PGPWin Users Guide
PGPWin Users Guide
PGP® Desktop
for Windows
User’s Guide
Version Information
PGP Desktop for Windows User’s Guide, version 8.0.3. Released October, 2003.
Copyright Information
Copyright © 1991–2003 by PGP Corporation. All Rights Reserved. No part of this document can be
reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, with-
out the express written permission of PGP Corporation.
Trademark Information
PGP and Pretty Good Privacy are registered trademarks, and the PGP logo is a trademark, of PGP Corpo-
ration in the U.S. and other countries. IDEA is a trademark of Ascom Tech AG. All other registered and
unregistered trademarks in this document are the sole property of their respective owners.
Acknowledgments
The compression code in PGP Desktop is by Mark Adler and Jean-Loup Gailly, used with permission
from the free Info-ZIP implementation.
Export Information
Export of this software and documentation may be subject to compliance with the rules and regulations
promulgated from time to time by the Bureau of Export Administration, United States Department of
Commerce, which restrict the export and re-export of certain products and technical data.
Limitations
The software provided with this documentation is licensed to you for your individual use under the
terms of the End User License Agreement provided with the software. The information in this docu-
ment is subject to change without notice. PGP Corporation does not warrant that the information meets
your requirements or that the information is free of errors. The information may include technical inaccu-
racies or typographical errors. Changes may be made to the information and incorporated in new edi-
tions of this document, if and when made available by PGP Corporation.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Who should read this User’s Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
This User’s Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Recommended readings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
iv Table of Contents
User’s Guide PGP Desktop
Table of Contents v
PGP Desktop User’s Guide
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
vi Table of Contents
Introduction
If you are new to cryptography and would like an overview of the terminology and
concepts in PGP Desktop, please refer to An Introduction to Cryptography (it was
put onto your computer when you installed PGP Desktop 8.0).
Licensing
PGP Desktop uses a license number system to determine what features will be
active on your computer. Following is a brief description of that system. For com-
plete information and purchase options, go to https://store.pgp.com.
Licensing options
When you start PGP Desktop for the first time after installation, the PGP License
screen appears (it’s also available via the License command on the PGP menu).
You have two options: you can enter your PGP Desktop license information (there
are two ways of doing this, described below) or you can use the PGP software
unlicensed for non-commercial use only; this is called PGP Freeware.
If you choose the second option, PGP Freeware (and you are legally permitted to
do so under the end-user license agreement for non-commercial use), then you
will be able to use PGPmail, PGPkeys, and PGPtray. The email plugins and
PGPdisk will not be available.
Introduction 7
PGP 8.0 User’s Guide
If you use a licensed version of PGP, the functionality that will be available
depends on the type of license you purchased: Personal, Desktop, or Enterprise.
For complete information about PGP license and purchase options, go to https://
store.pgp.com.
• If you are unable to Authorize automatically using the above method and you
have been sent a License Authorization from PGP Customer Service, click the
triangle adjacent to Click here to Authorize manually, paste the license
authorization block into the box, then click Authorize.
8 Introduction
User’s Guide PGP 8.0
Introduction 9
PGP 8.0 User’s Guide
Recommended readings
This section identifies Web sites, books, and periodicals about the history, techni-
cal aspects, and politics of cryptography, as well as trusted PGP download sites.
10 Introduction
User’s Guide PGP 8.0
Politics of cryptography
Web sites
• www.epic.org, Electronic Privacy Information Center.
• www.crypto.org, Internet Privacy Coalition.
• www.eff.org, Electronic Frontier Foundation.
• www.privacy.org, privacy.org. Great information resource about privacy
issues.
• www.cdt.org, Center for Democracy and Technology.
• www.philzimmermann.com, Phil Zimmermann’s home page, his Senate testi-
mony, and so on.
Books
• Privacy on the Line: The Politics of Wiretapping and Encryption, Whitfield Dif-
fie and Susan Landau, The MIT Press, 1998, ISBN 0-262-04167-7. This book is
a discussion of the history and policy surrounding cryptography and communi-
cations security. It is an excellent read, even for beginners and non-technical
people. Includes information that even a lot of experts don’t know.
• Crypto: How the Code Rebels Beat the Government--Saving Privacy in the
Digital Age, Steven Levy, Penguin USA, 2001; ISBN 0140244328.
Network security
Books
• Building Internet Firewalls, Elizabeth D. Zwicky, D. Brent Chapman, Simon
Cooper, and Deborah Russell (Editor), O’Reilly & Associates, Inc., 2000; ISBN:
1565928717. This book is a practical guide to designing, building, and main-
taining firewalls.
Introduction 11
PGP 8.0 User’s Guide
Symbols
Notes, Cautions, and Warnings are used in the following ways.A
Notes are extra, but important, information.
A Note adds important information, but you could still use the product if you didn’t
have that information.
A Caution tells you about a situation with the potential for loss of data or minor dam-
age to equipment. Special attention should be paid to Cautions.
12 Introduction
1 PGP Basics
This chapter introduces you to PGP (Pretty Good Privacy) Desktop software.
Overview
PGP Desktop is a tool for keeping your data safe. It encrypts (scrambles) your
data so that if an unauthorized person gets hold of it, they can’t make heads or
tails of it. Naturally, when you want to use it, it gets changed back to normal
(decrypted).
For lots of information about encryption, see An Introduction to Cryptography,
which was installed on your computer when PGP was installed.
(Technical note: your public and private keys are mathematically related, but
there’s no way to figure out someone’s private key if you just have their public
key.)
So how does public-key cryptography work? Let’s say you and your cousin in
another state want to exchange private messages. Both of you have PGP Desk-
top. First, you both need to create your keypair: one private key and one public
key. Your private key you keep secret, your public key you send to a public keyser-
ver, which is a public facility for distributing public keys. (Some companies have
their own private keyservers.)
Once the public keys are on the keyserver, you can go back to the keyserver and
get your cousin’s public key, and she can go to the keyserver and get yours. This is
important because to send an encrypted email message that only your cousin can
decrypt, you encrypt it using your cousin’s public key. What makes this work is
that only your cousin’s private key can decrypt a message that was encrypted
using her public key. Even you, who have her public key, can’t decrypt the mes-
sage once it’s been encrypted using her public key.
Let’s be very clear about this: only a private key can decrypt data that was
encrypted with the corresponding public key.
So to send a private message that only you can decrypt and read, your cousin
encrypts it with your public key. Your private key is the only key in the world that
can decrypt that message; and of course you’re keeping your private key very,
very private, right?
Overview
There are multiple ways to access PGP Desktop functions, depending on what
you want to do. This chapter shows and describes ways to access PGP Desktop
and it’s main screens: PGP Keys, PGP Mail, and the PGP Disk Editor.
When you click on the PGP Desktop icon in the Windows System tray (we call
this the PGPtray icon), a menu appears giving you access to:
• The About PGP screen, which displays information about the version of PGP
you are using, including the licensing information
• PGP online help, so that you have easy access to information about PGP
• PGP options, so that you can control your PGP environment
• Purging passphrase caches, so that you can remove stored passphrases from
the cache to prevent unauthorized use of PGP
• PGP Disk functions, so that you have quick access to PGPdisk functionality
• The PGP Keys and PGP Mail screens, so that you have easy access to PGP-
keys and PGPmail functionality
• Encrypt, Decrypt/Verify, and Sign options for data in the Current Window, so
that you can use PGP on the current window
• Empty, Edit, Encrypt, Decrypt/Verify, and Sign options for data on the Clip-
board, so that you can use PGP on the contents of the Clipboard
Windows Explorer
You can also access PGP Desktop functions from Windows Explorer. Simply open
Windows Explorer and then select the items you want to work on.
Windows Explorer gives you access to different PGP Desktop functions depend-
ing on what you select:
• Drive. If you right click a drive on your system in Windows Explorer and select
PGP from the menu that appears, you can do the following to the drive:
• Encrypt, Sign, or Encrypt & Sign it
• Decrypt & Verify it
• Wipe free space on it
• Create a self-decrypting archive (SDA) of the drive
• Folder. If you right click a folder in Windows Explorer and select PGP from the
menu that appears, you can do the following to the folder:
• Encrypt, Sign, or Encrypt & Sign it
• Decrypt & Verify it
• Wipe it
• Create an SDA with the contents of the folder in the archive
• File. If you right-click a file in Windows Explorer, the PGP submenu lets you
perform various functions on the file, depending on what kind of file it is:
• If you select an unencrypted file, you can encrypt, sign, wipe, or create an
SDA
• If you select an encrypted file, you can decrypt/verify or wipe it
• If you select a PGPdisk file (.pgd), you can mount or edit it
• If you select an ASCII key file (.asc), you can decrypt/verify or wipe it. If
you select decrypt/verify, you are given the option of importing the file.
• If you select a PGP public or private keyring file (PKR or SKR files, respec-
tively), you can add the keys in it to your keyring or wipe the file
Email applications
You can access some PGP Desktop unctions from within certain email applica-
tions, like Microsoft Outlook, for example.
PGP icons
If you are creating a new message in Outlook, the Standard toolbar will have PGP
Desktop icons that let you:
• Encrypt the message
• Sign the message
• Open PGP Keys
The Outlook Inbox also has PGP icons for:
• Decrypting a message and verifying its signature
• Opening PGP Keys
PGP Desktop installs PGP icons into the following email applications:
• Microsoft Exchange
• Microsoft Outlook
• Microsoft Outlook Express
• Lotus Notes
• Novell GroupWise
• QUALCOMM Eudora
If you use an email application that doesn’t have PGP Desktop icons on its toolbar,
you can use the PGPtray icon to perform PGP Desktop functions on either the Cur-
rent Windows or the Clipboard.
Be sure to check the toolbar of your email application for the PGP Desktop icons.
• Clicking the PGPtray icon ( ) in the System tray, then selecting PGP-
keys
The PGPkeys screen displays the keypairs you have created for yourself, as
well as any public keys of other users that you have added to your public key-
ring.
PGPkeys is your tool for managing your keyrings.
2. Click in the PGPkeys menu bar or pull down the Keys menu and select
New Key.
The PGP Key Generation Wizard provides some introductory information on
the first screen.
3. After you read the information, click Next.
The PGP Key Generation Wizard asks you to enter your name and email
address.
4. Enter your name in the Full Name box and your email address in the Email
Address box, then click Next.
It is not absolutely necessary to enter your real name or even your email
address. However, using your real name makes it easier for others to identify
you as the owner of your public key. Also, by using your correct email
address, you and others can take advantage of the plug-in feature that auto-
matically looks up the appropriate key on your current keyring when you
address mail to a particular recipient.
5. If PGP detects that your computer is in a Microsoft Exchange Server environ-
ment or if your PGP administrator has configured PGP to include specific
installation settings, the Administrator Options panel appears. Read the
information on this panel, then click Next to continue.
6. On the Passphrase screen, enter the string of characters or words you want
to use to maintain exclusive access to your private key. To confirm your entry,
press Tab to advance to the next field, then enter the same passphrase again.
For more information on creating an effective passphrase, see “Creating a
passphrase that you will remember” on page 45.
Normally, as an added level of security, the characters you enter for the pass-
phrase do not appear on the screen. However, if you are sure that no one is
watching, and you would like to see the characters of your passphrase as you
type, clear the Hide Typing check box.
Unless your administrator has implemented a PGP key reconstruction policy for
your company, no one, including PGP Corporation, can salvage a key with a forgot-
ten passphrase.
This chapter explains how to secure email messages you send to others and
decrypt and verify the messages others send to you.
Sending email that is not encrypted is like sending a postcard: the message you
write can easily be read by someone in between you and the recipient.
To secure your email, PGP offers plug-ins that work along with your email applica-
tions and other utilities to encrypt, sign, decrypt, and verify email text. The PGP
email plug-ins are available for seamless integration with Microsoft Exchange,
Outlook and Express, Lotus Notes, Novell GroupWise, and QUALCOMM Eudora.
If you are sending sensitive email, consider leaving your subject line blank or creat-
ing a subject line that does not reveal the contents of your encrypted message.
2. When you have finished composing the text of your email message, click the
envelope and lock icon ( ) to encrypt the text of your message, then click
the paper and pen icon ( ) to sign your message.
3. Send your message as you normally do.
If you have a copy of the public keys for every one of the recipients, the appro-
priate keys are automatically used and the message is sent.
Encryption
options
4. Drag the public keys for those who are to receive a copy of the encrypted
email message into the Recipients list box. You can also double-click any of
the keys to move it from one area of the screen to the other.
The Validity icon indicates the minimum level of confidence that the public
keys in the Recipient list are valid. This validity is based on the signatures
associated with the key.
5. You can choose from the following encryption options depending on the type
of data you are encrypting:
• Secure Viewer. Select this option to protect the data from TEMPEST
attacks upon decryption. If you select this option, the decrypted data is
displayed in a special TEMPEST attack prevention font that is unreadable
to radiation capturing equipment, and cannot be saved in decrypted for-
mat. For more information about TEMPEST attacks, see the section on
vulnerabilities in An Introduction to Cryptography.
The Secure Viewer option may not be compatible with previous versions of PGP.
Messages encrypted with this option enabled can be decrypted by previous ver-
sions of PGP; however, this feature may be ignored.
If you do not send your email immediately but instead store it in your outbox, you
should be aware that when using some email applications the information is not
encrypted until the email is actually transmitted. Before queuing encrypted mes-
sages you should check to see if your application does in fact encrypt the messages
in your outbox. If it does not, you can use PGPtray’s Current Window option to
encrypt your messages before queuing them in the outbox.
