Digital library (interview) RAI Educational

Philip Zimmermann

Rome 26/03/1999

"Privacy: "Pretty Good", the revolutionary software"

SUMMARY:

  • Pretty Good Privacy is an encryption software product for electronic mail and computer files created in 1991 and sent it out free on the Internet (1).
  • PGP started out as a human rights project. Today, human rights groups all over the world use PGP to encrypt files containing eyewitness accounts of atrocities (2).
  • Giving software away is a good way to achieve ubiquity. Pervasive ubiquity of software is a prerequisite to success on the Internet (3).
  • Every time we adopt a new technology to give us convenience and speed in the digital age we leave behind some of the privacy that we used to enjoy. By encrypting the data, we restore some of our privacy (4).
  • It is very easy to intercept electronic mail and other kinds of Internet traffic. The solution is to scramble the information using modern encryption algorithms, so that only the person with the cryptographic keys can read it (5).
  • Once, knowledge of encryption technology was limited to intelligence agencies. But over the last 20 years there has been great progress in the development of encryption of algorithms to scramble information in ways that today is now out of reach of major governments (6).
  • Encryption algorithms have become so good in the past 20 years that the only way to break them is to try every possible key until you have exhausted them all. This would take more time than the earth has been in existence (7).
  • The algorithms used in PGP are the best academic algorithms published in the academic literature about cryptography (8).
  • Intelligence agencies of the major governments, particularly the US National Security Agency, often try to intercept Internet communications (9).
  • The Echelon Project is a large-scale project by the NSA to intercept large amounts of electronic communications in Europe (10).
  • Electronic commerce on the Internet is a perfect example of why you need to use encryption, not only to protect your credit card number from fraud, but also from a privacy perspective (11).
  • Increasing security against fraud means increasing records, which may compromise privacy (12).
  • Many people ask if the cryptographic integrity of PGP is still good now that a large corporation controls it. Zimmermann is convinced that it is (13).
  • In 1991 the US government became interested in how PGP got out of the country. The encryption technology was regarded as a military technologies. The government began a criminal investigation but after 3 years decided to drop the case (14).
  • The millennium bug will cause some computer glitches but we will somehow get through it (15).
  • PGP does not have this problem (16).

digital library
back to authorities
back to subjects
search

back

home page

INTERVIEW:

Question 1
You are the creator of PGP software. Can you explain what PGP is?

Answer
PGP means Pretty Good Privacy. It's an encryption software product for electronic mail and computer files. I created it in 1991 and sent it out on the Internet for free; it's spread all around the world, and today it has become the most widely used software in the world for the encryption of electronic mail.

Back

Question 2
What is the history of PGP?

Answer
PGP started out as a human rights project. The idea was to create something that grass roots political organizations or human rights groups could use in their political work. Today, human rights groups from all over the world use PGP. As far as I know, all of them do. They use it to encrypt files containing eyewitness accounts of atrocities. The only way they could get the witnesses to speak against the government and report what they saw is to assure them that their names would not be given to the government so that the government could kill them. So, they collect this data, they encrypt the files with PGP, and if the government raids their offices and takes their computers, they cannot learn the names of the witnesses. This is the only way you can fight human rights abuses.

Back

Question 3
Why did you decide to give away this product and make it public?

Answer
I wanted it to become widely used. Not just to protect people in human rights situations but also to protect the civil liberties and privacy of ordinary people even in Western democracies. So making it available for free is a good way to achieve ubiquity. Pervasive ubiquity of software is a prerequisite to success. It's not just a consequence of success; it's a prerequisite to success on the Internet.

Back

Question 4
Can you explain what the relationship is between personal privacy and encryption of information?

Answer
We used to live our lives in the analogue world. Now we live our lives in the digital world or we're moving our lives into the digital world. Most of the mail used to be on paper with envelopes. Now more and more of our mail is electronic mail. Most of our conversations used to be face to face. Now we have telephones and now more and more of our conversations are through digital media. Every time we adopt a new technology to give us convenience and speed in the digital age, we leave behind some of the privacy that we enjoyed in earlier times. So by encrypting the data, we restore some of the privacy that we used to have. I'm actually just trying to maintain the status quo. I'm trying to keep things the way they used to be. Every conversation used to be private before there were telephones because there was no wire tapping when you're talking face to face. Most of our mail was secure from third parties intercepting it because it was transported in envelopes. We need envelopes today for our electronic mail. And that's what encryption brings.

Back

Question 5
Usually the information that is around the Internet is not secure because people can intercept this information. Why and how can people intercept this information on the Internet?

Answer
It's very easy to intercept electronic mail or other kinds of Internet traffic such as web browsing, because when you send something through the Internet, you send it from one computer to another and another computer until it finally reaches its destination. And these intermediate computers are owned by corporations, governments, universities, Internet service providers, long-distance communications carriers, and all of them along the way can intercept the information. You don't know who can intercept it. So the solution is to scramble the information, using modern encryption algorithms to scramble it in a hopelessly complicated way, so that no one can read the information, except the person you're sending it to, who knows how to unscramble it, using the software, using cryptographic keys. If you don't know the right key, you can't unscramble the information.

Back

Question 6
So when is it possible to say that a piece of information protected by cryptographic software is secure, how can you say that it is secure?

Answer
It used to be that knowledge of encryption technology was limited to intelligence agencies. The most famous example being the National Security Agency in the United Sates. But about 25 or 20 years ago, things began to change as academic cryptographers in universities began publishing papers in academic journals and over the last 20 years there has been great progress in the development of encryption of algorithms to scramble information in ways that today is now out of reach of major governments - out of reach in the sense that major governments can no longer break these encryption algorithms.

Back

Question 7
But do you think it's possible for someone to read the information that was protected with encryption? And how much can this cost?

