From 41aa18b853219d7c6527338678c5268a78a60f74 Mon Sep 17 00:00:00 2001 From: David Runge Date: Wed, 6 Dec 2023 19:27:12 +0100 Subject: [PATCH] Add glossary links for chapter 7 Signed-off-by: David Runge --- book/source/06-signatures.md | 2 +- book/source/07-signing_data.md | 85 +++++++++++++++++----------------- book/source/23-glossary.md | 61 +++++++++++++++++++++--- 3 files changed, 98 insertions(+), 50 deletions(-) diff --git a/book/source/06-signatures.md b/book/source/06-signatures.md index e995c26..83c9872 100644 --- a/book/source/06-signatures.md +++ b/book/source/06-signatures.md @@ -32,7 +32,7 @@ The OpenPGP standard defines a set of [Signature types](https://www.ietf.org/arc {term}`Signature types` can be predominantly classified in two ways: -- **{term}`Signatures over data`**: These signatures are denoted by {term}`type IDs` `0x00` for binary documents and `0x01` for canonical text documents. The {term}`signer` uses these {term}`signatures` to claim ownership, assert creation, or certify the immutability of the document. +- **{term}`Signatures over data`**: These signatures are denoted by {term}`type IDs` `0x00` for binary documents and `0x01` for canonical text documents. The {term}`signer` uses these {term}`signatures` to claim ownership, assert creation, or certify the immutability of the document. - **{term}`Signatures on components`**: These are {term}`signatures` that are associated with {term}`component keys` or {term}`identity components` of a {term}`certificate`. {term}`Signatures on components` are a complex topic, and we discuss them in depth in {ref}`component_signatures_chapter`. They are grouped based on two criteria: diff --git a/book/source/07-signing_data.md b/book/source/07-signing_data.md index 2dd56b4..a9d7c6b 100644 --- a/book/source/07-signing_data.md +++ b/book/source/07-signing_data.md @@ -6,67 +6,68 @@ SPDX-License-Identifier: CC-BY-SA-4.0 (signing_data)= # Signatures over data -In OpenPGP, a *data signature* guarantees the authenticity and, implicitly, the integrity of certain data. Typical use cases of data signatures include the authentication of software packages and emails. +In OpenPGP, a *{term}`data signature`* guarantees the {term}`authenticity` and, implicitly, the integrity of certain data. Typical use cases of {term}`data signatures` include the {term}`authentication` of software packages and emails. -"Authenticity" in this context means that the data signature was issued by the entity controlling the signing key material. However, -it does not automatically signal if the expected party indeed controls the signer certificate. OpenPGP does offer mechanisms for *strong authentication*, connecting certificates to specific identities. This verifies that the intended communication partner is indeed associated with the cryptographic identity behind the signature[^sign-auth]. +"{term}`Authenticity`" in this context means that the {term}`data signature` was issued by {term}`the entity controlling the signing key material`. However, +it does not automatically signal if the expected party indeed controls the {term}`signer` {term}`certificate`. OpenPGP does offer mechanisms for *strong {term}`authentication`*, connecting {term}`certificates` to specific {term}`identities`. This verifies that the intended communication partner is indeed associated with the cryptographic {term}`identity` behind the {term}`signature`[^sign-auth]. -[^sign-auth]: Other signing solutions, like [signify](https://flak.tedunangst.com/post/signify), focus on pure signing without strong authentication of the signer's identity. +[^sign-auth]: Other signing solutions, like [signify](https://flak.tedunangst.com/post/signify), focus on pure signing without strong {term}`authentication` of the {term}`signer`'s {term}`identity`. -Data signatures can only be issued by component keys with the *signing* [key flag](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-key-flags). +{term}`Data signatures` can only be issued by {term}`component keys` with the *{term}`signing`* [key flag](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-key-flags). -Note that data signatures are distinct from {ref}`component_signatures_chapter`, which are used to form and maintain certificates, as well as to certify identities on certificates. +Note that {term}`data signatures` are distinct from {ref}`component_signatures_chapter`, which are used to form and maintain {term}`certificates`, as well as to {term}`certify` {term}`identities` on {term}`certificates`. (data_signature_types)= ## Signature types -OpenPGP data signatures use one of two [signature types](signature_types): +{term}`OpenPGP data signatures` use one of two [signature types](signature_types): -- [**Binary signature**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#sigtype-binary) (type ID `0x00`): This is the standard signature type for binary data and is typically used for files or data streams. Binary signatures are calculated over the data without any modifications or transformations. -- [**Text signature**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-signature-of-a-canonical-te) (type