If you are sending sensitive email, consider leaving your subject line blank or creat-
ing a subject line that does not reveal the contents of your encrypted message.
2. When you have finished composing the text of your email message, click on
the PGPtray icon and select Encrypt, Sign, or Encrypt & Sign from the Cur-
rent Window menu.
3. Select the public key of the recipient of the message and click OK.
Encrypted text appears in the email message window.
4. Send your message as you normally do.
If you have a copy of the public keys for every one of the recipients, the appro-
priate keys are automatically used and the message is sent.
Encryption
options
5. Drag the public keys for those who are to receive a copy of the encrypted
email message into the Recipients list box. You can also double-click any of
the keys to move it from one area of the screen to the other.
The Validity icon indicates the minimum level of confidence that the public
keys in the Recipient list are valid. This validity is based on the signatures
associated with the key.
6. You can choose from the following encryption options depending on the type
of data you are encrypting:
• Secure Viewer. Select this option to protect the data from TEMPEST
attacks upon decryption. If you select this option, the decrypted data is
displayed in a special TEMPEST attack prevention font that is unreadable
to radiation capturing equipment, and cannot be saved in decrypted for-
mat. For more information about TEMPEST attacks, see the section on
vulnerabilities in An Introduction to Cryptography.
The Secure Viewer option may not be compatible with previous versions of PGP.
Messages encrypted with this option enabled can be decrypted by previous ver-
sions of PGP; however, this feature may be ignored.
If you do not send your email immediately but instead store it in your outbox, you
should be aware that when using some email applications the information is not
encrypted until the email is actually transmitted. Before queuing encrypted mes-
sages you should check to see if your application does in fact encrypt the messages
in your outbox. If it does not, you can use PGPtray’s Current Window option to
encrypt your messages before queuing them in the outbox.
Groups
window
2. To decrypt and verify the message, click the locked envelope icon ( ).
To decrypt and verify attached files, decrypt them separately using the PGP-
tray icon.
The PGP Enter Passphrase screen appears, asking you to enter your pass-
phrase.
3. Enter your passphrase, then click OK.
The message is decrypted. If it has been signed and you have the sender’s
public key, a message appears indicating whether the signature is valid.
If the message is encrypted with the Secure Viewer option enabled, an advi-
sory message appears. Click OK to continue. The decrypted message
appears on a secure PGP screen in a special TEMPEST attack prevention font.
4. You can save the message in its decrypted state, or you can save the original
encrypted version so that it remains secure.
Messages encrypted with the Secure Viewer option enabled cannot be saved in
their decrypted state.
Messages encrypted with the Secure Viewer option enabled cannot be saved in
their decrypted state.
PGP/MIME
If you are using an email application with one of the plug-ins that supports the
PGP/MIME standard, and you are communicating with another user whose email
application also supports this standard, both of you can automatically encrypt and
decrypt your email messages and any attached files when you send or retrieve
your email. All you have to do is turn on the PGP/MIME encryption and sign func-
tions from the Email tab of the PGP Options screen, which can be opened from
PGPtray or from within PGPkeys.
When you receive email from someone who uses the PGP/MIME feature, the
mail arrives with an icon in the message window indicating that it is PGP/MIME
encoded.
To decrypt the text and file attachments in PGP/MIME encapsulated email and to
verify any digital signatures, simply click the lock and quill icon. Attachments are
still encrypted if PGP/MIME is not used, but the decryption process is usually
more involved for the recipient.
When you encrypt and sign with an email application that is supported by the PGP
plug-ins, you have two choices, depending on what type of email application the
recipient is using. If you are communicating with other PGP users who have an
email application that supports the PGP/MIME standard, you can take advantage
of a PGP/MIME feature to encrypt and sign your email messages and any file
attachments automatically when you send them. If you are communicating with
someone who does not have a PGP/MIME-compliant email application, you
should encrypt your email with PGP/MIME turned off to avoid any compatibility
problems.
Refer to the following table for a list of plug-ins and their features.
This chapter describes how to use PGP to securely maintain files. It describes
how to use PGP to encrypt, decrypt, sign, and verify files either for email or for
secure storage on your computer. It also describes the PGP Wipe and Free Space
Wipe functions, which delete files by erasing their contents completely from your
computer.
Encryption options
You select the public keys by dragging them to the Recipients list. You can choose
additional encryption options from the lower left menu. The options available to
you depend upon the type of data that you are encrypting.
If you are encrypting or signing a folder, the output may be in a new folder,
depending on the options you selected.
Messages encrypted with the Secure Viewer option enabled cannot be saved in
their decrypted state. They are only viewable on the secure PGP screen after
decryption.
tab of the PGP Options screen. You can enable Wipe to automatically wipe files
when deleting them. To learn how to set wiping options, see “Setting General
options” on page 143.
To erase the free disk space that contains data from previously deleted files and
programs, use PGP Free Space Wiper. To ensure that your deleted data is irrecov-
erable, erase your free disk space periodically with the Free Space Wiper.
Many programs automatically save files in progress, so back-up copies of the file
you deleted may exist. PGP Corporation recommends that you run the Wipe utility
on the back-up copies as well as the original file to thoroughly erase it from your
hard disk.
1. On the PGPmail screen, click the Freespace Wipe button ( ) to start the
Freespace Wipe Wizard.
The Wipe Free Space Wizard appears.
2. Read the information in the welcome screen, then click Next to advance to
the next dialog box.
The PGP Free Space Wipe Wizard prompts you to select the volume you want
to wipe and the number of passes you want to perform.
3. In the Volume box, select the disk or volume that you want PGP to wipe.
Then, select the number of passes that you want PGP to perform. The recom-
mended guidelines are:
Commercial data recovery companies have been known to recover data that has
been over written up to 9 times. PGP uses highly sophisticated patterns during each
wipe to ensure that your sensitive data cannot be recovered.
Clicking Cancel during file wipe can leave remains of the file on your computer.
To use this scheduling feature, you must have the Windows Task Scheduler installed
on your system. If you do not have the Task Scheduler installed on your system, you
can download it from the Microsoft Web site (http://www.microsoft.com).
1. On the PGPmail screen, click the Freespace Wipe button ( ) to start the
Freespace Wipe Wizard.
The Wipe Free Space Wizard appears.
2. Read the information in the welcome screen, then click Next to advance to
the next dialog box.
The PGP Free Space Wipe Wizard prompts you to select the volume you want
to wipe and the number of passes you want to perform.
3. In the Volume box, select the disk or volume that you want PGP to wipe.
Then, select the number of passes that you want PGP to perform. The recom-
mended guidelines are:
• 3 passes for personal use
• 10 passes for commercial use
• 18 passes for military use
• 26 passes for maximum security
Commercial data recovery companies have been known to recover data that has
been over written up to nine times. PGP uses highly sophisticated patterns during
each wipe to ensure that your sensitive data cannot be recovered.
7. Choose how often you want the task to run from the Schedule Task area. Your
choices are:
• Daily. This option runs your task once at the time you specify on the days
you indicate. Click OK to close the dialog box, then enter the time you
want to run the task each day in the Start Time text box.
• Weekly. This option runs your task on a weekly basis at the date and time
you specify. Enter the number of weeks you want between each disk
wipe in the text box provided, then choose a day from the Schedule Task
Weekly list.
• Monthly. This option runs your task once each month on the day and at
the time you specify. Enter the time in the text box provided, then enter
the day of the month on which you want the task to run. Click Select
Months to specify which months the task will run.
• Once. This option runs your task exactly once on the date and at the time
you specify. Enter the time in the text box provided, then select a month
and a date from the lists Run On text box.
• At System Start up. This option runs your task only upon system start
up.
• At Logon. This option runs your task when you log on to your computer.
• When Idle. This option runs your task when your system is idle for the
amount of time you specify in the minutes text box.
8. Enter the time of day that you want the task to start in the Start Time box.
9. Specify how often you want the task to run in the Schedule Task Daily box.
10. Click Advanced to open a dialog box where you can select additional schedul-
ing options, such as the start date, the end date, and the duration of the task.
11. Click OK.
A confirmation dialog box appears. Your new PGP folder or free space task is
now scheduled. To edit or delete your PGP tasks, use the Windows Task
Scheduler.
This chapter tells you how PGP can wipe files and free disk space on your sys-
tems so that sensitive data cannot be retrieved, even using disk recovery soft-
ware. It also tells you how you can schedule automatic free space wiping.
Overview
If you want to completely destroy sensitive files without leaving fragments of
their data behind, use the PGP Wipe utility. When you delete a file using Wipe,
the file is immediately overwritten (even on systems with virtual memory) and all
traces of the file are removed so that it cannot be retrieved even by using disk
recovery software.
In addition, you can set file wiping options from the General tab of the PGP
Options screen. You can enable Wipe to automatically wipe files when deleting
them. To learn how to set wipe options, see “Setting General options” on
page 143.
To erase free disk space that could contain data from previously deleted files and
programs, use the PGP Free Space Wiper utility. To make sure your deleted data
is not recoverable, erase your free disk space periodically with the Free Space
Wiper.
It is especially important to use the Free Space Wiper on Journaling filesystems
such as NTFS, as such filesystems make a second copy of everything written to
disk in a filesystem journal. This helps the disk recover from damage, but requires
extra work when removing sensitive data. Wiping a file does not wipe any poten-
tial journal entries that may have been created. NTFS in particular can also store
small (less than 1K) files in internal data structures that cannot be wiped properly
without using the PGP Free Space Wiper with the “Wipe NTFS internal data
structures” option.
PGP’s file wiping exceeds the media sanitization requirements of Department of
Defense 5220.22-M at three passes. Security continues to increase up to approx-
imately 28 passes.
Ch. 6: Wiping 45
PGP Desktop User’s Guide
Many programs automatically save files in progress, so backup copies of the file you
deleted may exist. PGP Corporation recommends that you run the Wipe utility on
the backup copies as well as the original file to thoroughly erase it from your sys-
tem. The best way to handle this situation is to enable PGP’s “Automatically wipe on
delete” option on the General Options tab (see “Setting General options” on
page 143).
Using the Wipe Free Space Wizard to clean free disk space
Use the PGP Wipe Free Space Wizard to clean your free disk space.
To wipe free space on your disks:
1. On the PGPmail screen, click the Freespace Wipe button.
The Welcome screen of the Wipe Free Space Wizard appears.
46 Ch. 6: Wiping
User’s Guide PGP Desktop
3. In the Wipe Drive box, select the disk or volume you want PGP to wipe and
the number of passes you want PGP to perform. The recommended guide-
lines are:
• 3 passes for personal use
• 10 passes for commercial use
• 18 passes for military use
• 26 passes for maximum security
Commercial data recovery companies have been known to recover data that has
been overwritten up to nine times. PGP uses highly sophisticated patterns during
each wipe to make sure your sensitive data cannot be recovered.
Ch. 6: Wiping 47
PGP Desktop User’s Guide
The Perform Wipe screen opens and displays statistical information about the
drive or volume you selected.
8. Click Finish.
48 Ch. 6: Wiping
User’s Guide PGP Desktop
To use this scheduling feature, you must have the Windows Task Scheduler installed
on your system. If you do not have the Task Scheduler installed on your system, you
can download it from the Microsoft Web site (www.microsoft.com).
Commercial data recovery companies have been known to recover data that has
been over written up to nine times. PGP uses highly sophisticated patterns during
each wipe to ensure that your sensitive data cannot be recovered.
Ch. 6: Wiping 49
PGP Desktop User’s Guide
7. Choose how often you want the task to run from the Schedule Task area. Your
choices are:
• Daily. This option runs your task once at the time you specify on the days
you indicate. Click OK to close the dialog box, then enter the time you
want to run the task each day in the Start Time text box.
• Weekly. This option runs your task on a weekly basis at the date and time
you specify. Enter the number of weeks you want between each disk
wipe in the text box provided, then choose a day from the Schedule Task
Weekly list.
• Monthly. This option runs your task once each month on the day and at
the time you specify. Enter the time in the text box provided, then enter
the day of the month on which you want the task to run. Click Select
Months to specify which months the task will run.
• Once. This option runs your task exactly once on the date and at the time
you specify. Enter the time in the text box provided, then select a month
and a date from the lists Run On text box.
• At System Start up. This option runs your task only upon system start
up.
• At Logon. This option runs your task when you log on to your computer.
• When Idle. This option runs your task when your system is idle for the
amount of time you specify in the minutes text box.
8. Enter the time of day that you want the task to start in the Start Time box.
9. Specify how often you want the task to run in the Schedule Task Daily box.
10. Click Advanced to open a dialog box where you can select additional schedul-
ing options, such as the start date, the end date, and the duration of the task.
50 Ch. 6: Wiping
User’s Guide PGP Desktop
Ch. 6: Wiping 51
PGP Desktop User’s Guide
52 Ch. 6: Wiping
7 Self-Decrypting Archives
SDAs can only be opened under the same operating system as they were created
under. In other words, you can’t open an SDA on a Macintosh if it was created by
the Windows version of PGP, and vice versa.
Creating an SDA
To create an SDA:
1. Select the files, directories, or drive you want to include in the SDA.
2. Right-click on your selection, slide down to PGP, then over and down to Cre-
ate SDA.
3. Enter the passphrase you want to use for this SDA, then enter it again for con-
firmation.
