Pretty Good Privacy A Program For Encrypting Dycrypting Of Data

1126 words - 5 pages

1. INTRODUCTION

Pretty Good Privacy, known as the PGP, is a popular program for encryption and decryption of data, providing security services for electronic mail messages and data files.

Created by Philip Zimmermann in 1991, this program has been widely used throughout the global computer community to protect the confidentiality and integrity of the users’ data, giving them the privacy of delivering messages and files only to their intended individual or authorized person (Singh, 2012). Not only being useful for individuals as a privacy-ensuring program, it has also been used in many corporations to protect their company’s data from falling into the wrong hands (Rouse, 2005).

This program uses mainly on the concept of cryptology. Cryptology is the study about secret communication between two parties, where there is a presence of a third party known as adversaries, and that party knows nothing about the content of the communication (Rivest, 1990).

The security that PGP offers basically is on the encryption and decryption concept, touching on different kind of keys such as public keys and conventional keys, hash function, digital signatures and sometimes a combination of a few methods to make sending data to the right and authorized recipients even more secure. Moreover, following the Internet Standard Track, this program is currently being of the trusted program that is widely used (Stallings, 2011).

2. CRYPTOGRAPHY IN PRETTY GOOD PRIVACY PROGRAM

2.1 Cryptology

Generally, the Pretty Good Privacy (PGP) program is all about cryptography, whereby the basic of it is encryption and decryption. Encryption is a process of encoding message, to the extent that the meaning of the message is not obvious or cannot be read using normal language, known as the ciphertext (Pfleeger, C. P. & Pfleeger, S. L., 2006). For decryption, it is the reverse process of encryption, changing cipertext back to the original form of message (Pfleeger, C. P. & Pfleeger, S. L., 2006). Figure 2.1 below shows the process of encryption and decryption.

Figure 2.1: The process of encryption and decryption. (Modified from Network Associates, Inc.,1999).

2.2 Types of Keys Used In PGP

For encryption and decryption process, there are many types of method or known more as different kind of keys for the process to occur. For the PGP, it make used of a few popular kind keys for its program.

2.2.1 Symmetric Key

Symmetric-key encryption, also known as the secret-key, for conventional cryptography, is a one key used for both the encryption and decryption process. One simple and common example of conventional cryptography is the Caesar Cipher.

The following example uses Caser Cipher concept, using encryption key “+3”.

Normal A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Shift 3 D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

From the above, a normal message “THIS IS A SECRET MESSAGE”...

Find Another Essay On Pretty Good Privacy - A Program for Encrypting Dycrypting of Data

A Struggle for Privacy Essay

1474 words - 6 pages A Struggle for Privacy The title of a “star” came around in the 1920’s, when celebrities were treated like gods and deemed unattainable. Like a star, celebrities were viewed as gorgeous, and bright, they seemed to shine brighter even in the darkest times. When television was introduced to America in the 1930’s, the god-like status of celebrities faded into the modern day larger than life persona. It is the larger than life status that brings

"Carl Sandburg's Motif of Blood as a Symbol of Both Life and Death" (Title pretty much nails it.) Didn't get as good a grade on this one. Lost pts for 1st sentence. Five Pages. American Poetry

1191 words - 5 pages Carl Sandburg's Motif of Blood as a Symbol of Both Life and DeathThe image of the color red is presented in at least 25 of the poems of this collection. In some instances, red is a symbol of passion and life, but in others it is offered as a symbol of suffering, death, and waste. Sandburg frequently presents this motif with the image of blood, especially in War Poems. The blood image also has a dual meaning for Sandburg. He uses it to represent

Title: The Monster's lack of childhood in Frankenstein led to complete chaos. This is a pretty good and lengthy paper, I got a good grade on it

2340 words - 9 pages all good morals and targets his purpose on earth to avenge Victor for what he has done. The monster murders all of Frankenstein's family members, along with his good friends, to make Victor suffer like the monster has all his life. Even though the monster was aware of human morals and had somewhat of an education, the nonexistence of love and guidance from a guardian, as well as constant loneliness and a victim of prejudice, led him to determine

