![]() ![]() The first version of this system was generally known as a web of trust to contrast with the X.509 system, which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Each public key is bound to a username or an e-mail address. PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography each step uses one of several supported algorithms. ![]() Modern versions of PGP are interoperable with GnuPG and other OpenPGP-compliant systems. PGP and similar software follow the OpenPGP standard (RFC 4880), an open standard for encrypting and decrypting data. ![]() PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Pretty Good Privacy ( PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. RFC 2015 MIME Security with Pretty Good Privacy (PGP). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |