answersLogoWhite

0


Best Answer

Philip Zimmerman

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Who create pretty good privacy pgp?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is the full form of PGP in computer language?

Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.


What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.


Give two reasons why PGP compresses messages?

Ans 1:PGP combines some of the best features of both conventional and public key cryptography. PGP is a hybrid cryptosystem. When a user encrypts plaintext with PGP, PGP first compresses the plaintext. Data compression saves modem transmission time and disk space and, more importantly, strengthens cryptographic security. Most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher. Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis. (Files that are too short to compress or which don't compress well aren't compressed.)


What is hushmail?

See the related link for more information. Hushmail offers secure and unreadable email to its users. It uses PGP encryption and a key management system to secure email for the sender and receiver.


How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works. An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages. Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to. To get more details on the mathematics of encryption and decrption using Public Key Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

Related questions

What is PGP?

PGP stands for Pretty Good Privacy. It's a data encryption and decryption computer program that provides authentication for data communication and cryptographic privacy.


Pretty good privacy program in c language?

Yes, PGP is written in C-language.


What are the five principal services provided by PGP?

Five services delivered by PGP (Pretty Good Privacy) are: Authentication, Confidentiality, Compression, Email compatibility, and Segmentation.


Who created Pretty Good Privacy?

Phil Zimmermann created the first version of PGP encryption in 1991. Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security of e-mail communications.


What is the full form of PGP in computer language?

Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.


Is a public key encryption system that can verify the authenticity of an email sender and encrypt email data in transmission?

PGP (Public Good Privacy)


What is the most popular form of email encryption?

One of the most popular programs is PGP (Pretty Good Privacy) This uses a private key and a public one. Of course any encryption can be broken given enough time.


What is considered to be the least complex trust model?

Web-of-trustAnswer Explanation: The web-of-trust model is very simple, and is most often associated with Pretty Good Privacy (PGP). This model operates without a central authority. Individuals create and sign certificates for people who are known and trusted. The decision of whether to trust another individual is left with the user.


What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.


Is pgp encryption safer than other encryptions?

"Evaluating cryptography is difficult since without 'breaking' the encryption its hard to say whether one encryption is better or not. Pretty Good Encryption (PGP) is asymmetric, that is the encryption and decryption keys are different which may give it an edge on symmetric encryption."


When was PGP-RTB created?

PGP-RTB was created in 1958.


When was PGP-RTS created?

PGP-RTS was created in 1958.