Researchers probe PGP security flaw

A vulnerability in the Pretty Good Privacy (PGP) encryption protocol could let a snooper trick recipients of encoded messages into deciphering them and sending them back to the would-be spy, researchers warned Monday as they released a paper documenting tests of such an attack.

The loophole, which researchers have known of for several years, is a difficult one to exploit, largely because the pre-encryption compression done by most programs foils the attack. Still, implementations that precisely adhere to the widely used OpenPGP standard would be susceptible to attack, according to the researchers, who recommend changes to the standard.

The attack involves an element of social engineering as well as code-hacking. Known as a “chosen-cipher attack,” the ploy relies on a user having set his e-mail software to automatically decrypt incoming messages. If an attacker can intercept a message en route, he could apply an algorithm to garble the message, then pass it along to the intended recipient with his own e-mail address in the reply line. Receiving the mangled message, the recipient might reply back to ask what was being sent.

Completing the attack requires receiving from the recipient a quoted copy of the garbled message, after it’s been run through the recipient’s decryption. That decrypted text can then be de-scrambled by the attacker.

The attack was tested against two popular PGP implementations, PGP 2.6.2 and GnuPG, by researchers Bruce Schneier, founder and chief technical officer of IT security services firm Counterpane Internet Security Inc. in Cupertino, Calif., and Kahil Jallad and Jonathan Katz, who were with Columbia University when the research was conducted. Both programs compress data by default before encrypting it, complicating or thwarting the attack, but that option can be disabled by users.

PGP and GnuPG users should avoid turning off compression and be wary of including the full text of messages when sending replies, the researchers said.

Further details on the vulnerability and the researchers’ are available online at, and will be presented at the 2002 Information Security Conference, which begins in late September in S

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Article

ADaPT connects employers with highly skilled young workers

Help wanted. That’s what many tech companies across Canada are saying, and research shows that as the demand for skilled workers...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now