• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About

Pretty Good Privacy (PGP)

October 16, 2019 by Mel Hawthorne

PGP is an acronym for Pretty Good Privacy, a comprehensive cryptosystem created by Phil Zimmerman in 1991 for private e-mail. PGP is based on a public-key encryption algorithm that uses a two-prong encryption method. It first encrypts the initial key exchange and then uses IDEA or International Data Encryption Algorithm in order to encrypt data continuously after keys have been exchanged.

 

 

Technipages Explains Pretty Good Privacy (PGP)

One of the unique features of the PGP mail model is that it uses circles of trust to authenticate the sender of any message. That means that where usually a signature is verified with a certificate authority or CA, PHP makes it possible for users to sign someone else’s certificates, which confirms that they know them personally and are willing to vouch that a signature came from that person and nobody else.

PGP is used for things like signing, encrypting, and decrypting texts, e-mails, files, directories, and even whole disk partitions and to increase the security of e-mail communications between known participants. Its encryption effectively uses a serial combination of hashing, data compression, symmetric-key cryptography, as well as the aforementioned public-key cryptography. Despite having been released in 1991, there is currently no known method of breaking the secure circles established by PGP through cryptographic or computational means.

It’s been described as near military-grade security and is used in several different programs, though big clients like Windows Mail, Mozilla Thunderbird and the like each have their own type of encryption and security features. PGP isn’t perfect, but it is believed that any vulnerabilities found with programs that use it are in the client, rather than the encryption itself.

Common Uses of Pretty Good Privacy (PGP)

  • Pretty Good Privacy or PGP uses both symmetric and asymmetric keys to encrypt data before it is sent through a network.
  • PGP is used for signing, encrypting, and decrypting texts as well as e-mails and more.
  • The Open PGP encryption standards were established by the IETF and implemented in several free software tools.

Common Misuses of Pretty Good Privacy (PGP)

  • PGP combines the advantages of both asymmetric and symmetric encryption, while also at least partly mitigating the downsides of them.

You Might Also Like

  • Need a Good Sim Card for The Usa? Here's 8 You Can Buy Right on Amazon
    Need a Good Sim Card for The Usa? Here's 8 You Can Buy Right…
  • Review: Is Avast VPN Good?
    Review: Is Avast VPN Good?
  • 10 Best Privacy Advantages to Using DuckDuckGo
    10 Best Privacy Advantages to Using DuckDuckGo
  • How Do Privacy Screens Work?
    How Do Privacy Screens Work?
  • How To Set Zoom Privacy Settings
    How To Set Zoom Privacy Settings
  • 5 Most Important Facebook Privacy Features
    5 Most Important Facebook Privacy Features

Primary Sidebar

Recent Posts

  • How to Print Labels from Excel Using MS Word Mail Merge
  • What Is NVMe Over TCP (NVMe/TCP)
  • Android Mobile Hotspot: How to Change the Password and Name
  • Windows 10: How to Force Quit and App
  • What is Dumpster Diving?
  • How to Download iOS 16 Beta 3 on iPhone or iPad
  • What is a Security Compromise?
  • Mastodon: How to DM Someone

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

You May Also Like

  • Need a Good Sim Card for The Usa? Here's 8 You Can Buy Right…
  • Electronic Communications Privacy Act (ECPA)

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy