bit), CAST5 (128-bit), Blowfish (variable), and (128-, 192-, or 256-bit keys), with recommended for modern use due to its resistance to known attacks. Public-key algorithms encompass (typically 1024-4096 bits for encrypt-or-sign), ElGamal (encrypt-only), and (sign-only), alongside elliptic curve variants like ECDSA and ECDH in extensions. Hash algorithms feature (now deprecated), , SHA-256, SHA-384, and SHA-512, selected based on security strength; implementations must support SHA-256 or stronger for new signatures to mitigate collision vulnerabilities in older hashes. The hybrid structure ensures while permitting upgrades, as algorithm preferences are negotiated via key flags and user configurations.

Key Management and Web of Trust

In OpenPGP implementations of Pretty Good Privacy (PGP), key management begins with the generation of asymmetric key pairs, consisting of a public key for and and a corresponding private key for decryption and signing, using algorithms such as Ed25519 for signatures and X25519 for , as mandated by the standard. Primary keys serve for , while optional subkeys handle specific operations like signing or to compartmentalize risks if compromised. Private keys are encrypted with a user and stored securely, with key material formatted in packets including creation time, algorithm identifiers, and multiprecision integers or octet strings for parameters. Public keys are distributed via transferable public key packets that bundle the primary key, user identities, subkeys, and associated signatures, enabling exchange through email, keyservers, or direct file transfer without a central registry. Key identification relies on 8-byte key IDs or longer fingerprints (20 bytes for version 4 keys, 32 for version 6) derived from SHA-256 hashes, facilitating lookup while mitigating collision risks. Revocation is managed through dedicated signatures—key revocation (type 0x20) or subkey revocation (type 0x28)—issued by the key owner or a pre-designated revoker, often prepared in advance as revocation certificates specifying reasons like compromise or supersession; these signatures propagate to invalidate the key for future validations upon distribution. The model provides decentralized validation of authenticity and identity bindings, eschewing hierarchical certificate authorities in favor of user-generated certification s (e.g., positive certification type 0x13) that attest to the linkage between a public and a user . Users sign keys of personally verified individuals, forming transitive chains where propagates through interconnected s; software then computes validity by evaluating path lengths, counts, and assigned levels from subpackets (levels 0–2, with depth and amount indicators up to 255). Owner assignments—ranging from undefined to ultimate in tools like GnuPG—gauge the reliability of a keyholder as a certifier, enabling marginal, full, or strong validity ratings based on the strongest sets of introducers. This model supports resilient, assurance but relies on active participation and for effective , with computations remaining implementation-specific to accommodate varying policies.

Digital Signatures and Message Authentication

Digital signatures in Pretty Good Privacy (PGP) enable of a message's and detection of any alterations, leveraging asymmetric to bind the content to the sender's . The process begins with the sender computing a cryptographic of the using algorithms such as SHA-256 or SHA-512, producing a fixed-size digest that represents the data's integrity. This is then encrypted with the sender's private key via a public-key algorithm like or , yielding the digital , which is appended to the as a signature packet in the OpenPGP format. Upon receipt, the verifier recomputes the of the message and decrypts the using the sender's corresponding public . If the decrypted value matches the recomputed , the is valid, confirming both —since only the private holder could have produced it—and , as any modification would alter the . PGP supports various types, including binary documents (type 0x00) for and text documents (type 0x01) that normalize line endings before hashing to handle email-specific formatting. Detached signatures allow separate of files without embedding, while inline signatures integrate directly into messages, often combined with and in a sign-then-encrypt to obscure content from intermediaries. Message authentication in PGP relies primarily on these digital signatures rather than symmetric message authentication codes (MACs), providing alongside and validation. Signature packets include hashed subpackets for timestamps, issuer keys, and preferences, with unhashed subpackets for revocations or notations, ensuring flexibility in certification. Early PGP versions used and exclusively, but OpenPGP standardized support for multiple hash functions (e.g., , deprecated due to collision vulnerabilities identified in 2017) and algorithms like ElGamal, with modern implementations favoring variants for efficiency. For symmetrically encrypted messages lacking signatures, OpenPGP optionally employs a Modification Detection Code (MDC) packet—a hash of the decrypted and data—to guard against padding oracle attacks, though this offers without . Key management integrates with signatures through self-signatures on user IDs and subkeys, but message-level emphasizes direct signing to mitigate man-in-the-middle risks in untrusted channels. Vulnerabilities, such as weak hashes in legacy signatures, have prompted deprecation notices in RFC 4880 errata, urging migration to stronger primitives like SHA-256 with 2048-bit or larger keys.

Compatibility and Protocol Extensions

The OpenPGP protocol, formalized in RFC 4880 published in November 2007, establishes a standardized message format to promote interoperability across PGP implementations, including open-source variants like GnuPG and commercial products adhering to the specification. Core requirements mandate support for essential algorithms such as TripleDES (ID 2), CAST5 (ID 3), AES-128 (ID 7), DSA (ID 17), ElGamal (ID 20), and SHA-1 (ID 2), ensuring basic message exchange functions without proprietary dependencies. This framework obsoletes earlier standards like RFC 2440 (1998) and RFC 1991 (1996) while preserving essential structures for cross-system compatibility. Backward compatibility with legacy PGP versions, particularly 2.6.x from the early , is achieved through dual packet formats: old-format headers (one-octet length tags 0-15) for broad legacy support and new-format headers (with bit 6 set for partial body lengths and tags up to 63) for enhanced features. Implementations must accept version 3 (V3) keys and signatures—common in pre-OpenPGP PGP—though generation of V3 artifacts is deprecated in favor of version 4 (V4) for improved like longer IDs and subkey separation. For instance, public-subkey packets (tag 14) are ignored by PGP 2.6.x without failure, and simple S2K derivation with and IDEA may be retained solely for decrypting old messages. Unrecognized elements, such as newer compression exceeding 13-bit limits in PGP 2.6.x, trigger graceful degradation rather than total rejection. Protocol extensions enable incremental evolution while minimizing disruption, primarily through IANA-registered for new algorithms and extensible subpacket structures. Symmetric-key algorithms expanded beyond PGP's original IDEA (ID 1) to include variants (IDs 7-10) in RFC 4880, with private ranges (100-110) reserved for experimental additions. Signature subpackets incorporate feature flags (type 30) to advertise capabilities like modified handling or new hashes, and critical bits (bit 7) enforce recognition of mandatory extensions. Private packet tags (60-63) allow vendor-specific or trial features without conflicting with standard parsers, which ignore unknown subpackets unless critical. A prominent example is RFC 6637 (June 2012), which integrates () via new public-key algorithm IDs—18 for ECDH and 19 for ECDSA—supporting NIST curves P-256, , and P-521 in uncompressed MPI within existing packets. This extension maintains compatibility by leveraging V4 structures and avoiding alterations to core packet composition, with profiles defining minimal implementations (e.g., P-256 with AES-128 and SHA-256). Ongoing drafts propose further extensions, such as post-quantum algorithms with IDs 22-35 for lattice-based schemes, but these remain non-standardized as of 2025 and require explicit feature signaling for adoption. Such mechanisms ensure that extensions enhance functionality—e.g., stronger ciphers or quantum resistance—without invalidating prior compliant data.

Historical Development

Origins with Phil Zimmermann (1991–1993)

, a software engineer and privacy activist based in , initiated development of Pretty Good Privacy (PGP) in June 1991 as a tool to enable secure electronic mail in an era of growing digital surveillance threats. Motivated by proposed U.S. legislation such as Senate Bill 266, which sought to mandate mechanisms in devices to facilitate government access, Zimmermann aimed to distribute freely to counter potential erosion of individual privacy rights. He self-funded the project amid personal financial strain, reportedly missing five mortgage payments during the first half of 1991 while coding the software on systems. PGP version 1.0, the initial release, implemented a combining asymmetric public-key encryption for with symmetric encryption for bulk data, drawing on established algorithms like and IDEA to provide , , and for messages. released PGP 1.0 as via the nascent in June 1991, positioning it as a instrument accessible to dissidents, journalists, and ordinary users facing insecure networks. This distribution method bypassed commercial channels and export controls on cryptographic software, allowing rapid proliferation despite U.S. regulations classifying such tools as munitions. From 1991 to 1993, Zimmermann iterated on PGP, releasing version 2.0 in 1992 with enhancements including support for multiple algorithms and improved key management, while maintaining its core emphasis on usability for non-experts. The software's "web of trust" model for key validation emerged during this period as an alternative to centralized certificate authorities, fostering decentralized verification among users. By 1993, PGP had garnered a dedicated following for its empirical resistance to interception, though its unpatented integration of licensed technologies like RSA drew early scrutiny from patent holders. In February 1993, the government initiated a into , the creator of Pretty Good Privacy (PGP), for allegedly violating the and associated (ITAR). These regulations classified cryptographic software employing strong algorithms like as munitions, requiring an export license for dissemination outside the U.S.; PGP's public availability on the , which enabled access without formal , prompted scrutiny by the U.S. Customs Service and Department of Justice. Zimmermann maintained that he developed PGP for domestic privacy needs amid concerns over surveillance, such as those during the , and did not intentionally it, attributing its global spread to third-party uploads. The probe focused on whether online posting constituted illegal , potentially carrying penalties of up to ten years imprisonment and $1 million in fines per violation. The investigation escalated throughout 1993, involving subpoenas to Zimmermann and associates, seizure of computers, and examination of PGP's for compliance. On October 12, 1993, Zimmermann testified before the House Foreign Affairs Subcommittee on Economic Policy, Trade, and the Environment, arguing that restrictions stifled U.S. innovation while failing to curb global proliferation, as the underlying mathematics were unpatentable and widely known. He highlighted that PGP's algorithms, including 1024-bit keys, provided robust protection against unauthorized access, and controls treated tools as weapons equivalent to tanks. The three-year ordeal imposed severe financial strain, with Zimmermann accruing over $300,000 in legal fees, leading to filings by him and collaborators. By 1995, mounting legal challenges to ITAR's application to software, combined with PGP's publication in printed form via —circumventing digital export rules—weakened the government's position. On January 11, 1996, the Department of Justice announced the closure of the without , stating no further action would be taken against or related parties. U.S. Attorney Henry Hubbard cited the probe's conclusion after reviewing evidence, though specifics on the decision—potentially influenced by policy shifts amid the chip's failure and industry lobbying—remained undisclosed. The outcome underscored tensions between imperatives and free speech in , paving the way for PGP's commercialization.

Commercialization via PGP Inc. (1996–1997)

Following the U.S. government's decision to drop its criminal investigation into PGP's without indictment in early 1996, founded PGP Inc. to formalize and expand the software's commercialization. The company incorporated to develop proprietary versions of PGP tailored for use, including enhanced support services and with U.S. regulations, thereby enabling sales of full-strength cryptographic products to businesses while distinguishing these from distributions. In 1996, PGP Inc. merged with ViaCrypt, a prior licensee that had been producing commercial PGP implementations since the early 1990s, integrating ViaCrypt's established customer base and licensing infrastructure to accelerate . Under PGP Inc., development focused on version 5.0, which introduced improvements such as better integration with emerging standards drafts and support for multiple platforms, including Windows and , to appeal to corporate clients seeking reliable and file security tools. PGP 5.0 was released in mid-1997, with U.S. commercial and editions for following in , marking the company's first major proprietary release and emphasizing enhancements like simplified for non-technical users in organizational settings. This version facilitated revenue through licensed distributions, addressing prior limitations from patent disputes over algorithms like by leveraging resolved licensing agreements. PGP Inc.'s brief independent operation culminated in its acquisition by Network Associates Inc. (NAI) in December 1997 for $36 million, just weeks after the PGP 5.0 rollout, shifting control to a larger firm capable of broader distribution and integration with enterprise antivirus products. This transaction provided and the team with resources for further innovation but also introduced corporate priorities that later influenced PGP's evolution.

Corporate Acquisitions and Asset Splits (1999–2002)

In late 1999 and early 2000, Network Associates underwent a major internal restructuring, dividing its operations into semi-autonomous units to streamline management and focus on core competencies; this included establishing PGP Security Inc. as a dedicated division responsible for the PGP encryption product line. The move aimed to preserve PGP's development amid broader company challenges, such as integrating prior acquisitions and addressing market pressures in antivirus and sectors. However, PGP Security faced resource constraints and shifting priorities under new leadership, leading to reduced investment in open-source code releases and feature expansions that had been hallmarks of earlier PGP iterations. Tensions escalated in 2001 when PGP creator Phil Zimmermann resigned from Network Associates on February 19, citing irreconcilable differences over the company's reluctance to publish full PGP source code and its pivot toward proprietary enhancements at the expense of community-driven improvements. Zimmermann, who had remained with the firm post-1997 acquisition, argued that withholding source code undermined PGP's foundational ethos of transparency and auditability, a stance rooted in the software's origins as freeware to counter export restrictions. In October 2001, Network Associates announced it would divest non-core assets, including the PGP desktop encryption and Gauntlet firewall product lines, as part of a broader strategy to refocus on antivirus offerings amid declining revenues and competitive erosion in enterprise security. By March 2002, Network Associates formally dissolved the PGP Security unit, offloading the firewall to third parties while selectively integrating select PGP technologies into its antivirus suite to bolster endpoint protection features. This partial asset split reflected the conglomerate's assessment that standalone PGP maintenance was unprofitable in a market favoring bundled solutions. In July 2002, Network Associates completed the sale of PGP's desktop and wireless encryption assets to a newly formed entity, PGP Corporation, backed by investors including Caufield & Byers; the transaction price was not publicly disclosed, though it enabled PGP Corporation to revive development under leaders like CEO Phil Dunkleberger and CTO Jon Callas, who prioritized enterprise-grade enhancements without the distractions of Network Associates' diversified portfolio. The divestiture marked a pivotal asset separation, restoring PGP to independent stewardship and averting potential stagnation under corporate consolidation.

Open Source Transition and OpenPGP Emergence (1997–2000s)

In June 1997, PGP Inc. released PGP version 5.0, which included a full rewrite of the codebase since the original 1991 version and introduced version 4 key formats that became foundational to subsequent standards. This release supported international cryptographic algorithms compliant with U.S. export regulations relaxed in prior years and anticipated the need for interoperability beyond proprietary implementations. Later that year, in July 1997, PGP Inc. proposed to the Internet Engineering Task Force (IETF) the creation of an open, non-proprietary standard called OpenPGP, granting the IETF permission to use the name for a protocol derived from PGP's message formats and operations. This initiative addressed growing demands for vendor-neutral specifications amid PGP's commercialization, enabling third-party developers to create compatible software without licensing proprietary code. The proposal led to the formation of the OpenPGP Working Group, which produced RFC 2440 ("OpenPGP Message Format") in November 1998, defining packet structures, algorithms (such as RSA, IDEA, and CAST-5), and procedures for encryption, signing, and key management. RFC 2440 emphasized backward compatibility with earlier PGP versions while promoting extensible, public-domain cryptographic primitives. The standardization effort coincided with the emergence of open-source implementations, as proprietary PGP restricted access for advocates. On December 20, 1997, Werner Koch released the initial version of (GnuPG), an open-source reimplementation compatible with PGP and the draft OpenPGP specifications, developed in response to calls for libre alternatives following Richard Stallman's advocacy. GnuPG, licensed under the GNU General Public License, quickly became a cornerstone for and in open-source ecosystems, with its 1.0 stable release in 1999 further solidifying adoption. By the early , OpenPGP's framework facilitated diverse tools like Bouncy Castle libraries and early mobile implementations, decoupling protocol evolution from PGP Inc.'s commercial trajectory after its 1997 acquisition by Network Associates, which focused on enterprise products. This transition enhanced scrutiny and innovation through public review, though it also introduced implementation variances addressed in later RFCs like 4880 (2007).

