Fact-checked by Grok 2 weeks ago

Web of trust

A web of trust is a decentralized cryptographic model for verifying the authenticity of public keys and their association with identities, serving as an alternative to centralized public key infrastructures (PKIs) that rely on trusted authorities. Introduced by in the 1992 manual for (PGP) version 2.0, it enables users to build mutual trust through a network of endorsements, where individuals sign each other's keys to vouch for their validity, forming interconnected "webs" of confidence that propagate trust across the system. In practice, the model operates via a of keys and signatures, with users assigning trust levels—such as marginal or complete—to key signers (often called "introducers") whose certifications contribute to overall key validity scores, calculated through weighted algorithms that balance multiple endorsements to mitigate risks like or . This approach, implemented in PGP, (GnuPG), and other OpenPGP-compatible tools, fosters fault-tolerant, validation without single points of failure, though it requires active user participation in key exchanges and signature verification at events like key-signing parties. Beyond its origins in email encryption, the web of trust concept has influenced broader decentralized systems, including blockchain-based identity verification and reputation networks, where participants rate and link credentials to establish collective assurance in digital interactions. Despite its strengths in resilience and user control, challenges persist, such as scalability in large networks and the subjective nature of trust assignments, which can lead to uneven validation reliability compared to hierarchical PKIs.

Fundamentals

Definition and Core Concepts

The web of trust is a decentralized trust model in designed to validate the of public keys without relying on central authorities. In this system, users mutually certify each other's public keys through digital signatures, forming a graph-like of interconnected trust relationships that allows for indirect validation via chains of endorsements. This approach originated as a means to avoid single points of failure in key validation, emphasizing user-vouched where individuals assume responsibility for confirming the legitimacy of keys they encounter. At its core, the web of trust builds on , which utilizes asymmetric key pairs consisting of a public key for or verification and a corresponding private key for decryption or signing. Digital signatures, generated using the signer's private key and verifiable with their public key, serve as the mechanism for certifying key ownership and binding identities, such as user IDs, to public keys. Unlike hierarchical models that depend on a root certification authority to issue and revoke certificates in a top-down structure, the web of trust operates on principles of , enabling endorsements where trust is distributed across a of users who select their own trusted signers. In applications like , exemplified by systems such as (PGP), the web of trust facilitates probabilistic trust assessment based on the length and strength of signature paths connecting a user's key to those they directly trust. For instance, a key may be deemed valid if endorsed by multiple trusted intermediaries, with trust levels quantified to reflect degrees of confidence rather than binary certainty, thereby supporting without centralized oversight.

Historical Background

The web of trust model originated in 1992 with the release of (PGP) version 2.0 by , who designed it as a decentralized alternative to centralized certificate authorities for verifying public keys in . Zimmermann created PGP to empower individuals with for private communication, bypassing potential government and controls on encryption software during the early 1990s. This approach was rooted in privacy advocacy amid the "," a period of U.S. government efforts to restrict cryptographic tools, including classifying them as munitions under laws, which motivated PGP's release as free software in 1991 despite legal risks to Zimmermann. PGP gained prominence following its initial distribution on the in , with the web of trust model contributing to its adoption starting from in , which violated U.S. restrictions but spurred widespread adoption among activists, journalists, and technologists seeking secure . The model evolved through community-driven refinements, with PGP in formalizing key signing and trust networks to address verification challenges in key exchanges. By , the open-source GnuPG () implemented the web of trust as a compatible alternative to proprietary PGP, broadening accessibility and fostering its use in and open-source ecosystems. The web of trust was standardized in the OpenPGP protocol through RFC 4880, published by the (IETF) in 2007, which defined its trust signatures and calculation mechanisms for interoperable . As of 2025, the IETF continues to enhance OpenPGP via ongoing drafts, such as those addressing modern key formats and integration to adapt the web of trust to contemporary threats.