Answer
In principle it's possible to intercept encrypted communications and use computers to try to find the patterns in the data or try every possible key to unscramble it. But because encryption algorithms have become so good in the past 20 years, it has now reached the point where the only way to break them is to try every possible key until you have exhausted all the possible keys to try to decrypt the message. We use keys today that are so big that it would take geological time to try all the possible keys; in fact, cosmological time - more time than the earth has been in existence. So probably if you want to send a love letter to your girlfriend or your boyfriend or whatever, it's unlikely that somebody is going to be able to intercept it and decrypt it using supercomputers to try all the keys.

Back

Question 8
So how long do you think it could take to decrypt PGP? It this possible?

Answer
It is always a possibility that someone knows some way to decrypt it without trying all the possible keys. Perhaps they can find some hidden weakness in the encryption algorithms. But the algorithms that we use in PGP are the best academic algorithms published in the academic literature about cryptography. These are algorithms that have had the most peer review by other cryptographers and have withstood attempts to break them for many years. So if we assume that these are strong encryption algorithms and it requires you to try every possible key, then it would take more time than the earth has been in existence using all the computers in the world today to break one of these messages.

Back

Question 9
Can we talk about the work of secret services on the Internet? Do they try to control information?

Answer
Intelligence agencies of the major governments often try to intercept Internet communications. They try to intercept phone calls, radio traffic, but most especially it's easy to intercept Internet traffic. The National Security Agency does this more than any other government agency, more than the agencies in other governments. But the British government and the French government and other major governments also do this within their own countries. The NSA does it all over the world, so people in Italy may have their communications intercepted by the American government through the NSA.

Back

Question 10
Can you talk to us about the Echelon Project?

Answer
The Echelon Project is a large-scale project by the NSA to intercept large amounts of electronic communications in Europe. It's a good reason to use encryption technology if you don't want to have your private or business communications intercepted by the American government.

Back

Question 11
What about e-commerce and encryption? Do you think that it will be very important when we buy something with a credit card on the Internet?

Answer
Electronic commerce on the Internet is a perfect example of why you need to use encryption. But I don't think that it's just to protect your credit card because today we our credit cards to waiters in restaurants. Who knows what the waiters might do with the credit card numbers. I'm more interested in knowing whether or not I can trust the business that I'm giving my credit card number to. Are they going to use my credit card correctly, are they going to put extra charges on it, is it a reputable business? But something that is much more interesting to me from a privacy perspective is will third parties be able to intercept the communications that I have and discover what I'm buying with my credit card. Ken Starr asked the bookstores in the US to tell him which books Monica Lewinsky was buying. I think this is a terrible thing. Monica Lewinsky should be able to buy books with no one knowing what books she's buying. We should always be able to read books or magazines or videos or whatever we want to do without fear of government interception of discovering what we're reading, what we're thinking, what are our beliefs, our political beliefs. We've got to protect our privacy as it is eroded by advances in technology. It used to be that you walked into a bookstore with cash and bought books with cash. Now you use a credit card, and this creates an electronic record that could be checked later by an overzealous prosecutor.

Back

Question 12
That is why encryption is so important. But if encryption also protects the money, nobody would steal the money.

Answer
Yes. It's important to have protocols for doing electronic commerce that ensure that no one can steal your money, that you're giving it to the right person or the right company, that no one can intercept it and take money out of your credit card or your bank account and that the merchant can prove you bought it so he can get the money and there's no fraud possible. Sometimes these things are pulling in opposite directions. If you increase the strength against fraud, you may decrease the privacy, because it creates too many records that can be checked later to see what you're reading or what you're listening to or watching or other things.

Back

Question 13
You're working with a big company and this company bought your product. Are you afraid that the government will take your system?

Answer
A lot of people ask me if the cryptographic integrity of PGP is still good. They believe that it used to be good when I controlled it myself. But some people are afraid that the cryptographic integrity has been compromised now that a large corporation controls it. Let me say that after all that I went through with the criminal investigation and all the hardship of what I went through, there's no way I would allow anyone to compromise the cryptographic integrity of PGP. And I have seen no evidence that this company is interested in compromising the integrity of the product.

Back

Question 14
Can you talk to us about the problem you had with the United States justice?

Answer
Some time after I published PGP in 1991 the government became interested in how it got out of the country. The encryption technology was regarded as the same as other military technologies. They regarded it as munitions, like exporting Stinger missiles, which is illegal unless you have a special license from the government. Of course I had no such license. This was free software published domestically inside the United States. But when you publish on the Internet, it's impossible to just publish it domestically; it goes everywhere. So the government thought that this was a violation of US export law and began a criminal investigation which lasted for 3 years. At the end of 3 years, after doing hundreds of press interviews, the government decided to drop the case, because it would have been a political nightmare for them to prosecute me for publishing something on the Internet.

Back

Question 15
The millennium bug is a great problem. Do you see a solution?

Answer
Software has a lot of bugs. Even PGP has bugs. I think the millennium bug is just one more bug. It has the unusual property in that it can appear in many places simultaneously. But I think that somehow we'll get through it just the same as we get through all the other bugs. I don't think that we have to head for the hills and build a log cabin in the mountains. There are people in the US stockpiling food and supplies and going up into the mountains and getting guns as if there were going to be a nuclear war. It's nothing like that. I think there's just going to be some computer glitches and we'll somehow get through it. Maybe your automatic teller machine might not work for the first couple of days until they fix the problems.

Back

Question 16
Are you working on this problem?

Answer
Of course my software doesn't have that bug. I've never written any software that has that particular kind of bug. I sometimes create other kinds of bugs, but that one is something I've never been stupid enough to create! I didn't create this bug and I'd rather other people fixed it.

Back

back to the top