Standards and Implementations

Evolution of the OpenPGP Standard

The OpenPGP standard originated from efforts to standardize the proprietary PGP protocol for broader interoperability, with initial formalization occurring through (IETF) documents in the mid-1990s. RFC 1991, published in August 1996, defined basic PGP message exchange formats, including public-key encryption and digital signatures using algorithms like and IDEA. This laid groundwork but remained tied to PGP-specific implementations. In November 1998, RFC 2440 introduced the OpenPGP message format, obsoleting RFC 1991 and establishing an open specification for packet-based structures supporting hybrid encryption, compression, and signing, independent of any single vendor. The standard emphasized modularity, allowing symmetric ciphers (e.g., CAST5), hash functions (e.g., ), and key types to be negotiated via packet tags. RFC 4880, released in November 2007, represented a significant revision of 2440, introducing version 4 packet formats for keys and signatures to enhance flexibility and . Key changes included support for subkey binding with expiration dates, revocable user attributes, and improved handling of multiple hash algorithms, while deprecating weaker options like and addressing ambiguities in earlier parsing rules. This version became the de facto baseline for most implementations, enabling better resistance to certain attacks like chosen-text vulnerabilities through clarified padding requirements. Subsequent extensions via companion expanded capabilities: 5581 (June 2009) added the symmetric , 6637 (June 2012) integrated () for keys and signatures using curves like NIST P-256, and 7435 (October 2014) incorporated and X25519 for post-quantum readiness precursors. The standard continued evolving under the IETF's OpenPGP Working Group to address cryptographic weaknesses and modern threats. Updates like RFC 9580, published in July 2024, obsolete RFC 4880 by mandating stronger defaults (e.g., deprecating keys below 2048 bits, requiring or better hashes), introducing AEAD modes for , and supporting post-quantum algorithms via hybrid schemes. This refresh, developed over years of drafts, aimed to mitigate risks from outdated primitives exposed in empirical analyses, such as collisions, while maintaining through optional features. Implementations must now handle version 7 packets for these advancements, reflecting a shift toward proactive hardening amid advancing computational threats.

Major Open-Source Implementations

GnuPG, also known as , serves as the foremost open-source implementation of the OpenPGP standard outlined in RFC 4880, enabling encryption, digital signatures, and for secure data and communications. Initially developed by Werner Koch in 1997 amid U.S. export controls limiting proprietary PGP distribution, GnuPG provides a complete, libre alternative with support for symmetric and asymmetric cryptography, including , , and later elliptic curve variants, alongside features like smartcard integration via access modules for hardware tokens. Its , extensible architecture, and cross-platform compatibility—spanning , Windows, macOS, and embedded systems—have made it integral to tools like email clients (e.g., with Enigmail successor) and package managers, with ongoing releases addressing vulnerabilities and incorporating modern ciphers such as and . Sequoia-PGP represents a newer Rust-based implementation emphasizing memory safety, modular design, and enhanced security auditing through formal methods where feasible, comprising crates for low-level packet parsing and high-level operations. Developed as an alternative to GnuPG to mitigate historical implementation bugs, it prioritizes correctness in handling edge cases like malformed packets and supports OpenPGP features with a focus on deterministic builds to reduce supply-chain risks. Its adoption has grown in environments valuing Rust's type safety, such as secure messaging prototypes and key servers. For developer ecosystems, Bouncy Castle offers a low-level OpenPGP provider in and C#, facilitating integration into applications via the Java Cryptography Architecture (JCA) with APIs for , , and using algorithms like and IDEA derivatives. Similarly, OpenPGP.js provides a compliant with RFC 9580 (superseding RFC 4880), enabling client-side in browsers and environments without native dependencies, though it trades some performance for portability across devices. These libraries extend OpenPGP utility beyond standalone tools, powering custom protocols in software like apps and web services.

Proprietary and Commercial Variants

Following the resolution of legal challenges in 1996, PGP Inc. was established by to develop and sell versions of PGP software, marking the shift toward commercial offerings with closed-source implementations. These included enhanced features for enterprise use, such as improved and integration capabilities, while maintaining compatibility with earlier versions. Network Associates acquired PGP Inc. in 1997 and continued development, releasing versions like PGP 6.x and 7.x, which supported both commercial licensing for businesses and limited distributions, but retained core engines. In 2002, after Network Associates discontinued PGP product lines, the intellectual property and development assets were transferred to the newly formed PGP Corporation, which resumed production. PGP Corporation released PGP 8.0 that year, available in both commercial and editions with for in the free version, followed by subsequent updates emphasizing enterprise-grade tools. Key products included PGP Desktop, a client application for emails, files, and whole disks, and PGP Universal Server, a gateway solution for automated policy-based , decryption, and in organizational environments. These variants offered vendor-supported updates, compliance certifications, and scalability features absent in purely open-source alternatives. PGP Corporation was acquired by on June 7, 2010, for approximately $300 million in cash, leading to the integration and rebranding of its proprietary PGP technologies into the Encryption portfolio. Products such as PGP Desktop became Encryption Desktop, providing endpoint encryption for and in transit, while server offerings evolved into Encryption Server for centralized management and whole-disk encryption capabilities like PGP Whole Disk Encryption. 's versions prioritized interoperability, FIPS compliance, and professional support services, distinguishing them through licensed, closed-source enhancements over open-source OpenPGP implementations like GnuPG. Following Broadcom's 2019 acquisition of 's enterprise security business, these products continued under PGP Encryption branding, with ongoing support for legacy deployments as of 2025.

Security Analysis

Historical Strengths and Empirical Validation

Pretty Good Privacy (PGP) demonstrated historical strengths through its pioneering hybrid model, which combined asymmetric for secure with efficient symmetric ciphers for data , enabling end-to-end protection without relying on trusted third parties. Introduced in 1991, PGP utilized the algorithm for public-key operations and the (IDEA) for symmetric , both selected for their resistance to known attacks at the time; IDEA, in particular, was a novel designed to withstand differential and . This architecture compressed data prior to to minimize redundancy and enhance resistance to statistical attacks, while digital signatures ensured message integrity and via hash functions like initially, later upgraded to stronger options. The core of PGP have empirically validated their robustness over more than three decades, with no successful cryptanalytic breaks reported against properly implemented and keyed instances despite extensive scrutiny by academic and adversarial researchers. Early versions withstood challenges during the 1990s debates, where U.S. assessments implicitly acknowledged PGP's strength by classifying it as a munition rather than dismissing it as insecure. Subsequent migrations to for symmetric encryption and larger or keys have preserved or enhanced this security margin, as AES-256 remains unbroken against brute-force or analytical attacks with current computing power. Real-world applications further substantiate PGP's empirical success, as encrypted communications protected by PGP resisted decryption by state actors in cases involving journalists, activists, and whistleblowers, with compromises attributable to errors or legal coercion rather than algorithmic failures. For example, PGP's deployment in privacy-sensitive contexts, such as secure file transfers and email among organizations, has maintained data without cryptographic breaches, underscoring the protocol's causal efficacy in causal-realist terms against . Audits and ongoing implementations in standards like OpenPGP confirm that, when configured with modern parameters (e.g., 4096-bit or keys, SHA-256 hashing, AES-256), PGP achieves security levels equivalent to its component primitives.