Operational Mechanism

Key Signing and Distribution

In a web of trust network, the process begins with users generating asymmetric key pairs, typically using tools like GnuPG, which produce a private key for signing and decryption and a public key for verification and encryption. Public keys are then exchanged through secure channels, such as direct in-person transfers, , or public keyservers, to ensure authenticity before any signing occurs. This exchange establishes the foundation for trust by allowing users to verify the associated with each key. Key signing involves a ceremony where a user cryptographically signs another user's public using their own private key, affirming the key's ownership and the signer's confidence in the keyholder's . These ceremonies can be conducted in-person to minimize risks of man-in-the-middle attacks, or remotely via verified video calls or trusted intermediaries, though in-person methods are preferred for higher assurance. In systems like PGP, signatures include certification levels such as "full " for complete identity validation or "marginal " for partial confidence, which influence how the signature propagates within the network. Once created, signatures are distributed by uploading the signed public key bundles to decentralized keyservers, such as keys.openpgp.org or keyserver.ubuntu.com, which synchronize and make them publicly queryable for other users to download and verify. If a key compromise is suspected, users can revoke signatures by issuing a , which is similarly uploaded to keyservers to invalidate the affected signatures across the network. A prominent real-world practice for initiating and expanding these networks is key signing parties held at technical conferences, such as the , where attendees verify identities through multiple proofs before mutually signing keys in a .

Trust Model and Calculation

The model in the Web of Trust, as implemented in PGP and subsequent OpenPGP-compatible systems like GnuPG, centers on user-assigned owner values that enable the propagation of across a decentralized of key certifications. Owner quantifies a user's confidence in a particular 's owner to accurately vouch for the binding of other keys, serving as the primary input for validity computations. These assignments are manual and local to each user's keyring, with discrete levels including "unknown" (no opinion formed), "untrusted" (explicitly not reliable for certifications), "marginal" (limited reliability), and "full" (high reliability for vouching). Ultimate is reserved for the user's own keys or explicitly designated roots, providing the starting point for chains. This model contrasts with centralized hierarchies by distributing authority among participants, relying on collective signatures to build confidence in key authenticity. Key validity is computed algorithmically by aggregating contributions from valid signatures on the or its user IDs, weighted by the owner assigned to the signing keys and their own computed validity. The process begins with ultimate trusted keys and recursively evaluates signatures, ensuring only valid signers contribute. In practice, GnuPG implements this via configurable thresholds, where full validity requires at least one complete contribution (from a fully trusted valid signer) or three marginal contributions (from marginally trusted valid signers), controlled by parameters like completes-needed (default 1) and marginals-needed (default 3). Trust incorporates lengths to model the dilution of confidence over distance in the , with levels indicating the minimum from an ultimate trusted . A direct (level 0) from an ultimate provides maximal strength, while a two-hop (level 1) requires the intermediate to be fully valid for . Subsequent levels (up to a maximum depth of 5) weaken the contribution, preventing unbounded chains and simulating real-world decay. The shortest length is prioritized in calculations to maximize validity where multiple routes exist. A defining feature of the model is its recursive trust propagation, wherein the validity of a target key depends not only on direct signatures but also on the independently computed validity of those signers, creating interdependencies across the network. The algorithm resolves this through an iterative, breadth-first traversal starting from ultimate keys, updating validities in until no changes occur or the depth limit is hit. This ensures that weak or invalid links do not propagate false trust, with only fully valid intermediate keys passing marginal or full contributions forward. As a result, a key's overall trustworthiness emerges from the collective strength of its certification paths, emphasizing robust, interconnected endorsements over isolated signatures.

Comparison to Public Key Infrastructure

Structural Differences

The web of trust model, as implemented in PGP and OpenPGP systems, features a decentralized architecture that constructs a graph of user-generated signatures on public keys, enabling direct validation among participants without any central root authorities. This structure relies on individual users performing key signing to link identities to keys, forming interconnected trust paths based on mutual endorsements. In stark contrast, traditional (PKI) adopts a hierarchical framework, where designated certificate authorities (CAs) issue, validate, and revoke digital certificates in a linear chain that traces back to a trusted root CA, ensuring top-down authority delegation. Central to these architectures are differing approaches to trust evaluation: the web of trust employs subjective trust, where users personally assign levels of confidence to signers and propagate trust through signature networks, while PKI utilizes objective validation enforced by CAs via standardized protocols such as Certificate Revocation Lists (CRLs) and the (OCSP) to confirm certificate status. Unlike PKI's dependence on centralized , which introduces vulnerabilities to compromise at higher levels—as demonstrated by the 2011 DigiNotar incident where intruders exploited the to generate over 500 fraudulent certificates for domains like google.com—the web of trust distributes validation across users, eliminating such singular points of authority failure.