You must be able to securely communicate this passphrase to the person who is
going to be decrypting the SDA.
4. If you’re creating an SDA with a file or files specifically selected (that is, not on
the drive or in a directory, but specifically selected), you’ll be prompted to con-
firm the filename and location of the SDA.
If no file is specifically selected, you won’t be prompted for a filename or loca-
tion.
5. Click Save.
PGP creates the SDA with contents you specified.
The default filename for an SDA with a file or files specifically selected is the
name of one of the files in the SDA with sda.exe appended. The default file-
name for an SDA with no files specifically selected (that is, just directories or
drives) is the name of one of the directories or drives with sda.exe appended.
Unless you specified otherwise, the SDA is saved in the same location as the
original files.
Opening an SDA
To open an SDA:
1. Double click the SDA file. (It should have an extension of sda.exe.)
The PGP Self Decrypting Archive - Enter Passphrase screen appears.
2. Enter the appropriate passphrase and specify a location for the files in the
SDA to be decrypted to, then click OK.
The SDA is decrypted.
If you are decrypting the SDA in the same location as where you got the files that
are in the SDA, you’ll be prompted to save the files to a different location or with a
different name, so as not to overwrite the original files.
This chapter describes how PGP can secure your ICQ communications.
About ICQ
ICQ (“I Seek You”) is an Internet application that allows you to communicate with
friends and colleagues over the Internet in real time. As with any type of commu-
nication, especially through Internet-based applications, your conversation is not
secure and is subject to eavesdropping.
To secure your ICQ communications, PGP offers a powerful integrated plug-in
that lets you easily encrypt and decrypt your ICQ messages and exchange PGP
keys through ICQ.
ICQ allows you to send messages of unlimited length to online users. Offline users,
however, are limited to receiving messages no longer than 450 characters. Because
of this limitation and because the size of encrypted text can exceed the size of the
original text, we recommend that you send your key and encrypted messages to
online recipients only.
The PGP plug-in for ICQ allows you to secure your ICQ communications by
encrypting your messages before you send them over the Internet, and decrypt-
ing and verifying automatically upon opening encrypted instant messages. Since
the plug-in uses your PGP key together with your ICQ number to encrypt and
secure your ICQ messages, it can automatically verify and decrypt the ICQ mes-
sages that are encrypted to your PGP key.
When the PGP plug-in for ICQ is installed on your system, the lock icon ( ) and
the Send Key button appear in your ICQ Send Online Message dialog box.
If you are using ICQ version 2000b or higher, then you must work in ICQ’s
Advanced mode (not Simple mode) and you must use the Single Message mode
window (not the Split Message mode window) in order for the PGP plug-in buttons
to appear.
Encrypt
message
Send your
PGP public key
Before you can encrypt an ICQ message, you must obtain the public key of the
person for whom you are sending the encrypted message. You can obtain the
recipients’ public key and add it to your PGP keyring through ICQ.
3. Make sure the user ID displayed in the Name field belongs to the key you
want to use for securing your ICQ sessions. If you want to specify a different
key, enter the key’s user ID.
4. Click Next.
The PGP Passphrase screen appears.
5. Enter your PGP passphrase, and then click OK.
The PGP ICQ Wizard Completing screen appears.
6. Click Finish.
PGP adds your ICQ number to your key as a new user ID, and returns to the
message you were sending.
3. When you are finished composing the message, click the lock icon ( ) that
appears on your ICQ Send Online Message dialog box.
The message text is encrypted.
4. Click Send.
This chapter tells you how to use PGP’s Lotus Notes plugin.
Overview
The PGP Lotus Notes plugin lets you encrypt, sign, and decrypt/verify encrypted
email messages using your Lotus Notes email program. PGP supports Lotus
Notes versions 4.5.x, 4.6.x, 5.x, and 6.x. (The Lotus Notes 6.x plugin decrypts
PGP/MIME messages; it does not encrypt them.)
If you are sending sensitive email, consider leaving your subject line blank or creat-
ing a subject line that does not reveal the contents of your encrypted message.
2. When you have finished composing the text of your email message, click the
PGP button on your toolbar.
If you have a copy of the public keys for every one of the recipients on your
keyring, and the recipients name or email address matches a user ID on your
keyring, then the appropriate keys are used automatically.
If the recipients name or email address does not match a user ID on your key-
ring, if there is no corresponding public key on your keyring for the recipient,
or if one or more of the keys have insufficient validity, then the PGP Recipient
Selection screen appears so that you can specify the correct key.
You can force the PGP Recipient Selection screen to appear, even if you have
a valid copy of the public keys for every one of the recipients, by holding down
Shift when you click Send. You should do this if you want to use the Secure
Viewer or Conventional Encrypt options and you do not want your message to
be sent automatically.
6. Drag the public keys for those who are to receive a copy of the encrypted
email message into the Recipients list box. You can also double-click any of
the keys to move it from one area of the screen to the other.
The Validity icon indicates the minimum level of confidence that the public
keys in the Recipient list are valid. This validity is based on the signatures
associated with the key.
7. You can choose to conventionally encrypt your email message. Select the
Conventional Encryption check box to use a common passphrase instead of
public key encryption. If you select this option, the message is encrypted
using a session key, which encrypts (and decrypts) using a passphrase you
will be asked to specify.
8. Click OK to encrypt and sign your mail.
If you have elected to sign the encrypted data, the Signing Key Passphrase
screen appears, requesting your passphrase before the mail is sent.
9. Enter your passphrase and then click OK.
If you do not send your email immediately but instead store it in your outbox, you
should be aware that when using some email applications the information is not
encrypted until the email is actually transmitted. Before queuing encrypted mes-
sages you should check to see if your application does in fact encrypt the messages
in your outbox. If it does not, you can use PGPtray’s Current Window option to
encrypt your messages before queuing them in the outbox.
2. To decrypt and verify the message, click the PGP Decrypt/Verify button on
your toolbar.
The PGP Enter Passphrase screen appears, asking you to enter your pass-
phrase.
3. Enter your passphrase, then click OK.
The message is decrypted. If it has been signed and you have the sender’s
public key, the signature verification will appear in the PGP Log.
You can save the message in its decrypted state, or you can save the original
encrypted version so that it remains secure.
You can also decrypt attachments without first decrypting the email message. Sim-
ply double-click on the attachment, click the Launch button, and enter your PGP
passphrase when prompted.
You can save the attachment in its decrypted state, or you can save the original
encrypted version so that it remains secure.
This chapter describes smart cards and tells you how to use them with PGP.
Overview
A smart card, sometimes called an intelligent token, is a portable device that
includes a computer chip, which lets it store data and perform computations.
Smart cards come in multiple form factors; they can be plastic cards about the
size of a credit card or keychain fobs with USB connectors on one end, for exam-
ple.
In order to use PGP with a smart card, you must have a supported smart card
reader and the appropriate software drivers installed on your system. PGP Corpo-
ration strongly recommends using software drivers from the vendor who makes
your smart card reader. They must include the PKCS-11 (the cryptographic token
interface standard) library.
You can create and store your PGP keys on a smart card and access them using a
PIN rather than a passphrase. The smart card has the added protection of being
with you at all times—a key on a smart card is less vulnerable than the same key
stored on your computer.
The private portion of your keypair that is generated on a smart card never leaves
the smart card—it’s not exportable. Decryption and signing operations take place
directly on the card. The exception to this is if you generate a keypair on your
desktop, rather than on the smart card, and then afterwards copy the keypair to
your smart card.
You must specify the smart card type in the Advanced tab of the PGP Options
screen before you can generate a PGP keypair on a smart card. Refer to “Setting
Advanced options” on page 153 for more information.
Removing your smart card from the smart card reader while generating a keypair on
the smart card may result in unpredictable behavior.
2. Open PGPkeys.
3. Click the New Key button on the PGPkeys menu bar.
The Key Generation Wizard Welcome screen appears.
4. Click the Expert button.
The Key Generation Wizard Expert panel appears.
5. Enter your name in the Full Name box and your email address in the Email
Address box.
It is not absolutely necessary to enter your real name or email address. How-
ever, using your real name makes it easier for others to identify you as the
owner of your public key. Also, by using your correct email address, you and
others can take advantage of the plug-in feature that automatically looks up
the appropriate key on your current keyring when you address mail to a partic-
ular recipient.
6. In the Key Type box, select the type of key you want to create.
Diffie-Hellman/DSS keys are not supported on smart cards.
7. In the Key Size box, select a key size of 1024 bits.
8. Indicate when you want your keys to expire. You can either use the default
selection, Never, or you can enter a specific date after which the keys will
expire.
Once you create a keypair and have distributed your public key to the world,
you will probably continue to use the same keys from that point on. However,
under certain conditions you may want to create a special keypair that you
plan to use for only a limited period of time. In this case, when the public key
expires, it can no longer be used by someone to encrypt mail to you but it can
still be used to verify your digital signature. Similarly, when your private key
expires, it can still be used to decrypt mail that was sent to you before your
public key expired but can no longer be used to sign mail to others.
9. Select the Generate key on Smart Card check box.
The Generate key on Smart Card check box does not appear if the smart card is not
inserted in the smart card reader or if you have not specified a smart card type on
the Advanced tab of the PGP Options screen.
• Click the gold card icon found in the lower left corner of the PGPkeys win-
dow.
• Pull down the View menu and select Smart Card Properties.
The Smart Card window appears.
The Contents tab displays information about the PGP data stored on the smart
card. Under Keys, a list of the keys stored on the smart card displays. You can
find out more information about each key by viewing the signatures and user
IDs associated with each key.
The Wipe Contents button enables you to completely erase all data stored on
the smart card (see “Wiping keys from your smart card” on page 69 for more
information).
Removing your smart card from the smart card reader while wiping it may result in
unpredictable behavior.
Once you wipe the smart card, you will not be able to retrieve any keys that were
previously stored on the card. This includes any keypairs, or private keys you created
on the card. If you delete the private portion of your keypair, then you will not be
able to decrypt any data encrypted to it.
There are two main reasons to copy an existing keypair to your smart card:
• To use it as a backup for the keypair on your system and to copy your public
key from the smart card to other people’s keyrings. In this case, you would
have two copies of the same private key: one on the system where you origi-
nally created it and one on the smart card.
• To use it as your only copy of your private key, just as if you’d created it directly
onto the smart card. In this case, you would need to delete the private key
from your system (PGP gives you the option to do this). You would select this
option if you started using smart cards after you had already created your PGP
keypair and wanted to have the advantages of having your keypair on your
smart card but didn’t want to create a new keypair.
Finally, when you copy your PGP keypair to a smart card, the passphrase for the
keypair that’s on the smart card is automatically changed from whatever it was to
the PIN of the smart card. However, the passphrase for the keypair that was
already on your system, the keypair you copied to the smart card, doesn’t change.
Thus you end up with two copies of the same exact keypair, each with their own
passphrase.
If you decide to delete the private key from your system and just keep the private
key on your smart card, this isn’t a problem; you just use the PIN of the smart card
as the passphrase for your private key.
If, however, you choose to keep both keypairs, then use the passphrase for the
keypair on your system; it takes precedence over the passphrase of the smart
card.
To copy an existing PGP keypair to your smart card:
1. Put your smart card in the smart card reader.
Removing your smart card from the smart card reader while copying keys to the
smart card may result in unpredictable behavior.
2. Open PGPkeys.
3. Select the keypair you want to copy to your smart card.
Diffie-Hellman/DSS keys are not supported on smart cards.
4. Pull down the Server menu and choose Send To –> Smart Card.
A note appears informing you that once the keypair is copied to the smart
card, your PGP passphrase for this keypair will automatically change to the
PIN belonging to the smart card.
5. Click OK to continue.
The PGP Enter Passphrase screen appears.
6. Enter the passphrase for your key, then click OK.
The PGP Enter Passphrase screen appears.
7. Enter the PIN for your smart card, then click OK.
The keypair is copied to your smart card.
PGP asks if you want to remove the private portion of the keypair from your
keyring so that it only resides on the smart card.
8. Click Yes to remove the private portion of your keypair from your keyring; click
No to leave the private portion of your keypair on your keyring.
If you clicked Yes, the private portion of your keypair is deleted from the key-
ring on your system and exists only on your smart card.
If you clicked No, the private portion is not deleted; you now have two copies
of the same keypair, one on your system and the other on your smart card.
Accessing PGPdisk
PGPdisk can be accessed from PGPtray: click the PGPtray icon, slide up to PGP-
disk, then slide over and select the appropriate command.
The PGPdisk menu from PGPtray provides a convenient means of creating and mounting volumes. A brief description of each option is listed below.
8. Select the desired options from the appropriate check boxes and lists:
• On a drive letter. Select the drive letter where you want to mount your
new PGPdisk volume. A list of available drives appears in the drive letter
list. Your new PGPdisk volume appears at this location in your Windows
Explorer folder tree when mounted.
• As a directory on an NTFS volume. This option is only available on Win-
dows 2000 systems. Click this option if you want to mount your new PGP-
disk volume as a directory on an NTFS volume. Type the path to an empty
directory in the space provided or browse to the desired location.
If you enter a path to a non-existing directory on an NTFS volume, you will
be asked if you want to create a directory by that name. Select Yes, then
enter your passphrase. The directory appears in Windows Explorer on the
NTFS volume you selected.
• Choose a filesystem format. Specify a file system format for the new
PGPdisk volume.