Known Vulnerabilities and Implementation Flaws

In 2018, researchers disclosed EFAIL, a class of vulnerabilities affecting OpenPGP and S/MIME implementations in email clients, enabling attackers to exfiltrate plaintext from encrypted messages via active attacks that manipulate MIME structures or exploit cipher block chaining (CBC) mode padding oracles. These flaws arose from how clients like Thunderbird and Outlook processed encrypted content, such as rendering HTML or base64-decoding parts, allowing remote content to leak up to 35 bytes per request, potentially recovering full messages over multiple queries if the attacker controlled the network or email server. EFAIL impacted 10 of 35 tested OpenPGP clients and stemmed partly from the protocol's reliance on unauthenticated encryption modes without built-in protections against such exfiltration, though core cryptographic primitives remained intact. GnuPG, a primary OpenPGP implementation, has faced multiple code-level bugs, including CVE-2018-12020, where weak string-to-key (S2K) derivation functions allowed brute-force recovery of passphrases from memory dumps or side-channel leaks due to inefficient counting in iterated hashing. Another issue, CVE-2019-13050, enabled denial-of-service via "poisoned" public keys flooded with excessive signatures, bloating keyrings and slowing validation to the point of unusability, exploitable through keyserver imports dating back to design choices in signature handling. Subsequent fixes in GnuPG 2.2.23 addressed related DoS vectors in versions 2.2.21 and 2.2.22 (CVE-2020-25125), where malformed packets triggered infinite loops during decryption. Implementation flaws have also appeared in derived tools, such as OpenPGP.js, where CVE-2025-47934 permitted spoofing of signatures and encrypted emails by mishandling detached signature verification, allowing attackers to forge valid-appearing messages without key access. Historical parsers in GnuPG exhibited invalid reads (CVE-2015-1607), risking crashes or disclosures from malformed keyrings, underscoring persistent risks in boundary handling across versions. Despite patches, these incidents highlight how protocol flexibility—intended for interoperability—exposes surfaces to client-specific errors, with no fundamental breaks in algorithms like or when used with strong parameters, but requiring vigilant updates to mitigate.

Usability Barriers and Human Factors

Despite its cryptographic robustness, Pretty Good Privacy (PGP) has faced persistent usability challenges stemming from its complex processes, which require users to generate asymmetric pairs, securely exchange keys, verify key authenticity via fingerprints or the web-of-trust model, and revoke compromised keys—tasks that demand technical expertise often absent in non-specialist users. These barriers contribute to high error rates, as evidenced by a 1999 laboratory of PGP 5.0 involving 22 novice participants, where none successfully met core security objectives such as encrypting messages to the correct recipient without inadvertently disclosing , even after explicit and repeated exposure. Human factors exacerbate these issues, including cognitive overload from opaque interfaces that fail to provide intuitive on actions like distinguishing from signing or detecting key mismatches. In the same , participants frequently misinterpreted PGP's "pen and paper" metaphors for signing, leading to skipped verifications and false senses of , with errors persisting across trials due to inadequate error recovery mechanisms. The web-of-trust model, intended to decentralize key validation, further confounds users by requiring subjective assessments across interconnected signatures, often resulting in unverified or malicious keys being accepted; empirical of keyserver from 2019 revealed that only a small fraction of PGP keys exhibit active usage patterns indicative of proper validation practices. Follow-up evaluations of modern PGP implementations, such as a on Mailvelope, confirmed ongoing difficulties, with users struggling to integrate into workflows and verify fingerprints accurately, achieving success rates below 50% for threat detection tasks like identifying substituted keys. fingerprint representation remains a bottleneck, as short identifiers (e.g., 32-bit key IDs) are prone to collisions exploitable in man-in-the-middle attacks, while full 160-bit fingerprints are cumbersome for manual comparison, leading to reliance on insecure shortcuts like visual similarity checks. These human-centric flaws, rooted in mismatched mental models between user expectations and PGP's decentralized design, have limited adoption to technically proficient communities, with surveys indicating that even experts overlook routine safeguards like revocation in dynamic environments.

Exposure to Modern Threats Including Quantum Computing

OpenPGP implementations, including those based on PGP, rely on public-key algorithms such as and variants for and digital signatures, which are vulnerable to attacks via . enables efficient of large integers and solving of problems, potentially allowing of encrypted sessions or forgery of signatures using sufficiently powerful quantum computers. In contrast, the symmetric components of OpenPGP, such as AES-256, face only a quadratic speedup threat from , rendering them quantum-resistant with appropriately sized keys. The "" strategy poses an immediate risk, where adversaries collect encrypted data today for future quantum decryption, underscoring the need for migration to post-quantum algorithms. As of 2025, no cryptographically relevant quantum computer exists, but projections indicate potential scalability within 10-20 years, prompting proactive efforts. The IETF has advanced drafts for integrating post-quantum public-key algorithms into OpenPGP, including lattice-based schemes like for encryption and or SPHINCS+ for signatures, to maintain compatibility while enhancing resistance. GnuPG, the primary open-source OpenPGP implementation, has explored support for these algorithms but faces challenges with overhead—post-quantum keys can exceed 3 KB, complicating and . ProtonMail has prototyped quantum-safe OpenPGP extensions using classical-post-quantum schemes to bridge the transition, emphasizing . However, widespread adoption lags due to the absence of finalized NIST-approved integrations in core OpenPGP tools, leaving legacy deployments exposed until full protocol updates occur. Beyond quantum threats, modern classical attacks exploit implementation weaknesses in OpenPGP, such as timing side-channels in or malleability in certain cipher modes, though these are mitigated in updated libraries like . Nation-state actors have demonstrated capabilities to brute-force weaker s or exploit leaks in PGP-encrypted communications, amplifying risks in high-stakes environments. Comprehensive audits recommend hybrid and key rotation to address these evolving vectors, prioritizing empirical validation over theoretical assurances.

Controversies and Criticisms

US Government Suppression and Export Control Battles

In 1991, developed and publicly released Pretty Good Privacy (PGP), an software utilizing strong , which quickly spread internationally via the without an export . The U.S. government classified strong cryptographic software as a munition under the and (ITAR), requiring prior approval for exports to prevent adversaries from accessing tools that could evade surveillance. This classification stemmed from national security concerns, viewing encryption as akin to weapons, though critics argued it hindered U.S. innovation and global privacy standards. By 1993, the U.S. Customs Service launched a three-year into , alleging violations of export controls due to PGP's unrestricted online availability, which enabled foreign downloads. The probe, involving the Departments of Justice and State, scrutinized whether PGP's dissemination constituted illegal export of controlled technology, potentially subjecting Zimmermann to fines or imprisonment; he faced financial strain from legal defense and withheld testimony under advice of counsel during congressional hearings. Concurrently, broader efforts included proposals like the for , reflecting government resistance to unescrowed strong encryption. The investigation concluded on January 11, 1996, when U.S. Attorney Michael J. Yamaguchi announced its closure without indictments, citing insufficient evidence and legal challenges asserting that cryptographic source code constituted protected speech under the First Amendment. Federal courts, in cases like Bernstein v. United States (1996), reinforced this by striking down prior restraints on encryption exports as unconstitutional. Export controls eased thereafter; President Clinton's 1996 executive order liberalized rules for commercial encryption up to 56-bit keys, with full deregulation for open-source and most commercial software by 2000, allowing PGP's unrestricted global distribution except to embargoed nations. These battles highlighted tensions between security imperatives and free expression, ultimately favoring broader access to privacy tools despite initial suppression attempts.

Design Flaws and Overstated Privacy Claims

OpenPGP, the standard underlying PGP implementations, does not encrypt subject lines or certain headers, exposing this to email providers, network observers, and potential adversaries during transit. This design choice stems from compatibility with existing protocols, which separate headers from body content, but it undermines by revealing communication topics and patterns without additional measures like header extensions. The web-of-trust model for public key validation relies on decentralized signatures to establish authenticity, yet empirical analysis shows it suffers from sparse connectivity, with most users unable to form reliable paths due to limited key signing events and keyserver issues. Keyservers, intended to distribute and , have faced scalability problems, spam, and desynchronization, rendering the system ineffective for widespread verification as of 2019. OpenPGP lacks native support for , meaning that compromise of a long-term private key retroactively exposes all prior encrypted messages encrypted under the corresponding public key, a vulnerability absent in protocols like Signal that rotate ephemeral keys per session. The message format's complexity, including nested packet structures and optional compression, has facilitated attacks such as EFAIL (disclosed in May 2018), where adversaries manipulate encrypted content in transit to exfiltrate via rendering flaws. Advocates have portrayed PGP as offering robust end-to-end for , yet this overlooks inherent leakage and the protocol's dependence on flawless user , which studies show fails in practice for non-experts. Claims of "unbreakable" , rooted in the strength of algorithms like and , ignore design-level exposures to and the absence of protections against quantum threats in default configurations, as no post-quantum modes were standardized until recent drafts. These limitations have led cryptographers to argue that modern systems would avoid PGP's archaic structure, prioritizing simplicity and resistance over .

Key Management Risks and Identity Binding Issues

In PGP, private keys are safeguarded primarily by user-chosen passphrases, rendering them susceptible to compromise through weak passphrase selection, brute-force attacks, or theft via malware if stored on compromised devices. The long-lived nature of PGP root keys, often retained indefinitely and tied to a user's identity, amplifies this risk by extending the window for exposure without routine rotation, as regenerating and redistributing keys disrupts established trust networks. A notable incident occurred on December 31, 2022, when Bitcoin Core developer Luke Dashjr reported the compromise of his PGP private key—likely via a hacked server—enabling attackers to drain over 200 BTC (valued at approximately $3.3 million) from his wallet through unauthorized transactions. Key revocation poses additional challenges, as it requires access to the private to generate a valid revocation , which may be impossible if the is lost or already compromised; even when feasible, propagation across decentralized keyservers is inconsistent, and users rarely check for revocations in practice. This is compounded by PGP's encouragement of static keys, where rotation is discouraged due to the effort of re-signing and re-verifying signatures in social graphs, leaving compromised keys active longer than necessary. Empirical usability studies highlight that tasks like revocation are error-prone for non-experts, often overlooked amid the system's complexity. Identity binding in PGP relies on the Web of Trust model, where users sign public keys to vouch for their association with claimed identities, but this decentralized approach falters due to insufficient verification: keyservers allow unverified uploads with arbitrary email claims, enabling impersonation without robust checks. Trust propagation through signature chains is unreliable, as most users accept short or unexamined paths, while experts distrust the system entirely, favoring direct key exchanges over the infrastructure. Consequently, the model permits sybil-like attacks or forged bindings, undermining PGP's ability to causally link keys to real-world identities in adversarial settings, with consensus among cryptographers that the Web of Trust has proven fundamentally broken for scalable, secure authentication.

Impact and Current Status

Influence on Cryptographic Practices and Privacy Advocacy

PGP's release in 1991 by popularized the application of to , combining symmetric algorithms like IDEA or with asymmetric ones such as for efficient, secure , thereby influencing subsequent hybrid cryptosystems in messaging protocols. This approach demonstrated the feasibility of for non-experts, prompting the development of interoperable standards; PGP formed the basis for the OpenPGP specification, formalized in RFC 4880 by the in 2007, which defines packet formats, , and mechanisms for broad . Implementations adhering to OpenPGP, including GnuPG released in 1999, extended PGP's model by supporting modern algorithms like while maintaining backward , embedding these practices into tools for secure file handling and software distribution. PGP introduced the "" model, a decentralized alternative to centralized authorities, where users mutually certify keys through signatures, fostering validation without reliance on hierarchical intermediaries. This influenced cryptographic practices by emphasizing user in , contrasting with X.509-based systems, and inspired key-signing events and keyserver networks that persist in contemporary OpenPGP ecosystems, though it highlighted challenges in scalability and revocation. In privacy advocacy, PGP galvanized opposition to U.S. export restrictions on during the "," as Zimmermann's distribution of the software via the evaded munitions controls under the , leading to a federal investigation from 1993 to 1996 that underscored civilian rights to tools. The case amplified calls for policy reform, contributing to the 1999 relaxation of export rules and bolstering arguments for unrestricted access to as a bulwark against surveillance, with articulating that "... is the best route to " in communications. This advocacy legacy endures in open-source successors like GnuPG, which prioritize accessibility and auditability, influencing broader movements for amid ongoing debates over government backdoors.

Barriers to Widespread Adoption

Despite its technical robustness, PGP's decentralized web of trust model has proven insufficient for scalable , as users rarely participate in key-signing events or maintain comprehensive networks, leading to frequent reliance on unverified keys or key servers prone to compromise. This contrasts with centralized systems like TLS, where authorities provide automated validation, reducing the cognitive burden and enabling broader deployment. Studies on tools confirm that assurance remains a core obstacle, with PGP's approach exacerbating adoption hurdles in diverse user populations. Major email providers, such as and , have resisted integrating PGP due to its incompatibility with content-scanning features essential for detection, , and filtering; for instance, Gmail's architecture prioritizes server-side analysis, rendering client-side PGP disruptive to these operations. This institutional inertia creates a coordination barrier, as widespread adoption requires symmetric support from both senders and recipients, yet penetration remains low—estimated at under 1% of traffic in surveys of technical communities. Misaligned incentives further compound this, with providers favoring proprietary or hybrid schemes that retain data access for compliance and monetization. Technical limitations, including the absence of in core PGP implementations, expose past communications to key compromise risks, deterring users in high-stakes environments where ephemeral keys are standard, as in protocols like Signal. Additionally, PGP's origins as a file-encryption tool limit its seamlessness in real-time messaging, where leakage and lack of deniability persist, prompting shifts toward purpose-built alternatives. Regulatory environments in surveillance-heavy jurisdictions impose further friction, with policies discouraging end-to-end tools that evade lawful access, as evidenced by ongoing debates over encryption backdoors. These factors collectively sustain PGP's niche status, with adoption confined primarily to privacy advocates and activists rather than mainstream consumers or enterprises.

Relevance and Alternatives in 2025

In 2025, Pretty Good Privacy (PGP) and its implementation OpenPGP retain relevance primarily in specialized domains such as secure for journalists, activists, and technical professionals requiring verifiable signatures and flexible without dependence on proprietary platforms. The protocol's , combining symmetric efficiency with asymmetric security, remains resistant to brute-force attacks when using contemporary parameters like AES-256 for bulk data and for . However, its adoption remains limited to a small, technically proficient user base, as evidenced by persistent keyserver queries and integration in tools like GnuPG, rather than mass deployment. PGP's declining prominence stems from inherent complexities in , distribution, and revocation, which deter non-experts amid rising threats like leakage and implementation vulnerabilities. Integrated (E2EE) in consumer tools has supplanted PGP for routine , rendering it "good enough" for most against non-state adversaries but insufficient for seamless usability. Prominent alternatives include managed E2EE email providers like ProtonMail, which internally leverages PGP-inspired mechanisms with zero-access and automatic handling, processing millions of daily messages while ensuring server-side privacy. Tuta Mail employs AES-256 and hybrids to subjects and metadata, bypassing PGP's manual workflows for broader accessibility. For and , tools like offer disk-level protection with pluggable algorithms, while developer libraries such as libsodium provide misuse-resistant primitives for custom implementations, emphasizing simplicity over PGP's expansive feature set. Messaging protocols like Signal's, with built-in via the , address PGP's lacks in ephemeral keys and deniability for real-time exchanges.

References

  1. [1]
    Why I Wrote PGP - Phil Zimmermann
    Therefore, using PGP is good for preserving democracy. If privacy is outlawed, only outlaws will have privacy. It appears that the deployment of PGP must ...
  2. [2]
    History - OpenPGP
    Aug 2, 2024 · It is based on the Pretty Good Privacy (PGP) freeware software as originally developed in 1991 by Phil Zimmermann. For that, he was the ...
  3. [3]
    From arms violations to gathering dust: The strange history of PGP
    The software eliminated the need for third-party key authorities to issue and manage the keys that lock and unlock the data. Suddenly, very good encryption was ...
  4. [4]
    Standard - OpenPGP
    Jan 17, 2025 · This document contains all the necessary information to develop interoperable applications based on the OpenPGP format.
  5. [5]
    RFC 4880 - OpenPGP Message Format - IETF Datatracker
    It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.
  6. [6]
    PGP Timeline - cypherspace
    Bass-O-Matic Symmetric key crypto algorithm designed PRZ as used in PGP 1.0. Bass-O-Matic was weak, and after having this demonstrated to him, PRZ replaced it ...
  7. [7]
    RFC 9580: OpenPGP
    This document specifies the message formats used in OpenPGP. OpenPGP provides encryption with public key or symmetric cryptographic algorithms, ...
  8. [8]
    OpenPGP Web of Trust - GitLab
    Feb 3, 2022 · The web of trust is a flexible, decentralized trust model created for PGP. PGP and GnuPG include implementations of the web of trust, and OpenPGP defines a ...Table of Contents · Introduction · Problem Statement · OpenPGP's Authentication...
  9. [9]
    OpenPGP Web of Trust - OpenStack Wiki
    Key Signing Process. Using a signature to attest to the validity of another key, key signing, is what forms the web of trust. It enables you to determine the ...
  10. [10]
  11. [11]
    Pretty Good Privacy (PGP) and Digital Signatures - Linux Journal
    Oct 14, 2020 · The latest version of the OpenPGP standard is described in RFC 4880, published in 2007. Nowadays there are many OpenPGP-compliant products ...
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
  19. [19]
  20. [20]
  21. [21]
  22. [22]
  23. [23]
  24. [24]
  25. [25]
  26. [26]
  27. [27]
  28. [28]
  29. [29]
    draft-ietf-openpgp-pqc-13 - Post-Quantum Cryptography in OpenPGP
    This document defines a post-quantum public-key algorithm extension for the OpenPGP protocol. Given the generally assumed threat of a cryptographically ...
  30. [30]
    Philip Zimmermann and a new standard for encrypting data
    Philip Zimmermann invented the PGP protocol to keep your online correspondence private. And he almost went to jail for that.
  31. [31]
    Phil Zimmermann's Home Page
    Originally designed as a human rights tool, PGP was published for free on the Internet in 1991. This made Zimmermann the target of a three-year criminal ...Missing: origins | Show results with:origins
  32. [32]
    PGP Vs GPG: The Key Differences Explained | JSCAPE
    PGP is proprietary and requires licensing, while GPG is open-source and free. PGP has official support, GPG relies on community or third-party support.Missing: achievements controversies
  33. [33]
    Data-Secrecy Export Case Dropped by U.S. - The New York Times
    Jan 12, 1996 · Mr. Zimmermann maintained that he did not put the software on the Internet. The Justice Department began its investigation three years ago, and ...
  34. [34]
    PGP Case - - dubois.com
    For three years, I represented Philip Zimmermann in a federal investigation concerning the export of a munition—a software program. Mr. Zimmermann wrote a ...<|separator|>
  35. [35]
    Philip Zimmermann
    " This brings to a close a criminal investigation that has spanned the last three years. ... There was also the risk that the export-control law would be declared ...
  36. [36]
    [PDF] Cryptic Controversy: U.S. Government Restrictions on Cryptography ...
    Philip Zimmermann, creator of PGP, became the target of a federal criminal investigation, potentially subject to criminal sanctions, in 1993.62 Federal ...
  37. [37]
    Testimony of Philip Zimmermann to Subcommittee for Economic ...
    1993 Congressional Hearings Intelligence and Security. Testimony of Philip Zimmermann to Subcommittee for Economic Policy, Trade, and the Environment US ...Missing: 1993-1996 | Show results with:1993-1996
  38. [38]
    Phil Zimmermann's Senate Testimony
    Knowledge of cryptography is becoming so widespread, that export controls are no longer effective at controlling the spread of this technology. People ...
  39. [39]
    A Review of E-mail Security Standards - Internet Society
    In 1996, PGP incorporated and merged with ViaCrypt, a company already producing a commercial PGP implementation. PGP Inc. now produces a version of PGP for ...
  40. [40]
    linux, säkerhet - Lysator
    Additional Information: US commercial and freeware versions of PGP 5.0 for Linux were released in September 1997 by PGP, Inc., a company founded by Phil ...
  41. [41]
    Breaking the Crypto Barrier | WIRED
    Shortly after Pretty Good Privacy's PGP 5.0 freeware was made available at MIT on Monday, the university's network manager, Jeffrey Schiller, says he read on ...
  42. [42]
    Official Biography: Philip Zimmermann - Internet Hall of Fame
    After the government dropped its case in early 1996, Zimmermann founded PGP Inc. The company was acquired by Network Associates Inc (NAI) in 1997, where he ...Missing: commercialization | Show results with:commercialization
  43. [43]
    Network Associates Break Up - BetaNews
    Jan 14, 2000 · It will be split into six units including McAfee Inc. and PGP Security Inc. The four major software units will report to Peter Watkins, the new ...
  44. [44]
    Zimmermann leaves Network Associates
    Feb 19, 2001 · New senior management assumed control of PGP Security in the final months of 2000, and decided to reduce how much PGP source code they would ...Missing: unit dissolution 2002
  45. [45]
    Zimmermann leaves Network Associates - CNET
    Encryption icon Philip Zimmermann left Network Associates this week, after he claimed he had issues with the security conglomerate's handling of its encryption ...
  46. [46]
    Network Associates puts PGP up for sale - The Register
    Oct 12, 2001 · Network Associates plans to sell off its PGP desktop encryption and Gauntlet firewall product lines. It's a surprise move that reflects weakness in the ...Missing: split | Show results with:split
  47. [47]
    Network Associates To Buy Out Remaining McAfee.com Shares - CRN
    Mar 18, 2002 · It also dissolved its PGP Security unit, selling off its Gauntlet firewall product line and integrating PGP technology into its McAfee line.
  48. [48]
    Network Associates Sells PGP Products To New Company - CRN
    Aug 19, 2002 · Network Associates sold its PGP desktop and wireless encryption product lines to newly formed PGP Corp. for an undisclosed amount, ...Missing: sale split
  49. [49]
    PGP Encrypts $14 Million Deal - Buyouts
    Aug 20, 2002 · ... acquired by Network Associates in 1997, then put up for auction last October. ... company morphed into PGP (Pretty Good Privacy) Inc. in 1996 ...
  50. [50]
    Pretty good news from PGP -- ADTmag
    Aug 26, 2002 · Network Associates bought it back in March, and then shelved it. And now, Pretty Good Privacy, the public-key encryption software better known ...
  51. [51]
    2. A high-level view - Notes on OpenPGP
    OpenPGP is a widely recognized, IETF-standardized set of cryptographic operations used for securing communications and ensuring software integrity.
  52. [52]
    The GNU Privacy Guard
    GnuPG 2.5.13 and gpg4win 5.0.0-beta395 released (2025-10-22) · GnuPG 2.5.12 released (2025-09-02) · New GnuPG merchandise available (2025-09-01) · GnuPG 2.5.9 with ...Download · Release Notes · [Announce] GnuPG 2.4.7 and... · HOWTOs