Advantages and Limitations Relative to PKI

The web of trust (WoT) model offers several advantages over traditional (PKI) systems, primarily due to its decentralized architecture. Unlike PKI, which relies on a hierarchical structure of (CAs) that can introduce single points of failure if compromised, WoT distributes across a of user endorsements, enhancing against centralized attacks or disruptions. This distributed nature eliminates the risk of a single CA compromise undermining the entire system, as seen in historical PKI incidents where root CA breaches affected widespread trust. Additionally, WoT empowers users with direct control over decisions, allowing individuals to select and endorse keys based on personal rather than deferring to commercial CAs, thereby avoiding dependencies on for-profit entities that may prioritize interests over . Despite these strengths, WoT faces notable limitations relative to PKI, particularly in adoption and security dynamics. Building trust in WoT requires significant manual effort, such as attending key signing events or verifying identities in person, which slows widespread adoption compared to PKI's automated certificate issuance processes. This hands-on approach contrasts with PKI's streamlined validation through pre-trusted roots, making WoT less user-friendly for non-experts and contributing to lower participation rates. Furthermore, WoT's lack of a centralized heightens to Sybil attacks, where adversaries can flood the network with fake identities to manipulate trust paths, a risk mitigated in PKI by strict CA vetting. Scalability also poses a challenge, as WoT networks tend to fragment into small, isolated components unsuitable for large populations, whereas PKI supports global deployment through its hierarchical efficiency. In practical use cases, WoT proves more effective for small, trusted communities, such as activist groups where members can physically meet to verify and sign keys, fostering tight-knit trust without external oversight. Conversely, PKI excels in enterprise environments requiring rapid, large-scale authentication, like corporate networks or web services, where automation and centralized management ensure consistent scalability. A key insight from 2010s analyses of the PGP WoT reveals that trust paths frequently exceed 3 hops, with average shortest paths often reaching 5 or more in major components, which diminishes effective validity by increasing the potential for error propagation along extended chains.

Challenges and Criticisms

Key Management Issues

In the web of trust model employed by systems like PGP and OpenPGP, managing private keys poses significant challenges due to the decentralized nature of key handling, where users bear full responsibility for without centralized oversight. Private key loss is particularly problematic, as it renders the corresponding public key unusable for decryption of past or future messages and prevents the creation of new signatures, necessitating immediate to maintain . Without proper backups stored on secure, offline media such as write-protected , is impossible, forcing users to generate a new key pair and rebuild their through re-signing by contacts, which can disrupt established relationships. Revocation processes further complicate , requiring users to generate and securely store a at the time of creation using tools like GnuPG's --gen-revoke command. This , once published to keyservers or distributed directly, marks the as invalid, but relies on voluntary synchronization among decentralized keyservers, which can delay or fail to reach all users in the network. Challenges arise from potential man-in-the-middle attacks where adversaries intercept and suppress signatures during , leaving compromised keys active in some paths; studies indicate that only about 4.7% of primary keys in large PGP datasets were properly revoked as of , exacerbating risks from unaddressed compromises. Ensuring authenticity during signing events demands rigorous of key to thwart man-in-the-middle attacks, where an attacker could substitute a fraudulent public key. Users must compare the full 40-character —obtained via commands like --fingerprint in GnuPG—directly with the key owner, often in person or through secure channels, before affixing a trust ; failure to do so can propagate invalid keys through the web of . This process, typically conducted at key signing ceremonies, underscores the manual effort required to bind identities securely. Unlike systems that incorporate for recovery, the web of trust provides no built-in mechanisms for private key restoration, placing the entire burden of backups, passphrase management, and error prevention on individual users, which heightens the risk of irreversible or breaches from human mistakes such as accidental deletion or forgotten s.

