Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Patents

PKWare Files a Patent Application for Secure .zip 281

prostoalex writes "The battle of ZIP formats might intensify as PKWare filed an application with USPTO to obtain a patent on its Secure Zip technology, which pretty much involves archiving with strong cryptography. If the patent gets granted, PKWare will license its algorithms for other software manufacturers. A representative of Aladdin Systems summed it up: "The good thing about the .zip file format was that you knew you could send it to everyone. Now that's getting broke.""
This discussion has been archived. No new comments can be posted.

PKWare Files a Patent Application for Secure .zip

Comments Filter:
  • Use PGP (Score:5, Informative)

    by unixwin ( 569813 ) on Friday July 25, 2003 @07:32PM (#6536766) Homepage
    zip & use pgp even better use bzip2 and pgp
    secure and compressed
  • Re:Use PGP (Score:5, Informative)

    by FrankoBoy ( 677614 ) <frankoboy@gmail.cTOKYOom minus city> on Friday July 25, 2003 @07:39PM (#6536812) Homepage Journal
    Indeed [pgpi.org].
  • Re:Use PGP (Score:1, Informative)

    by Anonymous Coward on Friday July 25, 2003 @07:39PM (#6536815)
    not quite a good replacement. Take a 1 gig "protected" zip file and a 1 gig protected bzip2 + pgp file and get one specific file out of it. You'll see quite the difference in time spent and your methods.
  • Re:Use PGP (Score:2, Informative)

    by Anonymous Coward on Friday July 25, 2003 @07:48PM (#6536887)
    The confusion arises because zip does both multi-files and compression, instead of adhering to the unix philosophy of "do just one thing". So let's review the tools we have:

    tar: to combine multiple files
    gzip: to compress one file
    pgp: to encrypt one file

    Of course, we can use them in any other, but the order that makes most sense is: (1)gzip, (2)pgp, (3)tar.
  • Re:Use PGP (Score:3, Informative)

    by daveq ( 645397 ) on Friday July 25, 2003 @07:50PM (#6536898)
    The reason it encrypts beforehand is that you can't really compress encrypted data. Well encrypted data should appear random.

    PGP's algorithm of choice for compression may not be as cool as yours though, so you may want to use bzip2 anyway for particularly large files.

  • geek factor (Score:3, Informative)

    by poptones ( 653660 ) on Friday July 25, 2003 @07:51PM (#6536905) Journal
    The geek factor is the prime reason so much great open source software lacks the pentration to usurp proprietary, sometimes patented widgets like this one.

    I use PGP for just about everything (I have a built in "roaming profile" via PGPdisk) but I don't believe it compresses stuff (if it does you sure can't tell it - a 600MB PGPdisk won't hold more than 550MB before it gets so fragged you can hardly use the CD). You can use NTFS and compression, but that's not nearly as efficient as zip and you can't mount ntfs partitions in read only mode from win2k, so NTFS parts on CD are essentially useless. It's easy enough to install, but then you gotta be comfortable with formatting and all that stuff - where does this leave people who think "explorer" is just "how you get the internet?"

    The problem with pgpdisk is it's not pervasive and there doesn't seem to be a well supported fork out from under the thumb of NA. It would be fantastic if there were a lightweight pgpdisk runtime (ie not a 15MB download, with a braindead consumer oriented GUI) available that was supported in the oss community, but I don't know of one.... do you?

  • PK (Score:5, Informative)

    by semanticgap ( 468158 ) on Friday July 25, 2003 @07:53PM (#6536915)
    For those too young to remember - PK are initials of late Phil Katz, the original author of PKZip, a pretty unusual character. Here's a link [go.com] about how he died.

    AFAIK the company is now run by his mom pretty much.
  • by Anonymous Coward on Friday July 25, 2003 @07:56PM (#6536943)
    It's important to note how the strong encryption
    differs from other pkzip crypto methods.
    A zip45 file begins with:

    central file header signature 4 bytes (0x02014b50)
    version made by 2 bytes
    version needed to extract 2 bytes
    general purpose bit flag 2 bytes ... etc ...