ID `0x01`): Used for textual data, such as email bodies. When calculating a text signature, the data is first normalized by converting line endings into a canonical form (``). This approach mitigates issues caused by platform-specific text encodings. This is especially important for detached and cleartext signatures, where the message file might undergo re-encoding between the creation and verification of the signature. +- [**Binary signature**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#sigtype-binary) ({term}`type ID` `0x00`): This is the standard {term}`signature type` for binary data and is typically used for files or data streams. {term}`Binary signatures` are calculated over the data without any modifications or transformations. +- [**Text signature**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-signature-of-a-canonical-te) ({term}`type ID` `0x01`): Used for textual data, such as email bodies. When calculating a {term}`text signature`, the data is first normalized by converting line endings into a canonical form (``). This approach mitigates issues caused by platform-specific text encodings. This is especially important for detached and {term}`cleartext signatures`, where the message file might undergo re-encoding between the creation and {term}`verification` of the {term}`signature`. -Data signatures are generated by hashing the message content along with the metadata in the OpenPGP signature packet, and calculating a cryptographic signature over that hash. The resulting cryptographic signature is stored in the signature packet. +{term}`Data signatures` are generated by {term}`hashing` the message content along with the {term}`metadata` in the {term}`OpenPGP signature packet`, and calculating a {term}`cryptographic signature` over that {term}`hash`. The resulting {term}`cryptographic signature` is stored in the {term}`signature packet`. -Data signature packets manifest in three distinct forms, which will be detailed in the subsequent section. +{term}`Data signature packets` manifest in three distinct forms, which will be detailed in the subsequent section. +(forms_of_openpgp_data_signatures)= ## Forms of OpenPGP data signatures -OpenPGP data signatures can be applied in three distinct forms[^sign-modes-gpg]: +{term}`OpenPGP data signatures` can be applied in three distinct forms[^sign-modes-gpg]: -- **Detached**: The OpenPGP signature exists as a separate entity, independent of the signed data. -- **Inline**: Both the original data and its corresponding OpenPGP signature are encapsulated within an OpenPGP container. -- **Cleartext signature**: A plaintext message and its OpenPGP signature coexist in a combined text format, preserving the readability of the original message. +- **{term}`Detached`**: The OpenPGP signature exists as a separate entity, independent of the signed data. +- **{term}`Inline`**: Both the original data and its corresponding {term}`OpenPGP signature` are encapsulated within an {term}`OpenPGP message`. +- **{term}`Cleartext signature`**: A plaintext message and its {term}`OpenPGP signature` coexist in a combined text format, preserving the readability of the original message. -[^sign-modes-gpg]: These three forms of signature application align with GnuPG's `--detach-sign`, `--sign`, and `--clearsign` command options. +[^sign-modes-gpg]: These three forms of {term}`signature` application align with GnuPG's `--detach-sign`, `--sign`, and `--clearsign` command options. ### Detached signatures -A detached signature is produced by calculating an OpenPGP signature over the data intended for signing. The original data remains unchanged, and the OpenPGP signature is stored as a standalone file. A detached signature file can be distributed alongside or independent of the original data. The authenticity and integrity of the original data file can be verified by using the detached signature file. +A {term}`detached signature` is produced by calculating an {term}`OpenPGP signature` over the data intended for signing. The original data remains unchanged, and the {term}`OpenPGP signature` is stored as a standalone file. A {term}`detached signature` file can be distributed alongside or independent of the original data. The {term}`authenticity` and integrity of the original data file can be {term}`verified` by using the {term}`detached signature` file. -This signature format is especially useful for signing software releases and other files where it is imperative that the content remains unaltered during the signing process. +This {term}`signature` format is especially useful for signing software releases and other files where it is imperative that the content remains unaltered during the signing process. (inline_signature)= ### Inline signatures -An inline signature joins the signed data and its corresponding data signature into a single OpenPGP message. +An {term}`inline signature` joins the signed data and its corresponding {term}`data signature` into a single {term}`OpenPGP message`. -This method is commonly used for signing or encrypting emails. Most email software capable of handling OpenPGP communications typically uses inline signatures. +This method is commonly used for signing or encrypting emails. Most email software capable of handling OpenPGP communications typically uses {term}`inline signatures`. #### Structure -An inline-signed OpenPGP message consists of three segments: +An {term}`inline-signed` {term}`OpenPGP message` consists of three segments: -1. [**One-pass signature packets**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#one-pass-sig): These one or more packets precede the signed data and enable signature computation in one pass. +1. [**One-pass signature packets**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#one-pass-sig): These one or more {term}`packets` precede the signed data and enable {term}`signature` computation in one pass. 2. [**Literal data packet**](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#lit): This contains the original data (e.g., the body of a message), without additional interpretation or conversion. -3. **Data signature packets**: These contain the cryptographic signature corresponding to the original data. +3. **{term}`Data signature packets`**: These contain the {term}`cryptographic signature` corresponding to the original data. #### Creation -To produce an inline signature, the signer processes the entirety of the data by reading from an input file and writing into an output OpenPGP message file. As the data is processed, the signer simultaneously calculates a cryptographic signature. This procedure results in the appending of a data signature packet to the output OpenPGP message file, where it can be efficiently stored. +To produce an {term}`inline signature`, the {term}`signer` processes the entirety of the data by reading from an input file and writing into an output {term}`OpenPGP message` file. As the data is processed, the {term}`signer` simultaneously calculates a {term}`cryptographic signature`. This procedure results in the appending of a {term}`data signature packet` to the output {term}`OpenPGP message` file, where it can be efficiently stored. -For efficient verification, an application must understand how to handle the literal data prior to its reading. This requirement is addressed by the one-pass signature packets located at the beginning of inline-signed messages. These packets include essential information such as the fingerprint of the signing key and the hash algorithm used for computing the signature's hash digest. This setup enables the verifier to process the data correctly and efficiently. +For efficient {term}`verification`, an application must understand how to handle the {term}`literal data` prior to its reading. This requirement is addressed by the {term}`one-pass signature packets` located at the beginning of {term}`inline-signed` messages. These {term}`packets` include essential information such as the {term}`fingerprint` of the {term}`signing key` and the {term}`hash` algorithm used for computing the {term}`signature`'s {term}`hash digest`. This setup enables the verifier to process the data correctly and efficiently. ```{admonition} TODO :class: warning @@ -78,23 +79,23 @@ Realization: It's probably useful to know the fingerprints right away, to first #### Verification -Inline-signed messages enable efficient verification in *one pass*, structured as follows: +{term}`Inline-signed` messages enable efficient {term}`verification` in *one pass*, structured as follows: -1. **Initiation with one-pass signature packets**: These packets begin the verification process. They include the signer's key ID/fingerprint, essential for identifying the appropriate public key for signature validation. +1. **Initiation with {term}`one-pass signature packets`**: These {term}`packets` begin the {term}`verification` process. They include the {term}`signer`'s {term}`key ID`/{term}`fingerprint`, essential for identifying the appropriate {term}`public key` for signature {term}`validation`. -2. **Processing the literal data packet**: This step involves hashing the literal data, preparing it for signature verification. +2. **Processing the {term}`literal data packet`**: This step involves {term}`hashing` the literal data, preparing it for {term}`signature` {term}`verification`. -3. **Verifying signature packets**: Located at the end of the message, these packets are checked against the previously calculated hash digest. +3. **{term}`Verifying` {term}`signature packets`**: Located at the end of the message, these {term}`packets` are checked against the previously calculated {term}`hash digest`. -Important to note, the signer's public key, critical for the final verification step, is not embedded in the message. Verifiers must acquire this key externally (e.g., from a key server) to authenticate the signature successfully. +Important to note, the {term}`signer`'s {term}`public key`, critical for the final {term}`verification` step, is not embedded in the message. Verifiers must acquire this {term}`key` externally (e.g., from a {term}`key server`) to authenticate the {term}`signature` successfully. (cleartext-sig)= ### Cleartext signatures -The *Cleartext Signature Framework* (CSF) in OpenPGP accomplishes two primary objectives: +The *{term}`Cleartext Signature Framework`* (CSF) in OpenPGP accomplishes two primary objectives: - maintaining the message in a human-readable cleartext format, accessible without OpenPGP-specific software -- incorporating an OpenPGP signature for authentication by users with OpenPGP-compatible software +- incorporating an {term}`OpenPGP signature` for {term}`authentication` by users with OpenPGP-compatible software #### Example @@ -115,31 +116,31 @@ r13/eqMN8kfCDw== -----END PGP SIGNATURE----- ``` -This signature consists of two parts: a message ("hello world") and an ASCII-armored OpenPGP signature. The message is immediately comprehensible to a human reader, while the signature block allows for the message's authenticity verification via OpenPGP software. +This {term}`signature` consists of two parts: a message ("hello world") and an ASCII-armored {term}`OpenPGP signature`. The message is immediately comprehensible to a human reader, while the {term}`signature` block allows for the message's {term}`authenticity` {term}`verification` via OpenPGP software. #### Use case -Clear text signatures combine the advantages of both detached and inline signatures: +{term}`Cleartext signatures` combine the advantages of both {term}`detached` and {term}`inline signatures`: -- **Self-contained format**: Cleartext signatures enable the message and its signature to be stored as a single file. +- **Self-contained format**: {term}`Cleartext signatures` enable the message and its {term}`signature` to be stored as a single file. -- **Human readability**: The message within a cleartext signature remains accessible in a plain text format. This eliminates the need for specialized software to read the message content. +- **Human readability**: The message within a {term}`cleartext signature` remains accessible in a plain text format. This eliminates the need for specialized software to read the message content. These features are particularly beneficial in scenarios where signed messages are managed semi-manually and where existing system infrastructure offers limited or no native support for OpenPGP in the workflow[^arch-certifications]. -[^arch-certifications]: An illustrative example is the workflow adopted by Arch Linux to certify User IDs of new packagers. This process relies on [cleartext signed statements from existing packagers](https://gitlab.archlinux.org/archlinux/archlinux-keyring/-/blob/master/.gitlab/issue_templates/New%20Packager%20Key.md?ref_type=heads&plain=1#L33-46). These signed statements are stored as attachments in an issue tracking system for later inspection. The advantage of this approach lies in the convenience of having the message and signature in a single file, which simplifies manual handling. Based on the vouches in these cleartext signed messages and an [email confirmation from the new packager](https://gitlab.archlinux.org/archlinux/archlinux-keyring/-/wikis/workflows/verify-a-packager-key), the main key operators can issue OpenPGP third-party certifications. +[^arch-certifications]: An illustrative example is the workflow adopted by Arch Linux to {term}`certify` {term}`User IDs` of new packagers. This process relies on [cleartext signed statements from existing packagers](https://gitlab.archlinux.org/archlinux/archlinux-keyring/-/blob/master/.gitlab/issue_templates/New%20Packager%20Key.md?ref_type=heads&plain=1#L33-46). These signed statements are stored as attachments in an issue tracking system for later inspection. The advantage of this approach lies in the convenience of having the message and signature in a single file, which simplifies manual handling. Based on the vouches in these {term}`cleartext signed` messages and an [email confirmation from the new packager](https://gitlab.archlinux.org/archlinux/archlinux-keyring/-/wikis/workflows/verify-a-packager-key), the main key operators can issue {term}`OpenPGP third-party certifications`. #### Text transformations for cleartext signatures -The cleartext signature framework includes specific text normalization procedures to ensure the integrity and clarity of the message: +The {term}`cleartext signature framework` includes specific text normalization procedures to ensure the integrity and clarity of the message: -- **Escaping dashes**: The framework implements a method of [dash-escaped text](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-dash-escaped-text) within the message. Dash-escaping ensures that the parser correctly distinguishes between the armor headers, which are part of the signature's structure, and any lines in the message that happen to start with a dash. +- **Escaping dashes**: The framework implements a method of [dash-escaped text](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-dash-escaped-text) within the message. Dash-escaping ensures that the parser correctly distinguishes between the armor headers, which are part of the {term}`signature`'s structure, and any lines in the message that happen to start with a dash. -- **Normalization of line endings**: Consistent with the approach for any other [text signature](data_signature_types), a cleartext signature is calculated on the text with normalized line endings (``). This ensures that the signature remains valid regardless of the text format of the receiving implementation. +- **Normalization of line endings**: Consistent with the approach for any other [text signature](data_signature_types), a {term}`cleartext signature` is calculated on the text with normalized line endings (``). This ensures that the {term}`signature` remains valid regardless of the text format of the receiving {term}`implementation`. #### Pitfalls -Despite their widespread adoption, cleartext signatures have their limitations and are sometimes viewed as a "legacy method"[^csf-gnupg]. The RFC details the [pitfalls of cleartext signatures](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-issues-with-the-cleartext-s), such as incompatibility with semantically meaningful whitespace, challenges with large messages, and security vulnerabilities related to misleading Hash header manipulations. Given these issues, safer alternatives like inline and detached signature forms are advised. +Despite their widespread adoption, {term}`cleartext signatures` have their limitations and are sometimes viewed as a "legacy method"[^csf-gnupg]. The {term}`RFC` details the [pitfalls of cleartext signatures](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-issues-with-the-cleartext-s), such as incompatibility with semantically meaningful whitespace, challenges with large messages, and security vulnerabilities related to misleading Hash header manipulations. Given these issues, safer alternatives like {term}`inline` and {term}`detached signature` forms are advised. [^csf-gnupg]: https://lists.gnupg.org/pipermail/gnupg-devel/2023-November/035428.html @@ -151,4 +152,4 @@ Despite their widespread adoption, cleartext signatures have their limitations a :class: warning Write -``` \ No newline at end of file +``` diff --git a/book/source/23-glossary.md b/book/source/23-glossary.md index ea3ba1e..2df8865 100644 --- a/book/source/23-glossary.md +++ b/book/source/23-glossary.md @@ -24,6 +24,9 @@ Authentication Tag Authenticity See {term}`Authentication`. +Binary Signature + A {term}`Data Signature` with the {term}`Signature Type ID` `0x00`, which is used for binary data. + Binding Signature A {term}`signature` on a {term}`component` which links that {term}`component` to a {term}`certificate`. @@ -41,9 +44,6 @@ Certificate Certificate Authority See {term}`Certification Authority` -Certification Authority - Also known as [Certificate authority](https://en.wikipedia.org/wiki/Certificate_authority), this is an entity that handles digital certificates, especially by signing or issuing them. - Certificate Holder A person or other entity, that holds an {term}`Transferable Secret Key` and thus is able to modify the accompanying {term}`OpenPGP Certificate`. @@ -52,12 +52,22 @@ Certification Most commonly, the term is applied to "[third-party certifications](third_party_cert)," in which an external actor indicates that they have {term}`validated` the link between an {term}`identity` and a {term}`certificate`. However, the term is also used for [self-signatures that bind identity components](bind_ident) to a {term}`certificate`. +Certification Authority + Also known as [Certificate authority](https://en.wikipedia.org/wiki/Certificate_authority), this is an entity that handles digital certificates, especially by signing or issuing them. + Certification Key Flag A {term}`Key Flag`, indicating that a {term}`Component Key` can be used for issuing third-party {term}`certifications`. See [](capabilities_key_flags). Cipher Type Byte This historical term was defined in [RFC 1991](https://datatracker.ietf.org/doc/html/rfc1991#section-4.1) and was subsequently superseded by {term}`Packet Tag` in [RFC 2440](https://datatracker.ietf.org/doc/html/rfc2440#section-4.2), which is in turn superseded by {term}`Packet Type ID` in the new [RFC](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-packet-headers). +Cleartext Signature + A {term}`Data Signature` which exists in a combined text format, encapsulating the (readable) text input it was created for. See [](cleartext-sig). + +Cleartext Signature Framework + A framework for creating {term}`cleartext signatures`. + See [RFC 7](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#cleartext-signature). + Component An element in an {term}`OpenPGP Certificate`, that represents a {term}`component key` or {term}`identity component`. @@ -82,11 +92,20 @@ Cryptographic Signature CTB See {term}`Cipher Type Byte`. +Data Signature + {term}`Cryptographic signature` over binary documents or canonical text documents. See [](/07-signing_data). + +Data Signature Packet + An {term}`OpenPGP Signature Packet` which describes a {term}`Data Signature`. See [](/07-signing_data). + Delegation OpenPGP users can [delegate authentication decisions](delegation) to third parties, and thus rely on {term}`certifications` they issue. The remote party is then called a "{term}`trusted introducer`". This