Scalability and Usability Problems

The web of trust model in systems like PGP faces significant scalability challenges as the number of users and keys grows, leading to exponentially larger trust graphs that increase the computational cost of full key validation. Calculating trust often requires evaluating shortest paths or multiple trust chains across the network, which becomes resource-intensive in large-scale deployments; for instance, empirical analysis of the OpenPGP network revealed an average shortest path length of approximately 6 in the largest strongly connected component, with validation limited by tools like GnuPG to a maximum of 5 hops to manage this overhead. Additionally, keyservers, essential for key distribution, have suffered from overload and abuse, exemplified by the SKS keyserver network's decommissioning in 2021 due to spamming attacks like CVE-2019-13050, which flooded the system with junk keys and caused synchronization failures across the pool. These issues highlight how the decentralized yet interconnected infrastructure struggles to handle growth without centralized bottlenecks. Usability problems further exacerbate adoption barriers, with the web of trust presenting a steep for non-experts due to complex tasks such as signing, exporting, and verifying chains. A seminal of PGP 5.0 found that only one-third of novice participants could successfully encrypt and sign messages within 90 minutes, often misunderstanding public key concepts and mishandling key acquisition, underscoring the need for specialized security education that most users lack. Low participation rates compound this, resulting in sparse trust graphs where average in-degrees are approximately 1.6 overall, limiting the formation of robust, redundant paths and leaving many keys isolated or reliant on fragile single connections. Criticisms in the 2020s have intensified, with discussions on platforms like mailing lists declaring the web of trust "broken" due to keyserver practices that strip non-exportable signatures—local trust indicators not intended for public propagation—leading to incomplete trust information upon retrieval and undermining the model's integrity. Empirical data from real PGP networks shows average trust path lengths of 4 to 7 hops, but these are often deemed unreliable owing to low node degrees (e.g., one-third of nodes with out-degree under 3) that provide minimal redundancy, increasing vulnerability to compromise along the chain.

Advanced Topics

Strong Sets and Network Analysis

In the context of the web of trust (WoT), strong sets are defined as the strongly connected components (SCCs) within the representation of the network, where each SCC forms a maximal of keys such that there exists a between every pair of keys in both directions. This mutual reachability ensures that keys within a strong set can potentially verify one another's through chains of signatures, distinguishing them from weakly connected structures. The computation of strong sets involves standard algorithms applied to the WoT , where nodes represent public keys and directed edges denote signature relationships from the signing key to the signed key. Algorithms such as Tarjan's or Kosaraju's, which rely on (DFS) traversals to identify SCCs in linear time relative to the 's size, are typically employed; for instance, analysis of the OpenPGP WoT dataset from 2009 identified 240,283 SCCs among 325,410 keys using such methods. These algorithms first perform a DFS on the to obtain a topological ordering and then traverse the to group mutually reachable nodes into components. In practice, only valid, non-revoked, and non-expired keys and signatures are considered to ensure relevance. Network analysis treats the WoT as a to uncover its structural properties, with strong sets serving as fundamental clusters that reveal interconnected communities of trusted keys. Isolated nodes, often comprising single-key SCCs, represent keys with no incoming or outgoing signatures, while larger clusters indicate dense signing activity; for example, over 100,000 such isolated components were found in the 2009 OpenPGP dataset, highlighting fragmentation. This graph-theoretic lens also identifies the largest strong set (LSCC), which in analyses from 2009 contained approximately 45,000 keys (14% of the total) and exhibited a high edge-to-node of 9.85, far exceeding the network average of 2.51. Applications of strong sets include evaluating the overall health of the WoT by measuring the proportion of keys in robust, interconnected components, as a well-meshed ideally approaches a single giant SCC for broad mutual verification. They also aid in detecting weak points, such as peripheral or isolated clusters that limit propagation and expose vulnerabilities to targeted attacks, with smaller SCCs (most under 117 keys as of a 2015 analysis) underscoring uneven participation. Updated analyses as of 2025 remain limited, but the WoT's core structural challenges appear to persist. In PGP systems, strong sets uniquely enable users to assess whether a given key belongs to a resilient component, facilitating decisions on reliability within the default five-hop path limit of tools like GnuPG.