FAT. (available on all Windows platforms)
NTFS. (Windows NT, 2000, and XP platforms, only available for PGPdisk
volumes larger than 5MB)
FAT32. (Windows 95, Windows 98 and Windows 2000 platforms, only
available for PGPdisk volumes larger than 260 MB)
• Mount at startup. Check this option to mount PGPdisk volumes at star-
tup. When checked, you are prompted for your PGPdisk passphrase at
startup.
9. Click OK. This closes the Advanced Options dialog box.
10. Click Next.
11. Choose a protection method for your new PGPdisk volume. Select one of the
following options.
• Public key. If you choose to protect your PGPdisk with a public key, a list
of the public keys on your keyring will appear. Select the key you want to
use to protect your new PGPdisk volume.
• Passphrase. If you choose to protect your PGPdisk with a passphrase,
you must also enter a user name.
Enter the string of words or characters that serves as your passphrase to
access the new volume (also called the volume’s master passphrase). To
confirm your entry, press Tab to advance to the next text box, then enter
the same passphrase again. The suggested minimum size for a pass-
phrase is eight characters.
Normally, as an added level of security, the characters you enter for the
passphrase are not visible on the screen. However, if you are sure that no
one is watching (either physically or over the network) and you would like
to see the characters of your passphrase as you type, click the Hide Typ-
ing box.
12. Click Next. A progress bar indicates how much of the PGPdisk volume has
been initialized and formatted.
13. Click Next to mount your PGPdisk.
14. Click Finish to begin working with your new PGPdisk volume.
Your PGPdisk volume appears in a Windows Explorer window.
Although the encrypted file associated with each volume is safe from snooping, it
can still be deleted. If an unauthorized person is able to access your data, he or she
could potentially delete the encrypted file upon which the volume is based. It is a
good idea to keep a backup copy of the encrypted file.
You may lose data if you unmount a PGPdisk volume that contains open files. If you
select Allow forcible unmounting of PGPdisks with open files and Don’t ask
before forcibly unmounting a PGPdisk from the PGP Options panel, then you will
not receive a warning before unmounting a volume that contains open files and you
risk losing the data stored in the volume. For more information on setting PGP
options, see “Setting PGPdisk options” on page 73.
This chapter explains how to create, mount and unmount existing PGPdisk vol-
umes and how to specify properties that protect volume contents by unmounting
them under certain circumstances.
The PGPdisk Editor displays the list of users who are allowed to access the vol-
ume and their method of authentication: public key or passphrase. An icon
appears next to the name of the administrator for the volume. The PGPdisk Editor
can be accessed from Windows Explorer or from PGPtray.
To access the PGPdisk Editor from Windows Explorer:
1. Locate and select the encrypted volume file you want to modify in the Win-
dows Explorer folder tree.
2. Right-click on the encrypted volume’s file name to display the Context menu.
If you choose to protect your PGPdisk volume with a PGP key, then you must go
into PGPkeys to change the passphrase for your private key. You cannot change it
from the PGPdisk Editor.
Public key is the most secure protection method when adding alternate users to a
PGPdisk volume because: (1) You don’t need to exchange a passphrase with the
alternate user which, depending on your method, could be intercepted or over-
heard. (2) The alternate user doesn’t need to memorize another passphrase which
could be forgotten. (3) It is easier to manage a list of alternate users if each uses his
or her own private key to gain access to the volume.
6. Click Next. A progress bar indicates how much of the PGPdisk volume has
been initialized and formatted.
7. Click Finish. The alternate user has been added.
Once you have added an alternate user, you can remove the alternate user by
choosing Remove from the User menu.
To assign read-only status:
1. Open the PGPdisk Editor for the volume you want to modify, then select the
user name.
2. Select Toggle Read-Only from the User menu.
The Passphrase dialog box appears, prompting you to enter the administra-
tor’s passphrase.
3. Enter the administrator passphrase, then click OK.
A red dot appears next to the user’s name in the Read-Only column.
Once you have assigned read-only status to a user, you can remove the
restriction by repeating the steps above.
An adept user may be able to search his computer’s memory for the PGPdisk’s
underlying encryption key and save it in order to continue accessing the PGPdisk
even if he was removed from the user list. Re-encryption changes this underlying
key and prevents him from gaining access.
The global auto-unmount setting in the PGP Options panel applies to all mounted
PGPdisk volumes. If you want a PGPdisk volume to auto-unmount at a different
time than the time specified in the global auto-unmount setting, then you must
choose to override it.
• Check the Mount at Startup check box in the Properties dialog box of the
PGPdisk Editor for the volume you want to automatically mount.
The first person to mount the volume locally has read-write access to the volume.
No one else is then able to access the volume. If you want others to be able to
access files within the volume, you must mount the volume in read-only mode
(applies to FAT and FAT32 filesystem formats only). All users of the volume then
have read-only access.
If the volume is stored on a Windows server, you can also mount the volume
remotely on the server and allow people to share the mounted volume. However,
this action provides no security for the files within the volume.
Public key is the most secure protection method when adding alternate users to a
PGPdisk volume because: (1) You don’t need to exchange a passphrase with the
alternate user which, depending on your method, could be intercepted or over-
heard. (2) The alternate user doesn’t need to memorize another passphrase which
could be forgotten. (3) It is easier to manage a list of alternate users if each uses his
or her own private key to gain access to the volume. The more security precautions
you take, the greater assurance you have that your sensitive information remains
confidential.
Once the intended party has a copy of the encrypted file, all they need in order to
gain access to the contents of the volume is to mount it using the correct pass-
phrase, or, if the volume was encrypted to their public key, their private key. They
also need a copy of the PGPdisk program. For more information on how to mount
a PGPdisk volume, see “Mounting a PGPdisk volume” on page 35.
An adept user may be able to search his or her computer’s memory for the PGP-
disk’s underlying encryption key and save it in order to continue accessing the PGP-
disk even if he or she was removed from the user list. Re-encryption changes this
underlying key and prevents him from gaining access.
This chapter discusses encryption and security issues and provides user tips and
other technical information about PGPdisk.
CAST, but they have made a commitment to make CAST available to anyone on a
royalty-free basis. CAST appears to be exceptionally well-designed by people with
good reputations in the field.
The design is based on a very formal approach, with a number of formally prov-
able assertions that give good reasons to believe that it probably requires key
exhaustion to break its 128-bit key. CAST has no weak keys. There are strong
arguments that CAST is immune to both linear and differential cryptanalysis, the
two most powerful forms of cryptanalysis in the published literature, both of
which have been effective in cracking the Data Encryption Standard (DES).
Twofish is a relatively new, but well regarded 256-bit block cipher, symmetric algo-
rithm. Twofish was one of five algorithms that the U.S. National Institute of Stan-
dards and Technology (NIST) considered for the new Advanced Encryption
Standard (AES).
Passphrase erasure
When you enter a passphrase, PGPdisk uses it only for a brief time, then erases it
from memory. PGPdisk also avoids making copies of the passphrase. The result is
that your passphrase typically remains in memory for only a fraction of a second.
This feature is crucially important — if the passphrase remained in memory,
someone could search for it in your computer memory while you were away from
the machine. You would not know it, but they would then have full access to any
PGPdisk volumes protected by this passphrase.
ers. If your PGPdisk is mounted for long periods, over time, detectable traces of
your key could be retained in memory. Devices exist that could recover the key.
You won’t find such devices at your neighborhood electronics shop, but major
governments are likely to have a few.
PGPdisk protects against this by keeping two copies of the key in RAM, one nor-
mal copy and one bit-inverted copy, and inverting both copies every few seconds.
This chapter describes how to generate the public and private keypairs that you
need to correspond with other PGP users. It also explains how to distribute your
public key and obtain the public keys of others.
The RSA key type is only fully compatible with PGP versions 7.0 and above, and
other OpenPGP applications.
If you plan to correspond with people who are still using RSA Legacy keys,
you might want to generate an RSA Legacy keypair, which is compatible with
older versions of the program. If you need to, you can generate more than one
keypair.
Making a keypair
Unless you have already done so while using another version of PGP, the first
thing you need to do before sending or receiving encrypted and signed email is
create a new keypair. You generate a new keypair from PGPkeys using the PGP
Key Generation Wizard, which guides you through the process.
If you have an existing keypair, specify the location of your keys when you run the
PGPkeys application. You can go to the Files tab of the Options screen and locate
your keyring files at any time.
Although it’s fun, do not create more than one keypair unless you need to. When
another user wants to send you email, it might confuse them if you have more than
one keypair. Also, you might not remember all of the passwords for each keypair.
• Clicking the PGPtray icon ( ) in the System tray, then selecting PGP-
keys.
• Clicking in your email application’s toolbar
The PGPkeys window displays the private and public keypairs you have cre-
ated for yourself, as well as any public keys of other users that you have added
to your public keyring. It is from this window that you will perform all future
key management functions.
Unless your PGP administrator has implemented a PGP key reconstruction policy
for your company, no one, including PGP Corporation, can salvage a key with a for-
gotten passphrase.
PGP continually gathers random data from many sources on the system, including
mouse positions, timings, and keystrokes. If the Random Data screen does not
appear, it indicates that PGP has already collected all the random data that it needs
to create the keypair.
If you are in a Microsoft Exchange Server environment, PGP informs you that
it needs to retrieve your email user ID from your Exchange server in order to
add it to your new PGP key. If this is the case, continue with the instructions
outlined in “Adding your email ID from your Microsoft Exchange Server to your
new key” on page 100.
8. When the key generation process indicates that it is done, click Next.
9. Click Finish. PGP automatically puts your private key on your private keyring
and your public key on your public keyring.
Once you have created a keypair, you can use PGPkeys to create new keypairs
and manage all of your other keys. For instance, this is where you examine the
attributes associated with a particular key, specify how confident you are that the
key actually belongs to the alleged owner, and indicate how well you trust the
owner of the key to vouch for the authenticity of other users’ keys. For a complete
explanation of the key management functions you perform from the PGPkeys
window, see Chapter 16, Managing Keys.
4. Enter your name in the Full Name box and your email address in the Email
Address box.
It is not absolutely necessary to enter your real name or even your email
address. However, using your real name makes it easier for others to identify
you as the owner of your public key. Also, by using your correct email address,
you and others can take advantage of the plug-in feature that automatically
looks up the appropriate key on your current keyring when you address mail to
a particular recipient.
5. In the Key Type box, select the type of key you want to create. If you do not
know which key type is the right choice for you, see “Choosing a key type” on
page 93.
6. In the Key Size box, select the number of bits you want your new key to be
made of. For Diffie-Hellman/DSS or RSA keys, select a key size from 1024 to
4096 bits. For RSA Legacy keys, select a key size from 1024 to 2048 bits.
A large key size may take a long time to generate, depending on the speed of the
computer you are using. It may also take a long time if you have Faster key genera-
tion turned off in the General tab of the PGP Options screen.
The key size corresponds to the number of bits used to construct your digital
key. The larger the key, the less chance that someone will be able to crack it,
but the longer it takes to perform the decryption and encryption process. You
need to strike a balance between the convenience of performing PGP func-
tions quickly with a smaller key and the increased level of security provided by
a larger key. Unless you are exchanging extremely sensitive information that is
of enough interest that someone would be willing to mount an expensive and
time-consuming cryptographic attack in order to read it, you are safe using a
key composed of 1024 bits.
7. Indicate when you want your keys to expire. You can either use the default
selection, which is Never, or you can enter a specific date after which the keys
will expire.
Once you create a keypair and have distributed your public key to the world,
you will probably continue to use the same keys from that point on. However,
under certain conditions you may want to create a special keypair that you
plan to use for only a limited period of time. In this case, when the public key
expires, it can no longer be used by someone to encrypt mail to you but it can
still be used to verify your digital signature. Similarly, when your private key
expires, it can still be used to decrypt mail that was sent to you before your
public key expired but can no longer be used to sign mail to others.
8. Click Next.
9. If PGP detects that your computer is in a Microsoft Exchange Server environ-
ment or if your PGP administrator has configured PGP to include specific
installation settings, the Administrator Options panel appears. Read the infor-
mation in this panel, then click Next to continue.
10. In the Passphrase panel, enter the string of characters or words you want to
use to maintain exclusive access to your private key. To confirm your entry,
press the Tab key to advance to the next field, then enter the same pass-
phrase again. For more information on creating an effective passphrase, see
“Creating a passphrase you will remember” on page 101.
Normally, as an added level of security, the characters you enter for the pass-
phrase do not appear on the screen. However, if you are sure that no one is
watching, and you would like to see the characters of your passphrase as you
type, clear the Hide Typing check box.
PGPkeys continually gathers random data from many sources on the system,
including mouse positions, timings, and keystrokes. If the Random Data
screen does not appear, it indicates that PGP has already collected all the
random data that it needs to create the keypair.
If you are in a Microsoft Exchange Server environment, PGP informs you that
it needs to retrieve your email user ID from your Exchange server in order to
add it to your new PGP key. If this is the case, continue with the instructions
outlined in “Adding your email ID from your Microsoft Exchange Server to your
new key” on page 100.
12. When the key generation process indicates that it is done, click Next.
13. Click Finish.
PGP automatically puts your private key on your private keyring and your pub-
lic key on your public keyring.
4. Click OK.
The Microsoft Exchange Server screen appears.
The appearance of this screen varies depending on what version of Outlook
you are using.
5. Enter the full name of your Exchange Server in the Microsoft Exchange server
field and enter your user login name in the Mailbox field.