  53. [53]
    RFC 4880: OpenPGP Message Format
    Signature Notation Data Subpackets OpenPGP signatures further contain a mechanism for extensions in signatures. These are the Notation Data subpackets ...
  54. [54]
    RFC 6637: Elliptic Curve Cryptography (ECC) in OpenPGP
    This document defines an Elliptic Curve Cryptography extension to the OpenPGP public key format and specifies three Elliptic Curves that enjoy broad support by ...
  55. [55]
    History for rfc9580 - IETF Datatracker
    RFC 9580 Revision differences From revision RFC 9580 (2024-07-31) draft-ietf-openpgp-crypto-refresh-13 (2024-01-04) draft-ietf-openpgp-cryptoMissing: evolution | Show results with:evolution
  56. [56]
    A brief history of GnuPG: vital to online security but free and ...
    Jul 17, 2017 · GnuPG is part of the GNU collection of free and open source software, but its story is an interesting one, and it begins with software engineer Phil Zimmermann.
  57. [57]
    OtherFreeSoftwareOpenPGP - GnuPG wiki
    Sequoia is a cool new OpenPGP implementation. It consists of several crates, providing both a low-level and a high-level API for dealing with OpenPGP data. Our ...Missing: open- source
  58. [58]
    Sequoia-PGP
    This is the first version that supports the new revision of OpenPGP specified in RFC9580 released at the end of July 2024. It is the successor of RFC4880, ...Missing: 5.0 | Show results with:5.0
  59. [59]
    Developer Libraries/Tools - OpenPGP
    Jan 14, 2025 · Bouncy Castle (Low-level Java/C#) · calccrypto/OpenPGP (C++) · Crypt::OpenPGP (Perl) · DidiSoft OpenPGP Library (High-level Java/C#/PL/SQL/T-SQL) ...
  60. [60]
    OpenPGP.js | OpenPGP JavaScript Implementation
    This project aims to provide an Open Source OpenPGP library in JavaScript so it can be used on virtually every device.
  61. [61]
    OpenPGP implementation for JavaScript - GitHub
    OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. It implements RFC 9580 (superseding RFC 4880 and RFC 4880bis).OpenPGP.js · Wiki · Discussions · Issues 18
  62. [62]
    Latest news - The International PGP Home Page
    Phil Zimmermann has posted ... The license, effective immediately, marks the end of the PGPi scanning and OCR project, which started with PGP 5.0i in 1997.
  63. [63]
    Symantec Completes Acquisition of PGP and GuardianEdge
    Jun 7, 2010 · Symantec announced today that it has completed its acquisition of PGP Corporation and GuardianEdge, deals totaling over $370 million that ...
  64. [64]
    Symantec Acquires Encryption Provider PGP For $300 Million - Forbes
    Apr 29, 2010 · Under the terms of the agreements, Symantec will acquire PGP Corporation for a purchase price of approximately $300 million in cash and ...
  65. [65]
    PGP Encryption Server Benefits and Considerations for upgrading ...
    Jan 27, 2025 · This article goes over the benefits and considerations when reviewing the upgrade from previous versions of PGP Encryption Server (Symantec ...
  66. [66]
    How PGP works
    When any user signs another's key, he or she becomes an introducer of that key. As this process goes on, it establishes a web of trust. In a PGP environment, ...The Basics of Cryptography · How PGP works · Keys · Digital certificatesMissing: OpenPGP | Show results with:OpenPGP<|control11|><|separator|>
  67. [67]
    What is PGP Encryption? How it Works and Why It's Still Reliable.
    Jan 7, 2025 · PGP encryption is a data encryption program used to authenticate and provide cryptographic privacy for data transfers.Missing: achievements controversies
  68. [68]
    How Does PGP Encryption Work—and Is It Still Secure in 2025?
    Jun 12, 2025 · PGP encryption remains a foundational technology for secure communication. This blog explains how it works and offers guidance for ...
  69. [69]
    Surveying Pretty Good Privacy After Three Decades
    Aug 16, 2021 · ... open source implementation of the format since the initial version in 1997. With the PGP trademark and commercial ownership changing hands ...Missing: transition | Show results with:transition
  70. [70]
    Breaking S/MIME and OpenPGP Email Encryption using Exfiltration ...
    We devise working attacks for both OpenPGP and S/MIME encryption, and show that exfiltration channels exist for 23 of the 35 tested S/MIME email clients and 10 ...
  71. [71]
    EFAIL
    May 14, 2018 · EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails.
  72. [72]
    [security fix] GnuPG 2.2.8 released (CVE-2018-12020)
    Jun 8, 2018 · 8. This version fixes a critical security bug and comes with some other minor changes. Impact ====== All current GnuPG versions are affected on ...
  73. [73]
    All News - GnuPG
    This version fixes a critical security bug in 2.2.21 and 2.2.22 (CVE-2020-25125). Please follow the instructions from the announcement mail and update affected ...
  74. [74]
    CVE-2025-47934 - Spoofing OpenPGP.js signature verification
    Jun 10, 2025 · CVE-2025-47934 allows attackers to spoof arbitrary signatures and encrypted emails that appear as valid in OpenPGP.js.
  75. [75]
    hannob/pgpbugs: A history of PGP-related vulnerabilities - GitHub
    CVE-2015-1607/GnuPG: Invalid read in keyring parser. Also some misc bugs in other applications related to the usage of PGP: CVE-2020-13165/gradle: Passphrase ...
  76. [76]
    Release Notes - GnuPG
    Fixed a bug occurring when decrypting pgp 5 encrypted messages, fixed an infinite loop bug in the 3DES code and in the code which looks for trusted signatures.
  77. [77]
    15 reasons not to start using PGP - SECUSHARE
    Pretty Good Privacy is better than no encryption at all, and being end-to ... This seems to be a problem even with long key ids. Now people say you ...
  78. [78]
    [PDF] Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
    Strong cryptography, provably correct protocols, and bug-free code will not provide security if the people who use the software forget to click on the encrypt ...Missing: resisting | Show results with:resisting
  79. [79]
    The PGP Problem | Latacora
    Jul 16, 2019 · PGP does a mediocre job of signing things, a relatively poor job of encrypting them with passwords, and a pretty bad job of encrypting them with public keys.Missing: achievements | Show results with:achievements
  80. [80]
    Encryption for the masses? An analysis of PGP key usage | Braun
    Additionally, findings from existing research identifying poor usability and a lack of understanding of the underlying mechanisms of PGP can be confirmed.
  81. [81]
    Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a ...
    This paper presents the results of a laboratory study involving Mailvelope, a modern PGP client that integrates tightly with existing webmail providers.Missing: errors | Show results with:errors
  82. [82]
    [PDF] An Empirical Study of Textual Key-Fingerprint Representations
    Aug 10, 2016 · We evaluated six different key-fingerprint representation types with regards to their comparison speed, attack de- tection accuracy and ...
  83. [83]
    Encryption for the masses? An analysis of PGP key usage
    We show that a relatively small homogeneous population of mainly western, technically skilled, and moderately politically active males is using PGP for privacy ...
  84. [84]
    Post-Quantum Cryptography in OpenPGP - IETF
    Mar 25, 2023 · This document defines a post-quantum public-key algorithm extension for the OpenPGP protocol. Given the generally assumed threat of a cryptographically ...
  85. [85]
    Proton is building quantum-safe PGP encryption for everyone
    Oct 24, 2023 · Proton is leading the standardization of quantum-safe encryption algorithms in OpenPGP, the open standard of encryption that is available for anyone to use.
  86. [86]
    Post-Quantum Cryptography in OpenPGP - IETF Datatracker
