Analogien um das Prinzip von PGP zu erklären
Fraser Tweedale
frase at frase.id.au
Thu Jul 3 15:10:00 CEST 2014
On Thu, Jul 03, 2014 at 10:56:30PM +1000, Fraser Tweedale wrote:
> On Thu, Jul 03, 2014 at 01:46:33PM +0200, Neal H. Walfield wrote:
> > At Thu, 03 Jul 2014 12:50:50 +0200,
> > Daniel Krebs wrote:
> > > da ich das gerade mit Matthias von der FSFE im Rahmen von
> > > #EmailSelfDefense diskutiere, mal eine Frage: Welche Analogien benutzt
> > > ihr, wenn ihr Menschen das Prinzip von PGP/GPG erklärt?
> > > Ich verwende ich meistens folgende Version:
> > >
> > > Es gibt ein Schloss mit zwei Schlüssellöchern. Jeder Schlüssel
> > > funktioniert nur in eine Richtung, also entweder Geöffnetes schließen
> > > oder Geschlossenes öffnen. Daran kann man dann auch das signieren
> > > erklären, was ja bei der "klassischen Metapher" (öff. Schlüssel =
> > > Schloss, priv. Schlüssel = Schlüssel) nicht funktioniert. Also:
> > > Verschlüsseln:
> > > Jemand verschließt mit meinem öffentlichen Schlüssel, ich öffne mit
> > > meinem geheimen.
> > > Signieren:
> > > Ich signiere mit meinem privaten Schlüssel, jemand anders überprüft mit
> > > meinem öffentlichen.
> > >
> > > Anregungen, Meinungen?
> >
> > You might want to take a look a this:
> >
> > https://freedom-to-tinker.com/blog/randomwalker/why-king-george-iii-can-encrypt/
> >
> > Email encryption, although cryptographically straightforward,
> > appears too complicated for laypeople to understand. In our
> > project, we aimed to understand why this problem has eluded
> > researchers for well over a decade and expand the design space of
> > possible solutions to this and similar challenges at the
> > intersection of security and usability.
> >
> > ...
> >
> > In PGP’s metaphors, each user posses two items, a private key and a
> > public key. Have you inferred how the protocol works yet? Unless
> > you have previous exposure to cryptography, likely not. Why do I
> > have two keys? What do these keys open? Aren’t all keys private?
> > When you want to send a message to someone, you encrypt it with his
> > public key, which is known to everyone. The recipient can decrypt
> > it with his private key, which only he possesses. But can’t anyone
> > use the public key to decrypt the message again? Nope. A public
> > key can only encrypt, not decrypt. Just trust us on that one.
> >
> Not so; this analogy might seem useful for explaining message
> encryption, but will lead to more confusion when attempting to
> understand/explain signing - where indeed the public key is used to
> decrypt a digest encrypted by a public key.
>
Whups. The digest is encrypted by the *private* key, of course :)
> Fraser
>
> >
> > You’re probably starting to understand why secure email is so hard
> > to use. Bear with us for one paragraph longer.
> >
> > ...
> >
> > We decided to test whether better metaphors might be able to close
> > this gap between security and usability. Specifically, we wanted
> > metaphors that represented the cryptographic actions a user performs
> > to send secure email and were evocative enough that users could
> > reason about the security properties of PGP without needing to read
> > a lengthy, technical introduction. We settled on four objects: a
> > key, lock, seal and imprint. To send someone a message, secure it
> > with that person’s lock. Only this recipient has the corresponding
> > key, so only they can open it. To prove your identity, stamp the
> > message with your seal. Since everyone knows what your seal’s
> > imprint looks, it’s easy to verify that the message came from you.
> >
> >
> > Neal
> >
> > _______________________________________________
> > Gnupg-users mailing list
> > Gnupg-users at gnupg.org
> > http://lists.gnupg.org/mailman/listinfo/gnupg-users
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: </pipermail/attachments/20140703/455ace20/attachment.sig>
More information about the Gnupg-users
mailing list