6. Click Check Name.
If the login information is entered correctly, the names are underlined. If you
do not know what Exchange Server you are on, or if the names did not under-
line, then contact your Microsoft Exchange administrator.
7. Click OK.
PGP continues the key generation process and adds your Microsoft Exchange
email user ID to your new PGP key.
8. When the key generation wizard indicates that it is done, click Next.
9. Click Finish.
PGP automatically puts your private key on your private keyring and your pub-
lic key on your public keyring.
Keys generated on a smart card cannot be backed up because the private portion of
your keypair is non-exportable.
You can configure PGP to back up your keyrings automatically after you close PGP.
Your keyring backup options can be set in the Advanced tab of the Options
screen.
You cannot reconstruct a key that was generated on a smart card because the pri-
vate portion of the keypair is non-exportable.
3. On the Key Reconstruction screen, enter five questions that only you can
answer in the Prompt boxes (the default questions are examples only).
Choose obscure personal questions with answers that you are not likely to
forget. Your questions can be up to 95 characters in length.
An example of a good question might be, “Who took me to the beach?” or
“Why did Fred leave?”
An example of a bad question would be, “What is my mother’s maiden
name?” or “Where did I go to high school?”
If you prefer, you can also leave the questions blank and simply provide five
answers.
4. In the Answer boxes, enter the answers to the corresponding questions. Your
answers are case sensitive and can be up to 255 characters in length.
Use the Hide Answers check box to view or hide your answers.
5. Click OK to continue.
If the PGP Enter Passphrase for Key screen appears, enter the passphrase for
your key, then click OK.
If the Server User ID and Password screen appears, enter your user ID and
password to log on to the server. If you do not know your user ID or pass-
word, consult your administrator.
6. Click OK.
Your private key is split into five pieces, using Blakely-Shamir key splitting.
Three of the five pieces are needed to reconstruct the key. Each piece is then
encrypted with the hash, the uniquely identifying number, of one answer. If
you know any three answers, you can successfully reconstruct the whole key.
This chapter tells you about how to exchange keys; that is, how to distribute your
public key (so that others can send you encrypted messages) and how to get the
public keys of others (so that you can send encrypted messages to them). It also
describes how to validate someone’s public key.
Overview
After you create your keypair, you need to exchange keys with those whom you
intend to exchange encrypted messages. You make your public key available to
others so that they can send you encrypted information and verify your digital sig-
nature; to send encrypted messages to them, you will need their public keys.
Your public key is basically composed of a block of text, so it is quite easy to make
it available through a public keyserver, include it in an email message, or export or
copy it to a file. The recipient can then use whatever method is most convenient
to add your public key to his or her public keyring.
Finally, once you have someone’s public key, you should validate it to make sure it
belongs to the person to whom it’s supposed to belong.
Your email application opens with your key information already in place.
4. Address the message and send it.
If this method doesn’t work for you, you can open PGPkeys, select your keypair, pull
down the Edit menu and select Copy, open an email message, then Paste. With
some email applications you can simply drag your key from PGPkeys into the text of
your email message to transfer the key information.
3. Choose the server you wish to search from the Search for keys on
drop-down menu.
4. Specify your search criteria.
You can search for keys on a key server by specifying values for multiple key
characteristics.
The inverse of most of these operations is also available. For example, you
may search using “User ID is not Charles” as your criteria.
5. Enter the value you want to search for.
6. Click More Choices to add additional criteria to your search; for example, Key
IDs with the name Taggert created on or before February 2, 1905.
7. To begin the search, click Search.
A progress bar appears displaying the status of the search. To cancel a search
in progress, click Stop Search.
The results of the search appear in the window.
8. To import the keys, drag them to the PGPkeys main window.
9. Close the PGPkeys Search Window screen.
• If you have an email application that is supported by the PGP plug-ins, then
click in your email application to extract the sender’s public key from the
email and add it to your public keyring.
• If you are using an email application that is not supported by the plug-ins, you
can add the public key to the keyring by copying the block of text that repre-
sents the public key and pasting it into PGPkeys.
Validating keys
When you exchange keys with someone, it is sometimes hard to tell if the key
really belongs to that person. PGP software provides a number of safeguards that
allow you to check a key’s authenticity and to certify that the key belongs to a par-
ticular owner (that is, to validate it). PGP warns you if you attempt to use a key
that is not valid and also by default warns you when you are about to use a mar-
ginally valid key.
For more information on validity and trust, see An Introduction to Cryptography.
This chapter explains how to examine and manage the keys stored on your key-
rings.
Overview
The keys you create, as well as those you collect from others, are stored on key-
rings, which are essentially files stored on your hard drive or on a floppy disk. Nor-
mally your private keys are stored in a file named secring.skr and your public keys
are stored in another file named pubring.pkr. These files are usually located in
your PGP folder and can be viewed and edited from the PGPkeys window.
As a result of your private key being encrypted automatically and your passphrase
being uncompromised, there is little danger in leaving your keyrings on your com-
puter. However, if you are not comfortable storing your keys in the default location,
you can choose a different filename or location.
Occasionally, you may want to examine or change the attributes associated with
your keys. For instance, when you obtain someone’s public key, you might want
to identify its type (either RSA or Diffie-Hellman/DSS), check its fingerprint, or
determine its validity based on any digital signatures included with the key.
You may also want to sign someone’s public key to indicate that you believe it is
valid, assign a level of trust to the key’s owner, or change a passphrase for your
private key. You may even want to search a key server for someone’s key
You perform all of these key-management functions from PGPkeys.
Attribute Description
Shows an iconic representation of the key along with the user name, email
address, photograph of the owner, and the names of the key’s signers.
A gold key and user represents your Diffie-Hellman/DSS keypair, which
consists of your private key and your public key.
A gray key and user represents an RSA keypair, which consists of your
private key and your public key.
A single gold key represents a Diffie-Hellman/DSS public key.
A single gray key represents an RSA public key.
When a key or keypair is dimmed, the keys are temporarily unavailable for
encrypting and signing. You can disable a key from the PGPkeys window,
which prevents seldom-used keys from cluttering up the Key Selection
dialog box.
A gray key on a gold card represents an RSA key stored on a smart card.
Currently, the only key type supported on smart cards is RSA.
A key with a red X indicates that the key has been revoked. Users revoke
their keys when they are no longer valid or have been compromised in
some way.
A single key with a clock icon represents a public key or keypair that has
expired.
Keys
Two users represent a group email distribution list.
Additional icons can be listed with a key indicating that a signature, certificate, or
photographic user ID accompanies the key.
A pencil or fountain pen indicates the signatures of the PGP users who have
vouched for the authenticity of the key:
- A signature with a red X through it indicates a revoked signature.
This icon indicates that a photographic user ID accompanies the public key.
Attribute Description
Indicates the level of confidence that the key actually belongs to the alleged owner.
The validity is based on who has signed the key and how well you trust the
signer(s) to vouch for the authenticity of a key. The public keys you sign yourself
have the highest level of validity, based on the assumption that you only sign
someone’s key if you are totally convinced that it is valid. The validity of any other
keys, which you have not personally signed, depends on the level of trust you have
granted to any other users who have signed the key. If there are no signatures
associated with the key, then it is not considered valid, and a message indicating
this fact appears whenever you encrypt to the key.
Validity is indicated by either circle or bar icons, depending upon your Advanced
Validity Options “Display marginal validity level” setting. If not enabled, then validity
appears as:
a gray circle for invalid keys and marginally valid keys if the Advanced
Options “Treat marginally valid keys as invalid” is set
a green circle for valid keys that you do not own
a green circle and a user for valid keys that you own
In a corporate environment, your PGP administrator may sign users’ keys with the
Corporate Signing Key. Keys signed with the Corporate Signing Key are usually
assumed to be completely valid.
Shows the number of bits used to construct the key. Generally, the larger the key,
the less chance that it will ever be compromised. However, larger keys require
slightly more time to encrypt and decrypt data than do smaller keys. When you
create a Diffie-Hellman/DSS key, there is one number for the Diffie-Hellman portion
Size
and another number for the DSS portion. The DSS portion is used for signing, and
the Diffie-Hellman portion for encryption. When you create an RSAv4 key, the first
number represents the encryption key and the second number represents the
signing key.
Describes the type of information displayed in the Keys column: key type, type of
Description
ID, or signature type.
Additional Shows whether the key has an associated Additional Decryption Key.
Decryption
Key
A unique identifying number associated with each key. This identification number is
Key ID useful for distinguishing between two keys that share the same user name and
email address.
Attribute Description
Indicates the level of trust you have granted to the owner of the key to serve as an
introducer for the public keys of others. This trust comes into play when you are
unable to verify the validity of someone’s public key for yourself and instead rely on
the judgment of other users who have signed the key. When you create a new
keypair, these keys are considered implicitly trustworthy, as shown by the striping
in the trust and validity bars, or by a green dot and user icon.
An empty bar indicates an invalid key or an untrusted user.
A half-filled bar indicates a marginally valid key or marginally trusted
Trust user.
A striped bar indicates a valid key that you own and is implicitly trusted,
regardless of the signatures on the key.
A full bar indicates a completely valid key or a completely trusted user.
When a public key on your keyring is signed by another user, the level of
authenticity for that key is based on the trust you have granted to the signer. Use
the Key Properties screen to assign the signer a level of trust: Trusted, Marginal, or
Untrusted.
Shows the date when the key will expire. Most keys are set to Never; however,
there may be instances when the owner of a key wants it to be used for only a fixed
Expiration
period of time. A single key with a clock icon represents a public key or keypair that
has expired.
Shows the date when the key was originally created. You can sometimes make an
assumption about the validity of a key based on how long it has been in circulation.
Creation If the key has been in use for a while, it is less likely that someone will try to replace
it because there are many other copies in circulation. Never rely on creation dates
as the sole indicator of validity.
If you want to delete a signature or user ID associated with your public key on a key
server, see “Updating your key on a keyserver” on page 139 for instructions.
To enable a key:
1. Open PGPkeys and select the key you want to enable.
2. Select Enable in the Keys menu.
The key becomes visible and can be used as before.
The word list in the fingerprint text box is made up of special authentication
words that PGP uses and are carefully selected to be phonetically distinct and
easy to understand without phonetic ambiguity.
The word list serves a similar purpose as the military alphabet, which allows
pilots to convey information distinctly over a noisy radio channel. If you’d like
to know more about the word hash technique and view the word list, see
Appendix C, Biometric Word Lists,.
2. Choose Sign from the Keys menu or click to open the Sign Keys screen.
The Sign Keys screen appears with the public key and fingerprint displayed in
the text box.
3. Click the Allow signature to be Exported check box, to allow your signature
to be exported with this key.
An exportable signature is one that is allowed to be sent to servers and travels
with the key whenever it is exported, such as by dragging it to an email mes-
sage. The check box provides a shorthand means of indicating that you wish
to export your signature.
4. Click the More Choices button to configure options such as signature type
and signature expiration.
More
signature
options
Choose a signature type to sign the public key with. Your choices are:
• Non-exportable. Use this signature when you believe the key is valid, but
you don’t want others to rely on your certification. This signature type can-
not be sent with the associated key to a key server or exported in any way.
You must sign the key before you can set the trust level for it.
2. Choose Properties from the Keys menu or click to open the Properties
screen.
3. Use the Trust Level sliding bar to choose the appropriate level of trust for the
keypair.
If you want to change the passphrase for a split key, you must first rejoin the key
shares. Click Join to collect the key shares.
3. Enter your current passphrase in the space provided, then click OK.
The Confirmed Passphrase screen appears.
4. Enter your new passphrase in the first text box. Press Tab to advance to the
next text box and confirm your entry by entering your new passphrase again.
5. Click OK.
If you are changing your passphrase because you feel that your passphrase has
been compromised, you should wipe all backup keyrings and wipe your freespace.
When you add or change information in your keypair, always update it on the key
server so that your most current key can be available to anyone.
Although you can view the photographic ID accompanied with someone’s key for
verification, you should always check and compare the digital fingerprints.
2. Drag or paste your photograph onto the Add Photo screen or browse to it by
clicking Select File.
The photograph can be from the Clipboard, a JPG, or BMP file. For maximum pic-
ture quality, crop the picture to 120 x 144 pixels before adding it to the Add Photo
screen. If you do not do this, PGP will scale the picture for you.
3. Click OK.
The Passphrase dialog box opens.
4. Enter your passphrase in the space provided, then click OK.
Your photographic user ID is added to your public key and is listed in the
PGPkeys window.
When you add or change information in your keypair always update it on the key
server so that your most current key can be available to anyone.
your
photograph
Subkeys properties
To access the Subkeys Properties panel for a particular key, select the desired key
and then choose Properties from the Keys menu. The Key Properties screen
appears. Click the Subkeys tab. The Subkeys panel appears.
To avoid confusion when maintaining more than one subkey on your keypair, try not
to overlap your subkeys start and expiration dates.
7. Click OK.
The Passphrase screen appears.
8. Enter your passphrase and then click OK.
Your new subkey is listed in the Subkey window.
When you add or change information in your keypair, always update it on the key
server so that your most current key can be available to anyone.
Revoking subkeys
To revoke a subkey:
1. Open PGPkeys and select your keypair, then click Properties from the Keys
menu or click .
The Properties screen appears.
2. Click the Subkeys tab.
The Subkeys screen opens.
Removing subkeys
To remove a subkey:
1. Open PGPkeys and select your keypair, then click Properties from the Keys
menu, or click .
The Properties screen appears.
2. Click the Subkeys tab.
The Subkeys screen opens.
3. Select the subkey, and click Remove.
A PGP Warning appears informing you that once you remove the subkey, you
will not be able to decrypt information encrypted to it.
4. Click Yes to remove the subkey or click No to cancel this operation.
The subkey is removed and the key disappears from the subkeys window.
The Revokers panel lists any keys that have the ability to revoke your PGP key, and
provides a convenient means for updating a revokers’ key with the Update from
Server button.
If the key belonging to the revoker is not on your keyring, then “Unknown Key”
followed by the keys’ key ID displays instead of the user ID. Highlight the key ID,
and click the Update from Server button to search for the key on a key server.
others not to encrypt to it. To safeguard against this possibility, you can appoint a
third-party key revoker. The third-party you designate is then able to revoke your
key just as if you had revoked it yourself.
For a key to appear revoked to another user, both the revoked key and the Desig-
nated Revoker key must be on his/her keyring. Thus, the designated revoker feature
is most effective in a corporate setting, where all users’ keyrings contain the com-
pany’s Designated Revoker key. If the revokers’ key is not present on a person's key-
ring, then the revoked key does not appear revoked to that user and he/she may
continue to encrypt to it.
This feature is available for Diffie-Hellman/DSS and RSA keys. Designated revok-
ers are not supported by RSA Legacy keys.
To add a designated revoker to your key:
1. Open PGPkeys and then select the keypair for which you want to add a
revoker.
2. Select Add/Revoker from the Keys menu.
A screen opens and displays a list of keys.
3. Select the key(s) in the User ID list that you want to appoint as a revoker.
4. Click OK.
A confirmation screen appears.
5. Click OK to continue.
The Passphrase screen appears.
6. Enter your passphrase, then click OK.
7. The selected key(s) is now authorized to revoke your key. For effective key
management, distribute a current copy of your key to the revoker(s) or upload
your key to the server.
Revoking a key
If the situation ever arises that you no longer trust your personal keypair, you can
issue a revocation to the world telling everyone to stop using your public key. The
best way to circulate a revoked key is to place it on a public key server.
To revoke a key:
1. Open PGPkeys and select the keypair you want to revoke.
2. Choose Revoke from the Keys menu.
The Revocation Confirmation screen appears.
3. Click OK to confirm your intent to revoke the selected key.
The PGP Enter Passphrase screen appears.
4. Enter your passphrase, then click OK.
When you revoke a key, it is marked out with a red X to indicate that it is no
longer valid.
5. Send the revoked key to the server so everyone will know not to use your old
key.
Although your PGP administrator should not ordinarily use the Additional Decryption
keys, there may be circumstances when it is necessary to recover someone’s
email. For example, if someone is injured and out of work for some time or if email
records are subpoenaed by a law enforcement agency and the corporation must
decrypt mail as evidence for a court case.
(The CA’s signature on the certificate makes it possible to detect any subse-
quent tampering with the identifying information or the public key, and it
implies that the CA considers the information in the certificate valid.)
4. Retrieve the certificate issued by the CA and add it to your keypair.
Each of these four steps is described in greater detail in the following sections.
To add an X.509 certificate to your PGP keypair:
1. Obtain and add the Root CA certificate to your PGP keyring.
To do this, follow these steps:
a. Open your Web browser and connect to the CA’s enrollment site. If you do
not know the URL, consult your company’s PGP or PKI administrator.
b. Locate and examine the Root CA certificate. This process varies between
Certificate Authorities. For example, if your company were using the
iPlanet CMS server, you would click the Download a CA Certificate link,
and then click the Examine this Certificate button.
c. Copy the key block for the Root CA certificate and paste it into your PGP-
keys window.
The Import Key screen appears and imports the Root CA certificate into
your keyring.
d. Sign the Root CA certificate with your key to make it valid, then open the
Key Properties and set the trust level. Trust must be set on the Root CA.
2. Configure the CA tab in the Options screen.
To do this, follow these steps:
a. Select Options from the PGPkeys Edit menu, then select the CA tab.
b. Enter the CA’s URL in the Certificate Authority Identification URL field, for
example, https://nnn.nnn.nnn.nnn:nnnnn (this is the same URL you used
to retrieve the Root CA).
c. If there is a separate URL for retrieving certificate revocation lists (CRLs),
enter it in the corresponding field.
If you do not know the URL for Revocation, leave this field blank or consult
your company’s PGP or PKI administrator.
d. In the Type box, specify the name of certificate authority you are using.
Your choices are:
Net Tools PKI
VeriSign OnSite
Entrust
iPlanet CMS
Windows 2000
e. Click the Select Certificate button, then select the Root CA certificate you
just retrieved.
The Root Certificate text box displays information on the selected root CA
certificate. The terminology for the certificate is a policy decision. Typically,
the following terminology is true for X.509 certificates.
Term: Description:
CN Often a description of the type of certificate (for exam-
(Common Name) ple, “Root”).
EMAIL The email address for the certificate holder.
OU The organization to which the certificate belongs (for
(Organizational Unit) example, “Accounting”).
O Typically the name of the company to which the certifi-
(Organization) cate belongs (for example, “Secure Corp.”).
L The location of the holder of the certificate (for exam-
(Locality) ple, “Santa Clara”).
f. Click OK.
3. Make a certificate request.
To do this, follow these steps:
a. Right-click on your PGP keypair and select Keys—>Add—>Certificate
from the Keys right-click menu.
The Certificate Attributes dialog box appears.
b. Verify the certificate attributes; use the Add, Edit, and Remove buttons to
make any required changes, and click OK. The PGP Enter Passphrase
screen appears.
c. Enter the passphrase for your keypair, then click OK.
The PGP Server Progress bar appears.
The certificate request is sent to the CA server. The server authenticates
itself to your computer and accepts your request.
When you add or change information in your keypair, always update it on the key
server so that your most current key can be available to anyone.
Split keys are not compatible with versions of PGP previous to 6.0.
You cannot split a key generated on a smart card because the private portion of your
keypair is non-exportable.
The total number of shares that make up the Group Key in the following exam-
ple is four and the total number of shares required to decrypt or sign is three.
This provides a buffer in the event that one of the shareholders is unable to
provide his or her key share or forgets the passphrase.
9. Distribute the key shares to the owners, then delete the local copies.
Once a key is split among multiple shareholders, attempting to sign or decrypt
with it will cause PGP to automatically attempt to rejoin the key.
Before receiving key shares over the network, you should verify each shareholder’s
fingerprint and sign their public key to ensure that their authenticating key is legiti-
mate.
If you have not signed the key that is being used to authenticate the remote
system, the key will be considered invalid. Although you can rejoin the split
key with an invalid authenticating key, it is not recommended. You should ver-
ify each shareholder’s fingerprint and sign each shareholder’s public key to
ensure that the authenticating key is legitimate.
6. Click Confirm to accept the share file.
7. Continue collecting key shares until the value for Total Shares Collected
matches the value for Total Shares Needed on the Key Shares Collection
screen.
8. Click OK.
The file is signed or decrypted with the split key.
To send your key share over the network:
1. When you are contacted by the person who is rejoining the split key, make
sure that you have these items:
• your key share file and password
• your keypair (for authentication to the computer that is collecting the key
shares)
• a network connection
• the IP address or Domain Name of the rejoining computer collecting the
key shares
2. Select Send Key Shares on the PGPkeys File menu.
3. Choose Send Share File from the PGPkeys File menu.
The Select Share File screen appears.
4. Locate your key share and then click Open.
The PGP Enter Passphrase screen appears.
6. Enter the IP address or the Domain Name of the rejoining computer in the
Remote Address text box, then click Send Shares.
The status of the transaction is displayed in the Network Status box. When
the status changes to “Connected,” you are asked to authenticate yourself to
the rejoining computer.
The Remote Authentication screen appears asking you to confirm that the
remote computer is the one to whom you want to send your key share.
7. Click Confirm to complete the transaction.
After the remote computer receives your key shares and confirms the transac-
tion, a message box appears stating that the shares were successfully sent.
8. Click OK.
9. Click Done in the Key Shares window when you have completed sending your
key share.
When you delete a key, signature, or user name from a key, it is removed and not
recoverable. Signatures and user names can be added again to a key, and an
imported public key can be imported again to your keyring. However, a private key
that exists only on that keyring cannot be created again, and all messages
encrypted to its public key copies can no longer be decrypted.
This procedure is for removing signatures or user names associated with your key
on LDAP key servers only. Additionally, the key server must be configured to allow
this action. If you do not know the type server or its configuration settings, consult
the key server administrator for your company before updating your key.
1. Open PGPkeys.
2. Choose Search from the Server menu or click in the PGPkeys menu.
The PGPkeys Search window appears.
3. Choose the server you want to search from the Search for Keys On menu.
4. Specify your search criteria to locate your public key:
The default is User ID, but you can click the arrows to select Key ID, Key Sta-
tus, Key Type, Key Size, Creation Date, or Expiration Date. For example, you
might search for all keys with the User ID of Fred.
5. To begin the search, click Search.
The results of the search appear in the window.
6. Right-click on the key that you want to remove from the server, then select
Delete from the menu.
The Passphrase screen appears.
7. Enter the passphrase for the key you want to remove from the server, then
click OK.
The Confirmation screen appears and the key is removed.
8. Update your key (remove the unwanted signatures or user names).
9. Copy the updated key to the server.
If the key server is configured to synchronize keys with other key servers,
your key will be updated on the other servers automatically upon synchroniza-
tion.
If you delete your key from a key server, you should be aware that someone who
has your public key on their keyring can upload it to the server again. You should
check the server periodically to see if the key has reappeared—you may have to
delete your key from the server more than once.
6. In the Passphrase box, enter a new string of characters or words you want to
use as the new passphrase for your new keypair.
Your passphrase should contain multiple words and may include spaces, numbers,
and punctuation characters. Choose something that you can remember easily but
that others won’t be able to guess. The passphrase is case sensitive, meaning that
it distinguishes between uppercase and lowercase letters. The longer your pass-
phrase, and the greater the variety of characters it contains, the more secure it is.
Strong passphrases include upper and lowercase letters, numbers, punctuation, and
spaces but are more likely to be forgotten.
To confirm your entry, press the TAB key to advance to the next line, then
enter the same passphrase again.
7. Click OK.
Your keypair is reconstituted and appears in PGPkeys.
This chapter describes how to set PGP options to suit your particular computing
environment.
When this setting is selected, it is very important that you log off your computer
before leaving it unattended. Your passphrase can remain cached for weeks if you
never log off—anyone could read your encrypted messages or encrypt messages
with your key while you are away from your computer.
If you change the word-wrap setting in PGP, make sure that it is less than the
word-wrap settings in your email application. If you set it to be the same or a greater
length, carriage returns may be added that invalidate your PGP signature.
Click OK to save your changes and close the PGP Options screen or select
another tab to continue configuring your PGP options.
The box at the top of the screen shows configured servers. How to modify the list
of servers and how to add and edit the list of servers is described below.
Make your selections for the following options:
• Encrypting to unknown keys. Select this option to have PGP automatically
look up unknown recipients on the server to locate users that are not on your
keyring when encrypting email.
• Signing keys. Select this option to allow keys to which you’re adding your sig-
nature first to be updated from the server and then your changes sent to the
server upon completion of the update.
• Adding names/photos/revokers. Select this option to allow keys to which
you’ve added names, photographs, or revokers first to be updated from the
server and then your changes sent to the server upon completion of the
update. Updating the key beforehand ensures that, for example, the key has
not been revoked since you last updated it.
• Revocation. Select this option to allow keys you revoke first to be updated
from the server and then your changes sent to the server upon completion of
the update.
• Verification. Select this option to have PGP automatically search and import
from the key server when verifying a signed email message or file for which
you do not have the sender’s public key.
2. In the Type drop-down list, select the type of server to use to access the key-
server. Your choices are:
• PGP Keyserver HTTP. Select this option if you are using a Web-based PGP
Keyserver to store and retrieve PGPkeys.
• PGP Keyserver LDAP. Select this option if you are using a PGP Keyserver
through LDAP to store and retrieve PGPkeys.
• PGP Keyserver LDAPS. Select this option if you are using a PGP Keyserver
through LDAPS to store and retrieve PGPkeys.
• X.509 Directory LDAP. Select this option if you are using a generic LDAP
directory server to store and retrieve X.509 certificates issued by iPlanet
CMS or Microsoft Certificate Services.
• X.509 Directory LDAPS. Select this option if you are using a generic
LDAPS directory server to store and retrieve X.509 certificates issued by
iPlanet CMS or Microsoft Certificate Services.
3. In the Name box, enter the domain name or IP address of the server. For
example, server.pgp.com or 123.45.67.89
4. In the Port box, enter the port number of the server. For example 11371 is
used for old-style HTTP key server, 389 is commonly used for LDAP key serv-
ers. If you don’t know the port number, leave this box blank; the default port
number for the type of server you are configuring will be used.
5. The Key box is for LDAPS servers. The server key is used by the server to
authenticate the connection. (Key information is not displayed until you con-
nect to the server.)
6. Under Serves Key for Domain, select the Any Domain option to allow PGP to
send keys from any domain to this keyserver. This setting also applies to auto-
matic searches and updates. It is enabled by default.
If you want PGP to send only keys from a specific domain to this key server,
select the option below Any Domain. Then, enter the domain name in the
space provided. For example, if you specify the domain pgp.com, only those
keys whose email address ends in pgp.com will be sent to this server.
7. Select the List in search window check box if you want this key server listed
in the PGP Keys Search window.
8. When you have made your selections, click OK.
The Server Information screen disappears and the server you just configured
displays in the list.
9. Click OK to save your changes and close the PGP Options screen or select
another tab to continue configuring your PGP options.
For instructions on how to obtain the Root CA certificate and add an X.509 certifi-
cate to your key, see “Adding an X.509 certificate to your PGP key” on page 129.
Click OK to save your changes and close the PGP Options screen or select
another tab to continue configuring your PGP options.
Clear the Allowed Algorithms check boxes only if you have suddenly learned that a
particular algorithm is insecure. For example, if you become aware that IDEA has
been broken, you can deselect that check box and all new keys you generate will
have a record that IDEA may not be used when encrypting to you.
Encrypting to a public key will fail if neither the Preferred Algorithm nor any of
the Allowed Algorithms are available to the person encrypting the message.
• Display marginal validity level. Use this check box to specify whether to dis-
play marginally valid keys as such, or simply to show validity as on or off. Mar-
ginal validity appears as bar icons having differing shading patterns. On/off
validity appears as circle icons; green for valid, gray for invalid (the key has not
been validated; it has not been signed by either a trusted introducer or by you)
• Treat marginally valid keys as invalid. Use this check box to specify whether
to treat all marginally valid keys as invalid. Selecting this option causes the Key
Selection dialog box to appear whenever you encrypt to marginally valid keys.
• Warn when encrypting to keys with ADKs. Use this check box to specify
whether to issue a warning whenever an encrypt-to key has an associated
Additional Decryption Key.
• Export Format. The options are:
• Compatible: Exports keys in a format compatible with previous versions
of PGP.
• Complete: Exports the new key format, which includes photographic IDs
and X.509 certificates.
• Smart card support. Select the type of smart card you want PGP to support.
You can only support one type of smart card at any given time. Your options
are:
• None. Select this option if you do not have a smart card reader installed or
you do not want PGP to support any type of smart card.
• Aladdin. Select this option if you want to use the Aladdin eToken Pro
product line of USB smart cards with PGP.
• Gemplus. Select this option if you want to use GemPlus GemSafe Enter-
prise brand smart cards with PGP.
• Rainbow. Select this option if you want to use Rainbow iKey 20XX brand
smart cards with PGP.
• Schlumberger. Select this option if you want to use Schlumberger
Cryptoflex brand smart cards with PGP.
• Other. Select this option if you are using a type of smart card other than
Aladdin eToken, GemSafe GemPlus, Rainbow, or Schlumberger. You will
be asked to enter the filename for the DLL for the card you want PGP to
support.
• Automatic keyring backup when PGPkeys closes. Select this check box to
back up your public and private keyrings automatically when you close PGP.
• Back up to keyring folder. Select this option to store your keyring back up
files in the default PGP keyring folder.
• Back up to. Select this option to specify the location in which you want to
store your backup files.
Click OK to save your changes and close the PGP Options screen or select
another tab to continue configuring your PGP options.
You may lose data if you unmount a PGPdisk volume that contains open files. If you
select Allow forcible unmounting of PGPdisks with open files you will receive a
warning if there are open files in the PGPdisk volume you are unmounting. You are
not warned of open files if you select the Don’t ask before forcibly unmounting a
PGPdisk option.
• Auto unmount after [15] minutes of inactivity. When checked, this option
causes PGPdisk to automatically unmount any mounted PGPdisk volumes
when your computer is inactive for the number of minutes in the box. You can
set this value from 1 to 999 minutes.
PGPdisk cannot automatically unmount a PGPdisk volume if any of the files in that
volume are open.
• Auto unmount on computer sleep. When checked, this option causes PGP-
disk to automatically unmount any mounted PGPdisk volumes when your
computer goes into Sleep mode. (Not all computer models have a sleep
mode.)
Put a checkmark next to Prevent sleep if any PGPdisk could not be
unmounted if you want to prevent your computer from sleeping if a PGPdisk
could not be unmounted.
Click OK to save your changes and close the PGP Options screen or select
another tab to continue configuring your PGP options.
This appendix presents information about problems you may encounter while
using PGP and suggests solutions. The following table lists PGP errors, a possible
cause for the error, and a solution.
Cannot perform the The output is larger than If you are encrypting or signing,
requested operation the internal buffers can you may have to break up the
because the output handle. message and encrypt/sign smaller
buffer is too small. pieces at a time. If you are
decrypting or verifying, ask the
sender to encrypt/sign smaller
pieces and re-send them to you.
Could not encrypt to The selected key can Choose a different key, or gener-
specified key only be used for signing. ate a new key that can encrypt
because it is a data.
sign-only key.
Could not sign with The selected key can Choose a different key, or gener-
specified key only be used for encrypt- ate a new key that can sign data.
because it is an ing.
encrypt-only key.
Error in domain name The destination address Check to make sure that the desti-
system you provided is incor- nation address you provided is the
rect, or your network correct one. If you are sure of this,
connection is misconfig- check your connection to the net-
ured. work.
No secret keys could There are no private Generate your own pair of keys in
be found on your key- keys on your keyring. PGPkeys.
ring.
Socket is not con- The network connection Try re-establishing the connection
nected to the PGP key server or by repeating the procedure you
to the network share file used to start the connection. If
connection has been that fails, check your connection to
broken. the network.
The action could not The program failed to The file is probably corrupt. Try
be completed due to read or write data in a altering your PGP Options to use a
an invalid file opera- certain file. different file, if possible.
tion.
The evaluation time The product evaluation Download the freeware version or
for PGP encrypting time has expired. buy the commercial version of the
and signing has product.
passed. Operation
aborted.
The keyring contains The PGP message that Ask the sender to re-send the
a bad (corrupted) you are working with message if it's a message that
PGP packet. has been corrupted, or you're working with. If it's your
your keyring has been keyring, try restoring from your
corrupted. backup keyring.
The keyring file is The program failed to There is a file that is probably cor-
corrupt. read or write data in a rupt or missing. It may or may not
certain file. be the keyring file. Try using a dif-
ferent file name or path, if possi-
ble.
The message/data The signature for the Double-click on the detached sig-
contains a detached message/file is located nature file first.
signature. in a separate file.
The passphrase you The passphrase you You may have the CAPS LOCK on,
entered does not entered is incorrect. or you simply may have mis-typed
match the pass- the passphrase. Try again.
phrase on the key.
The specified user ID You can't add a User ID Try adding a different user ID, or
was not added to a key if there is one delete the matching one first.
because it already just like it already on the
exists on the key.
selected key.
The specified key The key needed to Ask the sender of the message to
could not be found decrypt the current mes- re-send the message and make
on your keyring. sage is not on your key- sure they encrypt the message to
ring. your public key.
The specified input The file name typed in Browse to find the exact name
file does not exist. does not exist. and path of the file you want.
There is not enough The random number When prompted, move the mouse
random data cur- generator needs more around, or press random keys, in
rently available. input in order to gener- order to generate input.
ate good random num-
bers.
There was an error The program failed to Your hard drive may be full, or if
during the writing of write data to a certain the file is on a floppy, the floppy is
the keyring or the file. not present in the floppy drive.
exported file.
There was an error A file that was needed Make sure the settings in your
opening or writing couldn't be opened. PGP Options is correct. If you've
the keyring or the recently deleted files in the direc-
output file. tory that you installed PGP, you
may need to re-install the product.
This key is already You can't sign a key that You may have accidentally picked
signed by the speci- you have already signed. the wrong key. If so, choose a dif-
fied signing key. ferent key to sign.
Unable to perform A file that was needed is Close other programs that may be
operation because set to read-only or is accessing the same files as the
this file is read-only being used by another program you are running. If you
or otherwise pro- program. keep your keyring files on a floppy
tected. If you store disk, make sure that the floppy
your keyring files on disk is in the floppy drive.
removable media the
media may not be
inserted.
set from the beginning of the byte sequence. For example, suppose the word
“adult” and the word “amulet” each appears in the same corresponding position
in the two word lists, position 5. That means that the repeating three-byte
sequence 05 05 05 is represented by the 3-word sequence “adult, amulet, adult.”
This approach makes it easy to detect all three kinds of common errors in spoken
data streams: transposition, duplication, and omission. A transposition will result
in two consecutive words from the even list followed by two consecutive words
from the odd list (or the other way around). A duplication will be detected by two
consecutive duplicate words, a condition that cannot occur in a normal sequence.
An omission will be detected by two consecutive words drawn from the same
list.
To facilitate the immediate and obvious detection by a human of any of the three
error syndromes described above, without computer assistance, we made the
two lists have one obviously different property: The even list contains only
two-syllable words, while the odd list contains only three-syllable words. That
suggestion came from Patrick Juola, a computational linguist.
PGPfone was the application that precipitated the actual development of the word
list by Juola and Zimmermann. PGPfone is an application that turns your com-
puter into a secure telephone. We used it to authenticate PGPfone’s initial Dif-
fie-Hellman key exchange without using digital signatures and public key
infrastructures. We knew we would end up using it for authenticating PGP key fin-
gerprints when we applied it to PGP later.
The idea behind building the word lists was to develop a metric to measure the
phonetic distance between two words, then use that as a goodness measure to
develop a full list. Grady Ward provided us with a large collection of words and
their pronunciations, and Patrick Juola used genetic algorithms to evolve the best
subset of Ward’s list.
To briefly summarize what he did, he made a large population of guesses and let
the population “sexually reproduce” by exchanging words with other guesses—
and, like biological evolution, the better guesses survived into the next genera-
tion. After about 200 generations, the list had mostly stabilized into a best guess,
with far greater phonetic distance between the words than what we started with
in the initial guess lists.
The first major hurdle was the development of the metric. Linguists have studied
sound production and perception for decades, and there is a standard feature set
used to describe sounds in English. For example, say the words “pun,” “fun,”
“dun,” and “gun” (go ahead, try it), and notice how your tongue keeps moving
back in your mouth on each word. Linguists call this the “place of articulation,”
and noises that are very different in this feature sound different to English speak-
ers. Combining the features of all the sounds in a word gives us a representation
of the sound of the entire word—and we can compute the phonetic distance
between a pair of words.
Actually, it wasn’t that simple. We didn’t know how to weight the various features,
certain word-level features like accents were hard to represent, and the fea-
ture-based analysis simply fails for certain sounds. There were also a few other
more subtle criteria; for example, we wanted the words to be common enough to
Zulu
Yucatan
Glossary 169
PGP Desktop User’s Guide
Backdoor
A cipher design fault, planned or accidental, which allows the apparent
strength of the design to be easily avoided by those who know the trick.
When the design background of a cipher is kept secret, a back door is often
suspected.
Blind signature
Ability to sign documents without knowledge of content, similar to a notary
public.
Block cipher
A symmetric cipher operating on blocks of plain text and cipher text, usually
64 bits.
CA (Certificate Authority)
A trusted third party (TTP) who creates certificates that consist of assertions
on various attributes and binds them to an entity and/or to their public key.
CAPI (Crypto API)
Microsoft’s crypto API for Windows-based operating systems and applica-
tions.
CAST
A 64-bit block cipher using 64-bit key, six S-boxes with 8-bit input and 32-bit
output, developed in Canada by Carlisle Adams and Stafford Tavares.
Certificate (digital certificate)
An electronic document attached to a public key by a trusted third party, which
provides proof that the public key belongs to a legitimate owner and has not
been compromised.
Certification
Endorsement of information by a trusted entity.
Certify
To sign another person’s public key.
Certifying authority
One or more trusted individuals who are assigned the responsibility of certify-
ing the origin of keys and adding them to a common database.
Ciphertext
Plaintext converted into a secretive format through the use of an encryption
algorithm. An encryption key can unlock the original plaintext from ciphertext.
Clear-signed message
Messages that are digitally signed but not encrypted.
Clear text
Characters in a human readable form or bits in a machine-readable form (also
called plain text).
Compression function
A compression function takes a fixed-sized input and returns a shorter, fixed
sized output.
170 Glossary
User’s Guide PGP Desktop
Glossary 171
PGP Desktop User’s Guide
Direct trust
An establishment of peer-to-peer confidence.
Digital signature
See signature.
DSA (Digital Signature Algorithm)
A public key digital signature algorithm proposed by NIST for use in DSS.
DSS (Digital Signature Standard)
A NIST proposed standard (FIPS) for digital signatures using DSA.
ECC (Elliptic Curve Cryptosystem)
A unique method for creating public key algorithms based on mathematical
curves over finite fields or with large prime numbers.
EES (Escrowed Encryption Standard)
A proposed U.S. government standard for escrowing private keys.
Elgamal scheme
Used for both digital signatures and encryption based on discrete logarithms
in a finite field; can be used with the DSA function.
Encryption
A method of scrambling information to render it unreadable to anyone except
the intended recipient, who must decrypt it to read it.
Fingerprint
A uniquely identifying string of numbers and characters used to authenticate
public keys. This is the primary means for checking the authenticity of a key.
See Key Fingerprint.
FIPS (Federal Information Processing Standard)
A U.S. government standard published by NIST.
Firewall
A combination of hardware and software that protects the perimeter of the
public/private network against certain attacks to ensure some degree of secu-
rity.
Hash function
A one way function that takes an input message of arbitrary length and pro-
duces a fixed length digest.