    Apr 15, 2025 · ... resistance against signature stripping attacks naturally arises. In a signature stripping attack, an adversary removes one or more of the ...
  87. [87]
    Infrastructure support for GnuPG post-quantum keys
    Jan 7, 2025 · PQC-sized public keys for GnuPG may be large, with a 3106 byte key rejected. SPHINCS+ signatures and Classic McEliece encryption subkeys will ...
  88. [88]
    Compliance Options (Using the GNU Privacy Guard)
    This option forces the use of quantum-resistant encryption algorithms. If not all public keys are quantum-resistant the encryption will fail. On decryption a ...
  89. [89]
    Navigating quantum security risks in networked environments
    PGP, or Pretty Good Privacy, is a well-established encryption protocol ... computing, ensuring the ongoing security of OpenPGP in the face of quantum threats.
  90. [90]
    Quantum-resistant End-to-End Secure Messaging and Email ...
    Aug 29, 2023 · OpenPGP (Open Pretty Good Privacy) [16] is an open standard for securing electronic communication. It provides a secure and reliable way to ...<|separator|>
  91. [91]
    A brief history of U.S. encryption policy - Brookings Institution
    Apr 19, 2016 · In 1996, President Clinton signed an executive order that loosened restrictions after technology companies claimed that the export controls on ...
  92. [92]
    Does Proton Mail encrypt email subjects?
    Given that PGP does not end to end encrypt subject lines, why does Proton Mail use the OpenPGP standard? The reason is interoperability. By adhering to OpenPGP, ...Missing: limitations | Show results with:limitations
  93. [93]
  94. [94]
    13 OpenPGP Must-Know Tips for Secure Key Management
    Jun 6, 2024 · Note that, while your email body might be protected by end-to-end encryption, the subject line and message headers are generally not encrypted.Missing: limitations metadata
  95. [95]
    PGP - The Web of Trust is Dead - inversegravity.net
    Aug 6, 2019 · The Web of Trust is practically dead and can be considered a failure. The question arises on how the trust in PGP keys can be restored.
  96. [96]
    Is the PGP Web of Trust / Keyserver infrastructure permanently ...
    Sep 29, 2014 · You can't publish a key without at least one UID, therefore you need the private key to publish the public one on an OpenPGP compatible ...What is the web of trust? - Information Security Stack ExchangeWhy can't PGP/GPG Web-of-Trust be automated?More results from security.stackexchange.com
  97. [97]
    Encrypted Private Email Recommendations - Privacy Guides
    Read more about email metadata. OpenPGP also does not support forward secrecy, which means if the private key of either you or the message recipient is ever ...Financial Services · Email Aliasing · Email Clients · Email Security
  98. [98]
    PGP: 'Serious' flaw found in secure email tech - BBC
    May 14, 2018 · PGP: 'Serious' flaw found in secure email tech ... A widely used method of encrypting emails has been found to suffer from a serious vulnerability ...
  99. [99]
    What's the matter with PGP? – A Few Thoughts on Cryptographic ...
    Aug 13, 2014 · PGP is fundamentally broken, with large, difficult to manage keys, poor key management, and a lack of forward secrecy.Missing: achievements | Show results with:achievements
  100. [100]
    Cryptographic Key Management - the Risks and Mitigation
    Key Management Risks - What dangers await? · Weak keys · Incorrect use of keys · Re-use of keys · Non-rotation of keys · Inappropriate storage of keys · Inadequate ...Missing: PGP | Show results with:PGP
  101. [101]
    How safe is GPG password protection for private keys? - Reddit
    Mar 28, 2016 · If your private key is NOT password protected, then an attacker only has to steal it and they will have access to all of your encrypted data, ...
  102. [102]
    Bitcoin developer claims loss of $3.3 million after PGP exploit
    Jan 2, 2023 · Bitcoin core developer Luke Dashjr claimed his wallet was hacked due to a Pretty Good Privacy (PGP) key compromise.
  103. [103]
    How do revocation certificates work in PGP?
    Apr 28, 2015 · It only says anybody with access to the private key has revoked it, you cannot distinguish between the real owner and an attacker that got hold ...Missing: challenges | Show results with:challenges
  104. [104]
    Revocation in OpenPGP - IETF
    Aug 16, 2023 · This document provides clarifying guidance on how OpenPGP revocation works, documents outstanding problems, and introduces a new mechanism for delegated ...Missing: PGP | Show results with:PGP
  105. [105]
    About - OpenPGP
    Sep 29, 2024 · OpenPGP is a non-proprietary format for authenticating or encrypting data, using public key cryptography. It is based on the original PGP (Pretty Good Privacy) ...History · Standard · Documentation · Stateless OpenPGP
  106. [106]
    Crypto Wars – Darknet Diaries
    Phil Zimmermann, a software engineer, developed a much more secure way of communicating called PGP which stood for Pretty Good Privacy. He helped human ...
  107. [107]
    [PDF] Obstacles to the Adoption of Secure Communication Tools
    The main UI challenge for E2E-encrypted communication tools is believed to be providing assurance that a user is truly communicating with the intended party ( ...
  108. [108]
    Ask HN: Why is PGP not used widely? - Hacker News
    Nov 3, 2013 · 1) Most people haven't had a need for it. Till now. 2) Encryption is difficult concept for even technical people. 3) Commercial PGP costs too ...
  109. [109]
    [PDF] Obstacles to the Adoption of Secure Communication Tools
    They found that, in addition to usability issues, incomplete threat models, misaligned incentives, and lack of understanding of the email architecture are key ...
  110. [110]
    [PDF] The Evolution of Email Encryption: From PGP to Modern Standards
    Moreover, regulatory and legal barriers, particularly in regions with stringent government surveillance policies, further complicate the adoption of encryption.
  111. [111]
    [PDF] The Motivated Can Encrypt (Even with PGP)
    Ac- tivists, journalists and lawyers have a need to use secure communication technology, specifically email, but often face obstacles in adoption [25]. E2EE ...
  112. [112]
    OpenPGP - OpenPGP
    OpenPGP was standardized in 1997 and since then continuously improved. As far as we know, intelligence organizations aren't able to break it. Learn More.Email Encryption · About · Community/ConsultingMissing: 5 | Show results with:5
  113. [113]
    Complete PGP Encryption Guide 2025 - The CyberSec Guru
    Sep 11, 2025 · PGP fundamentals and implementation: We will delve deep into the world of Pretty Good Privacy, the gold standard for email encryption for over ...
  114. [114]
    What To Use Instead of PGP - Dhole Moments
    Nov 15, 2024 · Instead of PGP, use Sigstore for signing, SSH signatures for Git, Magic Wormhole for file transfer, age for file encryption, and Signal for ...
  115. [115]
    Is PGP still relevant in the modern web? | Michael Soh posted on the ...
    Sep 12, 2025 · Today, encryption in phones and messaging apps is “good enough” against those threats. The real danger now often comes from your own government.
  116. [116]
    10 Best Secure Email Providers in 2025: Your Complete Guide
    Sep 15, 2025 · ProtonMail offers zero-access encryption that ensures all emails and attachments remain fully encrypted on their servers. Based in Switzerland, ...
  117. [117]
    10 Best Encrypted Email Services (2025 Test Results) - CyberInsider
    Tuta Mail doesn't rely on PGP and instead combines AES and RSA encryption. By doing this, they are able to encrypt both the email address and the subject line ...10 Best Encrypted Email... · Top Encrypted Email Services · 3. Mailfence...<|separator|>
  118. [118]
    Recommended Encryption Software: VeraCrypt, Cryptomator, and ...
    GNU Privacy Guard ... GnuPG is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF ...