Betamax v. VHS, and the future of PQ-PGP

have at anonymous.sex have at anonymous.sex
Thu Jan 2 00:57:25 CET 2025


A disquisition could here ensue on the long-term security reasons why 
everyone should start using ky1024_cv448 encryption subkeys RIGHT NOW.  
https://en.wikipedia.org/wiki/Massive_Data_Repository  But if you 
understand security well enough to read this list, why waste your time?  
Instead, let’s talk about format wars and network effects.

Fifty years ago, a format war was brewing between the videocassette 
formats Betamax and VHS.  Today, you can still find people debating on 
the Internet whether or not Betamax was technically superior, and why 
VHS won, and so forth.  For anyone who didn’t try both in the late 1970s 
to early 1980s, all that’s clear is that VHS (0) won decisively when it 
attained (1) network effects in the (2) consumer market.  The format war 
concluded when Sony, the producer of Betamax, adopted VHS themselves.

As we now enter the year 2025, a format war is brewing in PGP.  This 
message is not the place for me to opine on the technical merits of 
LibrePGP v. IETF OpenPGP, or whose fault the standards split is, or 
whether so-and-so is a very mean person or not.  Today, here and now, I 
am more worried about something else.

The standards split will foreseeably lead to a world in which your 
choice of \*PGP software determines with whom you can exchange 
post-quantum encrypted mail.  The lowest common denominator will remain 
plain ECC or RSA, as it is today.  That’s bad.  For the sake of user 
security, one side or the other needs to win so decisively that its 
standard is universally adopted.

Ever since 1993, PGP has been driven by its individual users.  Although 
corporate security use is nice and important, and GnuPG has a key role 
in securing the open-source software supply chain, it’s reasonable to 
anticipate that the format war will be decided by keys in the wild:  Not 
merely which side has more users with keys, but which side has more 
significant keys for people *you* want to talk to privately.

The first mover has an advantage here...

In terms of user base, GnuPG was the first major \*PGP implementation to 
offer post-quantum encryption that you can actually use *right now*.  
Although this feature is still only in a “public testing” branch, GnuPG 
since v2.5.1 (2024-09-12) has supported “the final FIPS-203 and LibrePGP 
specifications”.[0]  For a \*PGP implementation, the long-term stability 
of keys and messages is obviously of paramount importance.

...and the first mover deserves to win on that basis alone.

In 2025, it is *unethical and irresponsible* to publish any encryption 
software or offer an encrypted communication service that does not 
support post-quantum cryptography.  It’s interesting to see who’s been 
on top of this—or not.  If, after the long-delayed US NIST standards 
process, you offer encryption without PQ crypto as we enter 2025, then 
you should delete your git repositories and stop making crypto.

Most software features are a matter of user patience for added 
happiness.  PQC is a safety issue.  It’s a long-term safety issue that 
most users do not understand, and do not know how to evaluate.  The onus 
is on cryptographic software developers.

For better or for worse, everyone knew since 2022 that Kyber probably 
would be declared The Standard.  A draft standard was available in 2023, 
and a final standard in 2024.  There is no excuse to fail to offer users 
post-quantum protection in 2025.

GnuPG couldn’t move ahead with “nonstandard” PQC, as some others did 
with sntrup or Classic McEliece:  It needs to maintain stable long-term 
support for keys and messages.  It had draft Kyber support in May 2024, 
and final standard support in September, 30 days after the final 
standard was published.  That’s how to protect users.

So please, let’s see some usage.  Not only will that improve security, 
but it will establish a user base of keys in the wild—thus encouraging 
user demand for compatibility with GnuPG.

###

# Addendum

In preparation to send this message, I attempted to upload a 
post-quantum key created with GnuPG v2.5.1 to keys.openpgp.org.  The 
result of the POST to <https://keys.openpgp.org/upload/submit>:

>HTTP/2 400
>server: nginx/1.18.0
>date: Wed, 01 Jan 2025 23:02:25 GMT
>content-type: text/html; charset=utf-8
>content-length: 1839
>[...]
>
>[...]
>   <p><strong>Error</strong>: Parsing of key data failed.</p>
>[...]

I promptly reached out to support at keys.openpgp.org to ask when the 
infrastructure will support distribution of these keys to help users 
protect their long-term security.  I anticipate that the real answer 
will depend on when there are significant numbers of people trying to 
distribute their v5 packet format keys.

###

[0] https://lists.gnupg.org/pipermail/gnupg-announce/2024q3/000485.html

-- 
# Remember these on Wednesday, January 15, 2025:
https://web.archive.org/web/19971024171609/http://www.eff.org/blueribbon.html
https://web.archive.org/web/19971114041230/http://www.eff.org/pub/Legal/Cases/ACLU_v_Reno/19970626_eff_cda.announce
https://www.supremecourt.gov/search.aspx?filename=/docket/docketfiles/html/public/23-1122.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20250101/ff383b4d/attachment.sig>


More information about the Gnupg-users mailing list