Metrics like Mean Shortest Distance

In web of trust networks, the mean shortest distance (MSD) measures the average length of the shortest paths between pairs of trusted keys, providing insight into the overall efficiency of trust propagation across the graph. It is computed using the formula \text{MSD} = \frac{\sum_{i \neq j} d(i,j)}{|V|(|V|-1)}, where d(i,j) denotes the length of the shortest path between nodes (keys) i and j, and |V| is the number of nodes in the component under analysis (typically excluding disconnected pairs). This metric, rooted in graph theory, quantifies how closely interconnected the trust relationships are, with lower values facilitating faster and more reliable key validation. An exceeding 3 often signals suboptimal connectivity, as longer paths can surpass the limited hop depths (e.g., 5 in GnuPG implementations) used for trust validity, potentially weakening the network's ability to confirm key authenticity without excessive indirection. In analyses of PGP keyrings from the 2000s and early , MSD values around 6 were common, underscoring the sparse structure of these networks where many keys remain isolated or require extended chains for linkage. Complementing MSD, the graph diameter captures the maximum shortest path length between any two keys, representing the longest possible trust chain and highlighting extremes in network reach. For instance, a diameter of 36 was observed in the largest strongly connected component of an OpenPGP keyring snapshot, illustrating how sparsity can lead to inefficient global trust dissemination despite local strengths. The clustering coefficient further assesses local trust density by calculating the proportion of connected neighbor pairs for each key, averaged across the graph; values closer to 1 indicate tight-knit communities. In the same OpenPGP analysis, a coefficient of 0.46 revealed moderate clustering, where roughly half of adjacent keys share mutual connections, promoting reliable short-range trust but revealing gaps in broader cohesion. These metrics collectively emphasize the trade-offs in web of trust designs, balancing decentralization with the need for concise paths to sustain usability.

Modern Implementations

In PGP and OpenPGP Systems

The web of trust was originally designed by for (PGP) version 2.0, released in 1992, as a decentralized mechanism for users to validate public keys through a network of certifications without relying on central authorities. In this model, users assign trust flags to keys in their local keyring, such as "unknown," "marginal," "full," or "ultimate," which determine how signatures from those keys contribute to overall key validity calculations. These trust parameters are stored in the keyring database, enabling PGP to compute validity scores based on the depth and quantity of trusted signatures forming chains back to the user's own fully trusted keys. The OpenPGP standard, which formalized PGP's protocols, integrates the web of trust through certification signatures and trust-related subpackets as specified in 9580. Certification signatures (types 0x10 generic, 0x11 persona, 0x12 casual, and 0x13 positive) bind user IDs to public keys, while the Signature subpacket (type 5) allows signers to assert a level (0-2) and amount (0-255) for introducer keys, facilitating delegated in the network. Packets (type 12) provide implementation-specific storage for specifications within keyrings, though they are not typically exported. As of November 2025, IETF draft-gallagher-openpgp-signatures-02 proposes enhancements to handling, including clarifications on subpacket usage and protections against misuse, to strengthen web of trust operations in modern OpenPGP implementations. In practice, the web of trust is managed through GnuPG, the reference OpenPGP implementation, where users employ commands like --list-sigs to display signatures on keys and --edit-key to sign keys, set owner trust, or create trust signatures interactively. For email integration, provides built-in OpenPGP support since version 78 (2020), but this uses a simplified key trust model without full web of trust validation based on certification paths. Users requiring WoT for email verification typically integrate GnuPG directly with compatible clients or use standalone tools. This protocol-level support persists in OpenPGP ecosystems despite the rise of S/MIME's centralized certificate authorities, as the decentralized model appeals to privacy-focused users and communities requiring peer-validated trust without intermediaries.

Assisting Tools and Developments

Several graphical frontends for GnuPG facilitate the management of OpenPGP keys and the web of trust model by providing user-friendly interfaces for , signing, and trust assessment. Kleopatra, developed by the project, serves as a certificate manager that supports OpenPGP operations, including visualizing key networks and assigning trust levels to signatures within the web of trust. Similarly, keyserver bridges enhance connectivity to public key repositories; the HKPS protocol, defined in an IETF draft, enables secure HTTP-based access to OpenPGP keyservers over TLS, improving the reliability of key discovery and distribution in decentralized trust environments. Recent developments in 2025 have focused on modernizing OpenPGP tooling to better support web of trust functionalities. The (SOP), outlined in an IETF draft (expired November 2025), introduces a generic, stateless CLI for handling OpenPGP messages and certificates without persistent state, allowing easier integration into automated workflows for trust validation and . Efforts to integrate OpenPGP elements into modern applications continue, aiming to extend web of trust principles to contemporary platforms. Assisting solutions have emerged to automate aspects of web of trust evaluation, reducing manual overhead in trust propagation. Automated trust calculators, implemented in libraries like Sequoia Web of Trust, compute authentication scores for user ID bindings based on signature paths and assigned trust levels, providing quantitative insights into key validity. Blockchain-inspired decentralized identity systems are experimenting with web of trust models to enhance trust rating in and frameworks, leveraging distributed ledgers for verifiable endorsements while maintaining decentralized validation. The Sequoia-PGP project, active since 2022, has introduced specialized tools for web of trust analysis, including a library and CLI utilities that enable visual inspection of trust networks and automated evidence incorporation for key authentication. Ongoing discussions address post-quantum adaptations, with an IETF draft proposing extensions to OpenPGP for quantum-resistant public-key algorithms to preserve the web of trust's resilience against future cryptographic threats (latest version 14, November 2025).

