Suggestions of standards added to openpgp/Gnupg/LibrePgp
Andrew Gallagher
andrewg at andrewg.com
Tue Mar 31 18:32:47 CEST 2026
Hi, Hakun.
On 31/03/2026 16:09, Hakun_the_eril via Gnupg-users wrote:
>
> My arguments are:
> Shamirs secret has been around since 1979,- I find it odd that it is not
> included in Openpgp.
> It could add things like distributed key custody, hardware enforced
> split custody. Right now,- if someone with a key leaves or dies
> important encrypted data gets lost.
It's relatively simple to combine Shamir with *PGP - for example, in
keys.openpgp.org, we have used Shamir to split a strong encryption
passphrase and used it to protect PGP secret key material using the
standard string-to-key mechanism. There are also tools available to
derive key material directly from a shared secret (e.g.
https://git.distrust.co/public/keyfork/). Since it is technically nobody
else's business what we do with those secret shares, it's not clear to
me what a new specification would add (but I am open to argument!)
> Ephemeral signed elliptic curve diffie hellman is usable, because it
> will solve a forward security issue.
> If you encrypt say radio transmissions with the same key over long
> periods anyone who gets hold of that key can decrypt old transmissions.
> TLS 1.3 , the signal protocol and versions of openssh that is never
> than 5.7 supports this.
There are many implementation pitfalls inherent in any forward secrecy
scheme, particularly when using a high-latency communications medium
such as email, and in multi-device scenarios. Most forward-secrecy
schemes rely on interactivity to ensure the stability of the ratchet;
and this can fail catastrophically even in supposedly low-latency
systems (google for "matrix unable to decrypt").
You may be interested in https://autocrypt2.org (work in progress),
which addresses a lot of these practical issues without requiring a
novel encryption algorithm.
A
More information about the Gnupg-users
mailing list