    In a zip file, if the GENERAL PURPOSE bit flag is set
    (bit 0 of the 2 byte field) it means the file is encrypted.

    The PKZIP encryption scheme was designed by Roger
    Schalfly, who is evidently the son of the famous
    (1980s anti-women's rights) republican spin mastah
    Phyllis Schlafly. But anyway.

    Each encrypted file has an extra 12 bytes stored at
    the start of the data area defining the encryption
    header for that file. The encryption header is originally
    set to random values, and then itself encrypted, using
    three, 32-bit keys. The key values are initialized using
    the supplied encryption password. After each byte
    is encrypted, the keys are then updated using
    pseudo-random number generation techniques in
    combination with the same CRC-32 algorithm
    used in PKZIP and described elsewhere in this document.

    The following is the basic steps required to decrypt a file:

    1) Initialize the three 32-bit keys with the password.
    2) Read and decrypt the 12-byte encryption header, further
    initializing the encryption keys.
    3) Read and decrypt the compressed data stream using the
    encryption keys.

    For step one, you jack up your karma whorin' by pasting
    the following key sets:

    Key(0) > 24)
    end update_keys

    In step two, often associated with total karma whorin',
    one also (*cough* karma whore) loops through the
    buffer with:
    loop for i > 8
    end decrypt_byte

    After the header is decrypted, the last 1 or 2 bytes in
    Buffer should be the high-order word/byte of the CRC for
    the file being decrypted, stored in Intel low-byte/
    high-byte order. Versions of PKZIP prior to 2.0 used a
    2 byte CRC check; a 1 byte CRC check is used on
    versions after 2.0. This can be used to test if the
    password supplied is correct or not.

    In step 3, we continue to blatantly violate copyright laws
    while whorin' karam with:

    loop until done
    read a character into C
    Temp - C ^ decrypt_byte()
    update_keys(temp)
    output Temp
    end loop

    So that's about it.
  • by gotr00t ( 563828 ) on Friday July 25, 2003 @07:56PM (#6536947) Journal
    Well, there are the main two formats that are common in Linux: tar.gz and tar.bz2

    In both cases, the files are essentially concatinated into a single file by the tape archiver (tar) and then that file is compressed using either the gzip or bzip2 utility. While bzip2 is capable of much better ratios, it takes a lot more processing power, and is not nearly as ubiquitous as gzip is.

    In some older UNIXes and most Linux distros, there is still the zip utility that makes files with the extension .tar.Z . This is an older format, but it is still being used sometimes.

  • Re:7-zip (Score:5, Informative)

    by pla ( 258480 ) on Friday July 25, 2003 @08:03PM (#6536986) Journal
    Everybody, start using the (open source) 7-zip instead.

    No kidding. It amazes me that a lot more people don't use this - It handles all the major formats (zip, tar, gz, bz2, cab, no "sit", though) better than the "native" program for them does, and hey, open source to boot. And, its "7z" format really does get 10-30% better compression than even bzip2.


    Gotta agree with the other response to you, though - the interface needs MAJOR work. It doesn't "look" bad, but feels very counterintuitive. Hell, if they totally eliminated the psuedo-explorer-esque look and just let me drag-and-drop, I'd consider it perfect.
  • by DeeKayWon ( 155842 ) on Friday July 25, 2003 @08:03PM (#6536988)
    No, zip makes zip files. compress makes .Z files.
  • by Anonymous Coward on Friday July 25, 2003 @08:23PM (#6537096)
    you're both right.. 'encrypted data' doesn't compress well not because it's random, but because it's redundancy is relative to the encryption method and not to specific patterns within text sets, image sets, number sets.. since conventional compression like burrows-wheeler, huffman, gzip, pkzip, etc. are all designed to remove patterns from 'natural' data sets you'll have much poorer compression rates.. but that hardly means the data is not compressible
  • This is correct. So the secure pkzip involves compression, encryption, and archiving in that order. This is in contrast to tar, where you usually archive first, then compress (with gzip), and then perhaps encrypt the result (though most encryption programs also compress).
  • by Anonymous Coward on Friday July 25, 2003 @09:05PM (#6537298)
    I would not consider .sit a competitor to .zip. StuffIt is the .zip for the Mac niche. It's the only archive format out there that is sensitive to Mac OS resource forks. For certain types of Mac files (read: most), putting your data into a zip archive will render them useless. Though reliance on the resource fork is decreasing in Mac OS X.