References

  1. [1]
    web-of-trust | KERISSE.org - GitHub Pages
    Apr 2, 2024 · A web of trust is a concept used in PGP + , GnuPG + , and other OpenPGP -compatible systems to establish the authenticity of the binding between a public key ...
  2. [2]
    PGP User's Guide, Volume I: Essential Topics
    Software and documentation (c) Copyright 1990-1994 Philip Zimmermann. All rights reserved. For information on PGP licensing, distribution, copyrights, patents, ...
  3. [3]
    [PDF] An Introduction to Cryptography - Stony Brook Computer Science
    cryptography and PGP as written by Phil Zimmermann. Why I wrote PGP ... Web of Trust a distributed trust model used by PGP to validate the ownership of ...<|control11|><|separator|>
  4. [4]
    [PDF] Cryptography for the Internet - Philip Zimmermann
    He is a software engineer with more than 20 years of experience in cryptography, data commu- nications and real-time embedded systems.
  5. [5]
    RFC 4880 - OpenPGP Message Format - IETF Datatracker
    It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network.Missing: web | Show results with:web
  6. [6]
    [PDF] Using the GNU Privacy Guard
    This is the GNU Privacy Guard manual, covering installation, invoking GPG-AGENT, GPG, GPGSM, and other tools.Missing: formula | Show results with:formula
  7. [7]
    Validating other keys on your public keyring - GnuPG
    GnuPG uses the "web of trust" where keys are validated by trusted people. A key is valid if signed by enough valid keys, including one fully trusted or three ...Missing: calculation | Show results with:calculation
  8. [8]
    [PDF] Trust Model in PGP and X.509 Standard PKI - GIAC Certifications
    The PKI trust model is based on Certificate Authorities that generate and manage certificates, whil e the trust model of PGP depends on the trust level that ...
  9. [9]
    [PDF] Operation Black Tulip: Certificate authorities lose authority - ENISA
    DigiNotar, a digital certificate authority (CA), recently suffered a cyber-attack which led to its bankruptcy. In the attack false certificates were created ...
  10. [10]
    [PDF] Public Key Infrastructure (PKI) and Pretty Good Privacy (PGP)
    Alternative: “Web of Trust”. ➢Used in PGP (Pretty Good Privacy). ➢Instead of a single root certificate authority, each person has a set of keys they “trust”.
  11. [11]
    [PDF] BlockPGP: A Blockchain-based Framework for PGP Key Servers
    Thus most vulnerable point may be infrastructure of PKI's Certificate Authorities being central point of failure. ... itself as Web-of-Trust system, in reality it ...
  12. [12]
    [PDF] User Attitudes toward Security and Usability Tradeoffs for Key ...
    Jun 24, 2016 · In a web of trust, users can sign each others' keys to endorse their authenticity, and can choose to accept keys that come with signatures from ...
  13. [13]
    [PDF] The Sybil Attack - The Free Haven Project
    This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource ...
  14. [14]
    [PDF] Trust-PGP-final-proceedings-STAST - King's Research Portal
    algorithm used to generate the key, the key length, creation and expiry ... Abdul-Rahman, A.: The PGP Trust Model. EDI-Forum: the journal of Electronic.
  15. [15]
    Investigating the OpenPGP Web of Trust - SpringerLink
    We present results of a thorough analysis of the OpenPGP Web of Trust. We conducted our analysis on a recent data set with a focus on determining properties ...
  16. [16]
    The GNU Privacy Handbook - GnuPG
    Trust in the key's owner and the key's validity are indicated to the right when the key is displayed. Trust in the owner is displayed first and the key's ...Missing: calculated | Show results with:calculated<|control11|><|separator|>
  17. [17]
    [PDF] Key Distribution in PGP - Koc Lab
    Problems of Web of Trust. While PGP's trust model is unaffected by such things as company failures, it has its own set of problems. In this Section, I will ...
  18. [18]
  19. [19]
    Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear ...
    Aug 7, 2025 · Studies of the PGP WoT have found that the vast majority of keys are connected in isolated groups of relatively small size (about 100 keys or ...
  20. [20]
    [PDF] Investigating the OpenPGP Web of Trust
    This results in a so-called Web of Trust (WoT). In this paper, we describe the results of a thorough investigation of the Web of Trust as established by OpenPGP ...
  21. [21]
    PGP Web of Trust - seems broken-Apache Mail Archives
    Jan 14, 2025 · **SKS Keyserver Network (Decommissioned/Deprecated):** The SKS keyserver network suffered from scalability and abuse issues (e.g., spamming keys ...
  22. [22]
    [PDF] Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
    We conclude that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting.Missing: curve low
  23. [23]
    Trust Transitivity in Social Networks | PLOS One - Research journals
    Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. ... for sparse graphs. 1.1 ...
  24. [24]
    [PDF] Attack-resistant trust metrics for public key certification
    Here, “shortest path” is the trust metric that simply measures the length of the shortest chain from client to target. “Maurer” is a simplified version of the ...
  25. [25]
    [PDF] an Analysis of the PGP Certificate Graph
    The clustering coefficient of a graph G is then defined as the mean of the clustering coefficients of all the vertices in G. The characteristic length of a ...
  26. [26]
    PGP User's Guide, Volume II: Special Topics
    This volume II of the PGP User's Guide covers advanced topics about PGP that were not covered in the "PGP User's Guide, Volume I: Essential Topics".
  27. [27]
    RFC 9580: OpenPGP
    OpenPGP provides encryption with public key or symmetric cryptographic algorithms, digital signatures, compression, and key management.
  28. [28]
  29. [29]
  30. [30]
  31. [31]
    OpenPGP Key Management (Using the GNU Privacy Guard)
    The trust value is displayed with the primary key: "trust" is the assigned owner trust and "validity" is the calculated validity of the key.Missing: web | Show results with:web
  32. [32]
    [PDF] The Enigmail Handbook 1.0.0
    This handbook covers all aspects of using Enigmail. It consists of two parts. The first part will show you how to setup and use Enigmail, the second part ...
  33. [33]
    Usability of End-to-End Encryption in E-Mail Communication - PMC
    Jul 14, 2021 · This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and ...Missing: learning | Show results with:learning
  34. [34]
    Kleopatra - KDE Applications
    Kleopatra is an open-source certificate manager and graphical front-end for cryptographic services, primarily designed to handle OpenPGP and S/MIME (X.509) ...
  35. [35]
    OpenPGP HTTP Keyserver Protocol - IETF
    Mar 4, 2024 · This document specifies a series of conventions to implement an OpenPGP keyserver using the Hypertext Transfer Protocol (HTTP).
  36. [36]
    Stateless OpenPGP Command Line Interface - IETF Datatracker
    May 8, 2025 · This document defines a generic stateless command-line interface for dealing with OpenPGP messages, certificates, and secret key material, known as sop.
  37. [37]
    OpenPGP Web of Trust - GitLab
    Feb 3, 2022 · The web of trust is a flexible, decentralized trust model created for PGP. PGP and GnuPG include implementations of the web of trust, ...Table of Contents · Introduction · Problem Statement · OpenPGP's Authentication...
  38. [38]
  39. [39]
    Post-Quantum Cryptography in OpenPGP - IETF
    Mar 25, 2023 · This document defines a post-quantum public-key algorithm extension for the OpenPGP protocol. Given the generally assumed threat of a cryptographically ...