kind of delegation involves {term}`certifications` that include the {term}`trust signature` subpacket. +Detached Signature + A {term}`Data Signature` which exists as a separate file to the file it was created for. See [](forms_of_openpgp_data_signatures). + Direct Key Signature A {term}`Signature` that sets preferences and advertises features applicable to an entire {term}`Certificate`. See [](direct_key_signature). @@ -126,6 +145,9 @@ Identity Component Identity Verification A process by which the {term}`Identity Claim` of a {term}`Certificate Holder` is verified. See also {term}`Signature Verification`. +Inline Signature + A {term}`Data Signature` which exists encapsulated alongside the data it was created for in an OpenPGP container. See [](forms_of_openpgp_data_signatures). + Issuer An entity, that created an {term}`OpenPGP Signature Packet` using an {term}`Transferable Secret Key`. @@ -153,6 +175,9 @@ Key Key Flag A preference encoded in an {term}`OpenPGP Signature Subpacket`, that defines the {term}`Capability` a {term}`OpenPGP Component Key` has. See [](signature_subpackets). +Key Holder + See {term}`Certificate Holder`. + Key ID The high-order (leftmost) 64 bits of an {term}`OpenPGP Fingerprint`. Historically, this term refers to the low-order (rightmost) 64 bits of an {term}`OpenPGP Fingerprint`. @@ -160,12 +185,16 @@ Key ID Key Material May refer to {term}`Public Key Material` or {term}`Private Key Material`. -Key Holder - See {term}`Certificate Holder`. - Key Owner See {term}`Certificate Holder`. +Key Server + A piece of software available over the network, which provides access to {term}`OpenPGP Certificates` e.g., by searching for an {term}`OpenPGP Fingerprint` or {term}`User ID`, via the `HKP` and/ or `HKPS` protocols. + Several implementations such as [hagrid](https://gitlab.com/keys.openpgp.org/hagrid/), or [hockeypuck](https://github.com/hockeypuck/hockeypuck) exist. + +Literal Data Packet + A {term}`packet` in a {term}`Data Signature` which contains data, that has been signed using a {term}`cryptographic signature`. See [RFC 5.9](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#lit) for more details. + MAC See {term}`Message Authentication Code`. @@ -187,6 +216,9 @@ Notation Signature Subpacket Notation Tag Part of a {term}`Notation` name. +One-pass Signature Packet + One or more {term}`packets` before the actual data in a {term}`Data Signature` which contain information to allow a receiving {term}`implementation` to create {term}`hashes` required for signature verification. See [RFC 5.4](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#one-pass-sig) for more details. + OpenPGP Certificate An OpenPGP certificate contains public key material, identity claims and third party certifications (but no private key material) @@ -204,6 +236,9 @@ OpenPGP Implementation OpenPGP Key Used either for an {term}`OpenPGP Certificate` (containing public key material and metadata), or for an {term}`OpenPGP Private Key`. See [](/04-certificates) for an in-depth discussion. +OpenPGP Message + A data structure, which contains OpenPGP components such as {term}`OpenPGP Certificate` or {term}`OpenPGP Signature Packet` and plaintext or encrypted data. + OpenPGP Public Key See {term}`OpenPGP Certificate`. @@ -303,7 +338,7 @@ Signature On Component {term}`Cryptographic signature` associated with {term}`Component Keys` or {term}`Identity Components`. See [](/08-signing_components). Signature Over Data - {term}`Cryptographic signature` over binary documents or canonical text documents. See [](/07-signing_data). + See {term}`Data Signature`. Signature Packet See {term}`OpenPGP Signature Packet`. @@ -329,6 +364,15 @@ Signer Signing Key Flag A {term}`Key Flag`, indicating that a {term}`Component Key` can be used for signing data. See [](capabilities_key_flags). +Strong Authentication + "Strong Authentication" in this text refers to having ascertained that a {term}`certificate` and an {term}`identity claim` on it are legitimately linked. That is, that the person who controls the {term}`certificate` is correctly represented by the {term}`identity component`. + + Strong authentication in OpenPGP is typically encoded with a {term}`certification signature`. + + Ascertaining strong authentication requires an out-of-band check: Either via a manual {term}`verification` process, or an automated system that can {term}`certify` that a user has identified to the system that issues the {term}`identity` in question (e.g. an email provider can {term}`certify` email-based {term}`identities` that it issues to the user). + + Also see {term}`Authentication`. + Subkey See {term}`OpenPGP Subkey`. @@ -344,6 +388,9 @@ Symmetric Cryptography Symmetric Secret Key The {term}`Private Key Material` used in {term}`Symmetric Cryptography`. +Text Signature + A {term}`signature packet` with the {term}`Signature Type ID` `0x01`, which is used for textual data. + Third-party Identity Certification {term}`Certification` by third-parties to confirm ownership of an {term}`OpenPGP Certificate` by a {term}`Certificate Holder`. See [](third_party_identity_certifications).