ProtonBlog(new window)
protonmail-openpgpjs-protonmail-security-audit

Proton Mail’s open-source encryption library, OpenPGPjs, has passed an independent security audit

At Proton Mail, our goal is to make encryption as widespread and accessible as possible. We believe a key step toward that is having well-maintained, robust, and secure open source encryption libraries(new window). This is the goal of our efforts on the OpenPGPjs encryption(new window) library, which is today used by hundreds of applications (including Proton Mail) serving millions around the world. As the maintainer of OpenPGPjs, we are responsible for making sure the library is up to date and secure, as well as offering basic support to developers who wish to use it.

In March 2018, we released Version 3.0 of OpenPGPjs(new window). With this major update, OpenPGPjs is even more powerful, secure, and efficient. As part of this update, the OpenPGPjs developer community commissioned an independent security audit from the well-respected security firm Cure53(new window). Independent security audits are an important way to ensure there are no vulnerabilities that could be exploited by attackers.

Summer 2018 Security Audit Coverage

The version 3.0 release brought many new features and improvements, such as support for elliptic curve cryptography(new window) (ECC), which uses smaller signing and encryption keys compared with RSA cryptography(new window) (what Proton Mail uses now), making it a faster and more efficient alternative.

The new version also adds compression, which reduces the size of data before encryption to save space (and time) during encryption and transmission. OpenPGPjs now also offers support for AEAD(new window) (Authenticated Encryption with Associated Data). This protocol provides confidentiality, integrity, and authenticity guarantees on encrypted data, so that when you decrypt data, you can be sure this was the exact same data encrypted by your sender, and you can be sure that it was indeed encrypted by that sender. For those who are interested, you can find the full technical details of OpenPGPjs Version 3.0 here(new window).

The Cure53 team focused on a couple of these new features while also taking a closer look at some key aspects of OpenPGPjs’ crypto implementations. In particular, the audit focused on the following:

  • AEAD encrypted packets
  • EAX, GCM, OCB
  • CMAC
  • All cryptographic primitive implementations: AES, AES-EAX, AES-GCM, AES-CBC, ED25519, C25519, ECDSA, HMAC, P256, P384, P521, SECP256K1
  • Prime number handling
  • Date support in signatures
  • Cryptographic API exposure via different providers

OpenPGPjs Audit Results

We are pleased to receive a highly positive result from the audit. No major issues were discovered. In their summary, Cure53 provided the following feedback(new window):

“Tested cryptographic implementations were top notch and excellent quality given the platform. The only limitations come from the platform itself (JavaScript/web), which do not allow for side channel resistance or reliable constant time operations. Overall however this is an exceptional library for JavaScript cryptography.”

As OpenPGPjs forms the foundation of Proton Mail’s encryption, this result provides extra certainty that Proton Mail’s cryptography is properly protecting users as intended. Working with the open source community is an important part of what we do at Proton Mail, and we will continue to build out the OpenPGPjs library. We are grateful to the Proton community for supporting us in these efforts.

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan or donate. Thank you for your support!

Protégez votre vie privée avec Proton
Créer un compte gratuit

Articles similaires

passwordless future
Avec l’avènement des clés d’accès (passkeys, aussi appelée clés d’identification), beaucoup prédisent la fin des mots de passe. Cependant, le futur est-il vraiment sans mot de passe ? Ou y a-t-il une place pour que les deux types d’authentification c
Chez Proton, nous avons toujours été très disciplinés, en nous concentrant sur la meilleure façon de pérenniser notre mission dans le temps. Ce travail est incroyablement difficile. Tout ce que nous créons prend toujours plus de temps et est plus com
is icloud keychain safe
en
  • Vie privée, les fondamentaux
If you’re on any Apple device, you’re familiar with the iCloud Keychain, the Apple password manager. It’s a handy tool that stores passwords for you and helps you manage your logins.  For a program that stores all your most sensitive data in one pla
en
We recently announced that Proton Pass now supports passkeys for everyone across all devices. Universal compatibility is a unique approach to implementing passkeys, unfortunately. Even though passkeys were developed by the FIDO Alliance and the Worl
How to upload and share private video
en
Your private videos are for your eyes only. However, not all cloud storage services are good at storing videos securely, let alone privately. In this article we explain what you can do to keep file sharing companies from having access to the videos y
en
Many email services, citing security reasons, require a phone number for identity verification. This creates an unfortunate paradox in which you must give up a highly sensitive piece of personal data to Big Tech. But there are simple ways to create
Can you password-protect a folder in Google Drive?
en
Protecting a folder with a password is a simple yet effective way of securing files. You may wonder whether you can password-protect a folder in Google Drive. We explain what access controls Google Drive offers and what you can do to improve your sec