Hierarchical trust
A graded series of entities that distribute trust in an organized fashion, com-
monly used in ANSI X.509 issuing certifying authorities.
HTTP (HyperText Transfer Protocol)
A common protocol used to transfer documents between servers or from a
server to a client.
172 Glossary
User’s Guide PGP Desktop
Hexadecimal
Hexadecimal describes a base-16 number system. That is, it describes a num-
bering system containing 16 sequential numbers as base units (including 0)
before adding a new position for the next number. (Note that we're using
“16” here as a decimal number to explain a number that would be “10” in
hexadecimal.) The hexadecimal numbers are 0-9 and then use the letters A-F.
IDEA (International Data Encryption Standard)
A 64-bit block symmetric cipher using 128-bit keys based on mixing opera-
tions from different algebraic groups. Considered one of the strongest algo-
rithms.
Implicit trust
Implicit trust is reserved for keypairs located on your local keyring. If the pri-
vate portion of a keypair is found on your keyring, PGP assumes that you are
the owner of the keypair and that you implicitly trust yourself.
Integrity
Assurance that data is not modified (by unauthorized persons) during storage
or transmittal.
Introducer
A person or organization who is allowed to vouch for the authenticity of some-
one’s public key. You designate an introducer by signing their public key.
ISO (International Organization for Standardization)
Responsible for a wide range of standards, like the OSI model and interna-
tional relationship with ANSI on X.509.
Key
A digital code used to encrypt and sign and decrypt and verify messages and
files. Keys come in keypairs and are stored on keyrings.
Key escrow/recovery
A practice where a user of a public key encryption system surrenders their pri-
vate key to a third party thus permitting them to monitor encrypted communi-
cations.
Key exchange
A scheme for two or more nodes to transfer a secret session key across an
unsecured channel.
Key fingerprint
A uniquely identifying string of numbers and characters used to authenticate
public keys. For example, you can telephone the owner of a public key and
have him or her read the fingerprint associated with their key so you can com-
pare it with the fingerprint on your copy of their public key to see if they
match. If the fingerprint does not match, then you know you have a bogus key.
Key ID
A legible code that uniquely identifies a keypair. Two keypairs may have the
same user ID, but they will have different Key IDs.
Glossary 173
PGP Desktop User’s Guide
Key length
The number of bits representing the key size; the longer the key, the stronger
it is.
Key management
The process and procedure for safely storing and distributing accurate crypto-
graphic keys; the overall process of generating and distributing cryptographic
key to authorized recipients in a secure manner.
keypair
A public key and its complimentary private key. In public-key cryptosystems,
like the PGP program, each user has at least one keypair.
Keyring
A set of keys. Each user has two types of keyrings: a private keyring and a
public keyring.
Key splitting or “secret sharing”
The process of dividing up a private key into multiple pieces, and share those
pieces among a group of people. A designated number of those people must
bring their shares of the key together to use the key.
LDAP (Lightweight Directory Access Protocol)
A simple protocol that supports access and search operations on directories
containing information such as names, phone numbers, and addresses across
otherwise incompatible systems over the Internet.
Message digest
A compact “distillate” of your message or file checksum. It represents your
message, such that if the message were altered in any way, a different mes-
sage digest would be computed from it.
Meta-introducer
A trusted introducer of trusted introducers.
MIC (Message Integrity Check)
Originally defined in PEM for authentication using MD2 or MD5. Micalg (mes-
sage integrity calculation) is used in secure MIME implementations.
MIME (Multipurpose Internet Mail Extensions)
A freely available set of specifications that offers a way to interchange text in
languages with different character sets, and multimedia email among many
different computer systems that use Internet mail standards.
Non-repudiation
Preventing the denial of previous commitments or actions.
One-way hash
A function of a variable string to create a fixed length value representing the
original pre-image, also called message digest, fingerprint, message integrity
check (MIC).
Passphrase
An easy-to-remember phrase used for better security than a single password;
key crunching converts it into a random key.
174 Glossary
User’s Guide PGP Desktop
Password
A sequence of characters or a word that a subject submits to a system for pur-
poses of authentication, validation, or verification.
PGP/MIME
An IETF standard (RFC 2015) that provides privacy and authentication using
the Multipurpose Internet Mail Extensions (MIME) security content types
described in RFC1847, currently deployed in PGP 5.0 and later versions.
PKCS (Public Key Crypto Standards)
A set of de facto standards for public key cryptography developed in coopera-
tion with an informal consortium (Apple, DEC, Lotus, Microsoft, MIT, RSA, and
Sun) that includes algorithm-specific and algorithm-independent implementa-
tion standards. Specifications defining message syntax and other protocols
controlled by RSA Data Security, Inc.
PKI (Public Key Infrastructure)
A widely available and accessible certificate system for obtaining an entity’s
public key with some degree of certainty that you have the “right” key and
that it has not been revoked.
Plaintext
Normal, legible, un-encrypted, unsigned text.
Private key
The secret portion of a keypair-used to sign and decrypt information. A user's
private key should be kept secret, known only to the user.
Private keyring
A set of one or more private keys, all of which belong to the owner of the pri-
vate keyring.
Public key
One of two keys in a keypair-used to encrypt information and verify signa-
tures. A user's public key can be widely disseminated to colleagues or strang-
ers. Knowing a person's public key does not help anyone discover the
corresponding private key.
Public keyring
A set of public keys. Your public keyring includes your own public key(s).
Public-key cryptography
Cryptography in which a public and private keypair is used, and no security is
needed in the channel itself.
Random number
An important aspect to many cryptosystems, and a necessary element in
generating a unique key(s) that are unpredictable to an adversary. True random
numbers are usually derived from analog sources, and usually involve the use
of special hardware.
Revocation
Retraction of certification or authorization.
Glossary 175
PGP Desktop User’s Guide
176 Glossary
User’s Guide PGP Desktop
Glossary 177
PGP Desktop User’s Guide
Validity
Indicates the level of confidence that the key actually belongs to the alleged
owner.
Verification
The act of comparing a signature created with a private key to its public key.
Verification proves that the information was actually sent by the signer, and
that the message has not been subsequently altered by anyone else.
Web of trust
A distributed trust model used by PGP to validate the ownership of a public
key where the level of trust is cumulative, based on the individuals’ knowl-
edge of the introducers.
X.509
An ITU-T digital certificate that is an internationally recognized electronic docu-
ment used to prove identity and public key ownership over a communication
network. It contains the issuer’s name, the user’s identifying information, and
the issuer’s digital signature, as well as other possible extensions.
178 Glossary
Index
A D
about decrypting
PGP keyrings 111 email 34
PGP Wipe utility 39, 45 ICQ messages 55
PGPdisk volumes 89 using PGPtray 38
accessing with split keys 39
PGPdisk 73 default key pair
adding specifying 115
a photo ID to a key 122 deleting
a Root CA certificate to your key 130 a subkey 126
combining groups 33 digital signatures 116
alternate passphrases files 39, 45
adding to PGPdisk 82 keys
from a smart card 69
attributes
from your keyring 116
changing your keyrings’ 111–115
recipient groups 33
viewing your keyrings’ 111–115
user IDs 116
Auto unmount preference
using Secure Wipe 39, 45
after x minutes of inactivity 85
designated revoker
on computer sleep 157
properties 127
automatic
Diffie-Hellman/DSS keys
mounting of PGPdisk volumes 77, 85
an overview of 93
unmounting of PGPdisk volumes 85, 157
digital signature
deleting 116
C
disks
Certificate server. See key server
deleting free space 39, 45
changing
scheduled wiping 41, 49
a passphrase for a PGPdisk volume 82
wiping files from 39, 45
your passphrase 121
distributing
checking
PGPdisk volumes 87
authenticity of a key 110
distribution lists
conventional encryption 29, 31, 38, 62
adding members to a group list 33
creating combining groups 33
a custom key pair 97 creating a group 32
a key pair on a smart card 66 deleting a group 33
a new PGPdisk volume 75 deleting a member 33
recipient groups 32
custom key
creating 97
Index 179
PGP Desktop User’s Guide
E F
email files
combining recipient groups 33 deleting 39, 45
copying public keys from 109 exporting public keys to 107
creating recipient groups 32 importing public keys from 110
decrypting 34, 35 wiping 39, 45
deleting recipient groups 33 fingerprints
encrypting 27, 33 example of hexadecimal view 118
to groups of people 32 example of word list view 118
including your public key in 106 folder wiping
receiving private 27 scheduling 41, 49
sending private 27
forgotten passphrase 103
signing 27, 33
verifying 34, 35 Free Space Wipe 39, 45
scheduling tasks 41, 49
encrypting
email 27, 33, 34, 35
to groups of people 32 G
ICQ messages 59 generating
encryption options a custom key pair 97
email a key pair on a smart card 65
conventional 29, 31, 62 granting
Secure Viewer 28, 30 trust for key validations 120
files groups
conventional 38 adding members 33
Secure Viewer 38 combining groups 33
self decrypting archive 38
creating 32
text output 38
deleting 33
wipe original 38
Entrust 131
H
Eudora 34
HTTP (HyperText Transfer Protocol)
with PGP/MIME 34
definition 172
without PGP/MIME 35
examining
I
key properties 117
smart card properties 67 ICQ
decrypting messages 55
exchanging
encrypting messages 59
PGPdisk volumes 87
exchanging keys 56
public keys
obtaining others’ 108–110 using the PGP ICQ Wizard 57
via ICQ 56 importing
exporting Pkcs-12 X.509 private keys 110
keys, to files 107 private keys 110
your key from a smart card 69 public keys, from files 110
iPlanet CMS 131
180 Index
User’s Guide PGP Desktop
K keys
key ID adding a photo ID 122
properties 124 adding your Microsoft Exchange Server ID
to 100
key pair
copying a key pair to a smart card 70
copying to a smart card 70
creating on a smart card 65
examining 97
deleting from your keyring 116
specifying default 115
examining 97
key reconstruction server exporting from a smart card 69
restore your key from 141 granting trust for validations 120
send your key to 103 lost 103, 141
key server managing 111
getting someone’s public key from 108 on a smart card 67
searching 108 reappearing on server 141
sending your public key to 105 reconstructing 103, 141
updating your key on the server 139 rejoining a split key 136
using to circulate revoke keys 128 removing signatures 140
key size removing user names 140
Diffie-Hellman portion 98 replacing a photo ID 123
DSS portion 98 revoking 128
setting 98, 125 setting size of 98, 125
trade-offs 98, 125 signing 119
keyrings updating on a key server 139
changing attributes of 111–115 verifying authenticity of 110
description of 111
location of 111 L
storing elsewhere 111 legitimacy
viewing attributes of 111–115 determining a key’s 110
Lotus Notes
decrypting and verifying with 62
encrypting with 61
signing with 61
M
managing
keys 111
Microsoft Exchange Server user ID
adding to your new key 100
MIME standard
using to decrypt email 34, 35
mounting PGPdisk volumes 78
automatically 77, 85
on a remote server 86
Index 181
PGP Desktop User’s Guide
182 Index
User’s Guide PGP Desktop
public keys S
add or remove for a PGPdisk file 78 scheduling
advantages of sending to key server 105 folder wiping 41, 49
copying from a smart card 69 free space wiping 41, 49
copying from email messages 109 the Free Space Wiper 41, 49
exporting to files 107
searching key server 108
getting from a key server 108
Secure Viewer
importing from files 110
email encryption option 27
including in an email message 106
with previous versions 28, 30
location of 111
obtaining others’ 108–110 Secure Wipe
searching key server 108 using 39, 45
sending to key server 105 Self Decrypting Archive (SDA)
signing 119 creating 38
sending
R private email 27
receiving servers
private email 27 mounting PGPdisk volumes on 86
recipient groups servers. See also key servers
combining groups 33 setting
creating 32 passphrase for a key 24, 96, 98, 142
deleting 33 signing 116
deleting a group 33 email 27, 33
recipients keys 119
groups of 32 public keys 119
reconstructing your key 103, 141 with split keys 39
rejoining a split key 136 sleep mode
removing unmounting PGPdisk in 157
a photo ID from a key 123 smart card
a subkey 126 changing passphrase 71
files, using Secure Wipe 39, 45 copying a key pair to 70
keys from a smart card 69 copying your public key from 69
revoker creating a new key pair on 66
viewing key properties 127 viewing properties of 67
wiping 69
revoking
a subkey 125 starting
keys 128 PGPdisk 73
Root CA certificates 130
RSA keys
an overview of 93
RSA Legacy keys
an overview of 93
Index 183
PGP Desktop User’s Guide
subkey W
creating new 124 Windows 2000 131
expiration 124
wiping
properties 124
disks 39, 41, 45, 49
removing 126
files 39, 45
revoking 125
using Free Space Wipe 39, 45
size 124
your smart card 69
validity 124
word wrap 148
T
X
tasks
X.509 certificates
scheduled freespace wiping 41, 49
adding
TEMPEST attacks root CA certificates 130
see also Secure Viewer adding to keypair 121
text output 38 importing 110
troubleshooting
PGP 159
trust
granting for key validations 120
U
unmounting
PGPdisk volumes 78, 79
Auto unmount 85
using
Free Space Wipe 39, 41, 45, 49
V
validating
keys
granting trust for 120
validity
checking a key’s 110
verifying
authenticity of a key 110
email 34, 35
VeriSign OnSite 131
viewing
attributes of keyrings 111–115
key attributes 97
volumes
mounting 78
unmounting 79
184 Index