    Aladdin writes software handles zip files, too. So they DO care about inter-operability. They have a perfectly honest and legitimate interest in this.
  • by Anonymous Coward on Friday July 25, 2003 @09:20PM (#6537361)
    You won't lose everything if the tar.gz is corrupt. You will lose everything AFTER the corrupt block. Files that appear before it will still be untarred. Chances are you will get portions of a file that is corrupt, too.

    tar and gzip are based on pipes and streams. They're surprisingly flexible. If gzip craps out in the middle of the input, it will still output as much as it can figure, and tar will work from that, even if it is incomplete.
  • by SEE ( 7681 ) on Friday July 25, 2003 @09:54PM (#6537518) Homepage
    It'd be interesting to see exactly what the scope of the claims are in the patent, since this is a potential threat to encrypted gzip as well.

    How?

    Zip and gzip use the same 'deflate' compression alogrithm. In fact, zlib [gzip.org] was based on the Info-Zip [info-zip.org] code, a free software/open source alternative to pkzip, and the GZip homepage [gzip.org] specifically credits Info-Zip as where "all this started", and mentions that the decompression code was based on the code of the major author of Info-Zip. And WinZip's .zip support is another direct derivative of this Info-Zip code.

    So, gzip, zlib, Info-Zip, and WinZip all share common code from common authors implementing the same algorithm. As a result, it would take a very narrowly-tailored patent to allow gzip-and-encryption without allowing Winzip's zip-and-encryption.
  • by innate ( 472375 ) on Friday July 25, 2003 @09:54PM (#6537520)

    You're partly right. StuffIt was the main compression format until OS X came along, but it's not the only format that preserves resource forks.

    Today you'll mainly see .dmg (disk image) format, which features compression, optional encryption, and preserves resource forks. Also common are .pkg (a compressed installer, which can include files with resource forks) and .tar.gz files (I don't think they preserve resource forks).

    And some folks still use Stuffit .sit files.

  • by acceleriter ( 231439 ) on Friday July 25, 2003 @11:03PM (#6537825)
    It's been awhile, but IIRC, the settlement agreement is under seal, and that's a he-said, she-said affair. Of course, back then, shareware was just about the same as public domain in most people's minds, before the rampant greed associated with it started.
  • Re:7-zip (Score:2, Informative)

    by Threni ( 635302 ) on Saturday July 26, 2003 @06:07AM (#6538907)
    "Doesn't look like it has any sort of encryption.

    I'll stick to IZArc that can do 256 bit AES."

    So you must have missed:

    http://www.7-zip.org/7z.html

    7-Zip also supports encryption with AES-256 algorithm. This algorithm uses cipher key with length of 256 bits. To create that key 7-Zip uses derivation function based on SHA-256 hash algorithm. A key derivation function produces a derived key from text password defined by user. For increasing the cost of exhaustive search for passwords 7-Zip uses big number of iterations to produce cipher key from text password.
  • Re:7-zip (Score:3, Informative)

    by shish ( 588640 ) on Saturday July 26, 2003 @12:48PM (#6540042) Homepage
    A couple of things:

    o) It's windows only, and WINE won't run the main thing
    o) The self extractors it creates *do* run under wine - so if you get a .7z file and you're on linux, do `cat 7z.sfx file.7z > newfile.exe` (7z.sfx being the self-extraction header)
    o) I want a native linux version!

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...