PGP Essay 3
PGP Essay 3
Contents.....................................................................................................................................1
Abstract.....................................................................................................................................2
Introduction..............................................................................................................................3
References.................................................................................................................................9
Abstract
Pretty Good Privacy (PGP) is a system which is used for the purpose of secure e-mails and
messages communication over open network. The idea of (PGP), introduced in this paper,
therefore it is an attempt to outline the importance of secure and efficiency of e-mail
messages, the propose of this paper is to provide clear and certain idea about (PGP) as
security tool which enables the users to secure their damaging information, and sensitive data
by making their stored documents and e-mails safe and secured. This paper illustrates (PGP)
as powerful and modern system, with increasing in operation automation and integration as
result of the growth in computer networkers, the paper has been divided into four parts each
part discuses specific part of Pretty Good Privacy (PGP).
Introduction
Encryption is an old science, and as the use of computer has become more powerful the
number of users who use encryption has grown and grown. Organisations officials grew
increasingly concerned about the wide spread available of encryption techniques. Although
encryption has perfectly valid uses for every day citizens, it is also a powerful tool for tasks
are done within profitable or governmental organisation. In 1991 Senate Bill 266 (a sweeping
anti crime bill) had a minor point those reuired government accessible back doors in all
encryption tools. While this idea was under study and discussion Phil Zimmermann
combined some common of encryption methods to produce the software he named Pretty
Good Privacy or PGP. The ideas behind (PGP) were known and understood by computer
scientist and mathematicians for certain yeas, which means that the main concepts were not
exactly innovation. The real innovation of Zimmermann was making these tools usable by
anyone with a home computer. Even early version of (PGP) gave users with standard
operating system based home computers access to military grade encryption in the USA.
While Senate Bill 266 was still making its way through legislative process an effort was
made to make military grade encryption widely available. The software was distributed to a
variety of systems as well as on the Internet. Zimmermann a long time believed that (PGP)
would be of most use to dissidents, and others who faced serious risks as a consequence of
their belief, in other meaning to many people outside as well as inside the USA. Ever since
the Second World War, the USA government has considered heavy duty encryption a serious
threat to the national security and would not allow it to be exported from the USA (www
Wikipedia.org), this provides an introduction about how the (PGP) was written by
Zimmermann. Pretty Good Privacy originally was written by Zimmermann in source code,
just like that used in any book, and computer tools were used to convert the human readable
text into machine readable code. This is standard practice in the computer industry.
Zimmermann took the text and had it published in book form, when the book of source code
got exported. Then people all over the world have been able to the instructions to build their
own (PGP) software. They promptly built the software form those instructions and (PGP)
rapidly became a worldwide standard for encryption.
Many people (users) find encryption distributing even scary after all, encryption techniques
have been military and commercial secrets for millennia. Movies and novel use encryption as
their plot demand, with total disregard for how encryption works in reality. (“Lucas,
michael”, 2006).
Cryptography in digital world offers three core areas that protect data from attempt to be
taken, taking or an unauthorised use of data and . Cryptography covers these essential areas
authentication, integrity, and confidentiality.
Authentication; Authentication is a process in Cryptography that offers certificates as a
solution, which are called “digital IDs,” they can be used to verify the identity of
unauthorised person who is after to access secret data .
Integrity; Integrity is about how to protect data, corresponding to that certificates it can be
used in another technique that’s “digital signatures”, email can be easily forgotten but it’s
very hard to forge a digitally signed email message and so it’s hard to modify or manipulate a
message that is digitally signed.
Confidentiality; by using the intelligent system that knows how to encrypt and decrypt data
information can be kept secret especially when there are sensitive data over a network such as
financial transactions, or personal records, other secret information.
Cryptograph also known as secret key it has been in use for thousands of years in forms
ranging from simple substitution to more complex constructions. However, developments in
mathematics and the growth of computing power have made it possible to create this system
is effectively and unbreakable.
To encrypt and decrypt the data cryptography uses a single private key. The party having this
key can use it to encrypt and decrypt data.
The algorithm used in cryptography is fast and suitable for processing large streams of data in
modern times cryptography can be a part of mathematics and computer science, and it is
related to information theory computer security, and studying of engineering. Cryptography
can be used to protect different kinds of information such as keeping information in bank
cards, computer password, and the internet.
Conclusion
To conclude (PGP) has been increasingly becoming such a significant system in our life, as
the use of the computer and the networks has became fundamental element, in the system
communications around the world. This part comes at the end of this paper to discuss how
(PGP) is used and use encryption well. Encryption can be used by any one. Unfortunately, it
is also true that it can be used badly. In fact using encryption badly is worse than not using
encryption at all. Because when encryption is not used the files and emails messages that
contain important information are created more carefully to be kept safe and secured.
However when bad encryption is used by users it might lulled into false sense of security
while confidential information remains available and it can be accessed and damaged .
References
1/ (Lucas, Michael, 2006)
“PGP and PGP”
“Email for the Practical Paranoid”
ISBN: 9781593270711
2/ (Simon Garfinkel, 1995)
“Encryption for Everyone”
“PGP”
“Pretty Good Privacy”
First edition
ISBN 1-5-6592-098-8
3/ (www.wikipedia .org)
4/ (www.sciencedirect.com )