home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 2
/
HACKER2.BIN
/
1097.PGP_REV
< prev
next >
Wrap
Text File
|
1991-06-19
|
7KB
|
121 lines
------------------------------------- TOF --------------------------------------
FROM THE COLORADO DAILY JUNE 11-13/1991 EDITION:
IN THE "OPINION" COLUMN BY PAUL DANISH:
--------------------------------------------------------------------------------
"BOULDER MAN WANTS TO KEEP OUT HACKERS"
Phil Zimmermann doesn't think snoops in the government or anywhere else
should be able to read your mail. And what's more, he's doing something about
it.
Zimmermann is the president and sole employee of Phil's Pretty Good
Software, a Boulder software company. Its latest product is a program called
"Pretty Good Privacy". The program allows anyone with an IBM PC-type personal
computer to encode messages in a way that makes it virtually impossible for
anyone to decode them. "Anyone" in this case includes the code-breakers at the
CIA and the National Security Agency.
"It's public key cryptography for the masses," Zimmermann explains.
Public key cryptography is a way of encrypting messages or data that use two
numbers that you plug into a simple mathematical formula - a public key and a
private key. Both numbers are random numbers of any length you want to make
them. - the longer they are, the harder the code is to break - the only
difference between them is that you publish your public key and keep your
private key secret.
Somebody wishing to send you a private message first turns it into binary
computer data, then looks up your public key to encrypt it. Once it is
encrypted, the only way to decrypt it is by using your private key. Without the
private key, not even the sender can decrypt it; if he or she didn't keep an
unencrypted copy, they're out of luck.
The only way a third party can break a message encoded by this technique is
by trying every possible number that could be the private key in the formula.
If the private key number is several hundred or several thousand digits long -
and they routinely are - then this process can be a bit time-consuming, even
with a super-computer. "Time consuming" in this case, means that cracking a
message could take centuries.
Apart from giving nosy people something to do until, say, the middle of the
next Ice Age, public-key cryptography has another advantage as well: It allows
people to send you secret messages without first having met you and exchanged
cipher keys. That's because the only encryption tool they need to send you a
message is your public key, which could be published in a phone book. This
makes it possible, in theory at least, for people to encrypt messages routinely.
Zimmermann's program makes it possible to do so in practice, by reducing
process to a simple, personal computer routine that can be applied to any data
the computer generates, including text, spreadsheets, databases, pictures,
graphics, and even sound.
Public\key cryptography has been around for about 15 years now, and it has
been of great interest to two broad classes of people a> those who believe
gentlemen don't read other people's mail, and b> those who believe they do. The
latter - most of whom are on the payroll of the U.S. government - are painfully
aware of what public-key cryptography can do, and as a result they have expended
considerable effort over the years trying to keep it from falling into the hands
of ordinary Americans.
Their most recent attempt took the form of a bill sponsored by Sen. Joseph
Biden that would have forced the manufacturers of secure communications
equipment and programs like Zimmermann's to insert "trap doors" into their
products that would have allowed the government to read anyone's encrypted
messages.
Biden's bill prompted Zimmermann, who has been working on this program for
at least five years, to get it into circulation. Last week he sent it off to
several of the country's largest electronic bulletin boards. Computer users
have been snapping it up ever since. He estimates that tens of thousands of
copies are already in circulation, and demand is growing as word spreads.
Why would ordinary people need a program like Pretty Good Privacy to protect
what the Constitution quaintly refers to as their papers and effects? Because,
as Zimmermann says in the documentation accompanying the program, "It's
personal. It's private. And it's no one's business but yours."
"You may be planning a political campaign, discussing your taxes, or having
an illicit affair," he says. "Or you may be doing something that you feel
shouldn't be illegal, but is. Whatever it is, you don't want your private
electronic mail (E-mail) or confidential documents read by anyone else. There
is nothing wrong with asserting privacy. Privacy is as apple-pie as the
Constitution."
At this point someone usually asks, "if you're a law-abiding citizen, what
do you have to hide?" Zimmermann has a pretty good answer for then too: "If you
really are a law-abiding citizen with nothing to hide, then why don't you always
send your paper mail on postcards? Why not submit to drug testing on demand?
Why require a warrant for police searches of your house? Are you trying to hide
something? You must be a subversive or a drug dealer if you hide your mail
inside envelopes. Or maybe a paranoid nut."
Actually, the best reason I can think of for putting your mail inside
electronic envelopes like those produced by Zimmermann's program is that
information is power, and the fact of the matter is that the people who are
running the government believe they have a divine right to acquire unlimited
information generally, and unlimited information on you in particular. If you
believe in limited government, you better limit the information government is
allowed to acquire on people, because government is only as limited as its data
bases.
And, as Zimmermann says, "If privacy is outlawed, only outlaws will have
privacy."
"Pretty Good Privacy enables people to take their privacy into their own
hands," he says. "There's a growing social need for it. That's why I wrote
it."
Pretty Good Privacy is freeware. Zimmermann is encouraging people to make
copies of it and pass it on to their friends.
If you want a copy, you can get it for free on any of a number of computer
networks, including Fidonet, Internet, THE WELL, CompuServe, PeaceNet, and on
most electronic bulletin boards. (Locally it's on the MicroManiac.)
If you don't have a modem, you can get a copy by writing Phil Zimmermann at
3021 11th Street; Boulder, Colorado 80304. He'll send you one, but only if you
include a $50 handling fee.
------------------------------------- EOF --------------------------------------