Capitalizing the costs of developing a software program for sale

1272 words - 5 pages In order to gain a better understanding of both the software industry and the applicable guidelines for capitalizing software, some outside research into the industry and FASB standards was completed. This research was complied as a part of the risk assessment portion of the audit process (Whittington & Pany, 2012). The issue of capitalizing the costs of developing a software program for sale is a complicated issue. This is due in part to the

A Review of the Opening Sequence of Pretty Woman

2352 words - 9 pages up shots of Edward and Vivien normally just show one part of the body normally the face this is a good technique for hooking the audience because you cant see the whole body and you are wondering what is going to happen and how they are going to meet. When we first see the city it is a crab shot. As camera moves over the city it shows what is going on and showing what sort of people come out to the Hollywood Boulevard at

Essay and Works Cited for the book "One Flew Over the Cuckoo's Nest." This is a protest paper, focused on ANTI-CONFORMITY supported by critical reviews and articles. Pretty good paper :)

1321 words - 5 pages reader. Patients in the hospital consist of Chief Bromden, a "silent dignified, huge and towering Indian giant" (Dirks 3) that is referred to as being deaf and dumb, and Billy, a "pathetic, incessantly stuttering, paranoid boychild" (3). The ward prominently represents control, therefore these men have lost their sense of self-worth, and have "become more of robots for the Combine" (Shackleford 3090), says Lynne. Controlling these robots

Application Essay for a Ph. D Program

944 words - 4 pages Striving for perfection is a natural force, which has led mankind to its present state of advancement. Perfection, for me, means enhancing my knowledge in specific field of interest which will enable me to contribute to the advancement of society in general and to deeper understanding of my field in particular. It is with these objectives in mind that I wish to pursue the Ph.D. program in Operations and Supply Chain Management (OSM) at Texas A&M

Create a Program for Load Identification

3348 words - 14 pages acquired from the REDD dataset [5] which is a public dataset containing both household-level and circuit-level data from 6 US households for evaluation of energy disaggregation purpose The aim of this project is to create a load identification program by using LABVIEW or MATLAB with the PQ algorithm to recognize the appliances recorded in REDD dataset and eventually, evaluate the recognition ability of the PQ algorithm on different types of

The Total Quality Program for a Computer

1079 words - 4 pages The Total Quality Program for a Computernamecollege / courseinstructordateAbstractThe Total Quality Program for a Computer is an exploration of the steps involved in launching a new computer to targeted audiences with a focus on the business and management practices involved. An examination of consumer input, management, employees, suppliers, and distribution intermediaries' processes used in development of the product focusing on planning

Benefits of a Program Audit

721 words - 3 pages What is more important than planning, designing, and implementing a comprehensive school counseling program? To ensure the program is aligned with the ASCA’s National Model for School Counseling Program. How is that accomplished? By implementing a program audit during the early stages of the designing phase of the program and then annually thereafter. The program audit guides future program actions and ensures student needs are met (ASCA

Feedback and Evaluation for a Federal Program

818 words - 4 pages the parent or student and will offer large loan amounts with no payments until after graduation, but will start to accrue interest immediately. This has become a burden for college students due to the interest being high on the loans and experiencing high payments for repaying the loan. How the Program has Been Changed as a Result of the Evaluation Students who desire to repay their loans, but are not able to make minimum payments due to

Similar Essays

Privacy What About It? ... A Comprehensive And Easy To Understand Overview Of Public Key Cryptography And The Main Tool To Apply It: Pretty Good Privacy

5283 words - 21 pages form.Although these 'human rights' includes other subjects they also pack the right for privacy. And this is just as important as other basic rights such as freedom of speach and the right of free assembly.You might think that the right for privacy on the net already exist, but let me disappoint you on that: It does not! And in a network that is made up of 160+ states and cultures to numourous to count it is up to outselves to ensure privacy. Because no

Pretty Fly For A Wi Fi Essay

1608 words - 7 pages -accurate conclusion would be derived from a larger number of trials, especially if these trials all took place in different locations. Another possible source of error is caused by the small number of nursing student participants; the solution to this correlates with the previously mentioned call for more trials. Considering the results, it may seem pointless to implement online mediums of education; the initial expenses, according to the data

B Tree Java Program For Cs Students Data Structures Program

686 words - 3 pages [n].print(); } } public void printNodes(){ //Prints all keys in the tree, node by node, using preorder //It also prints the indicator of whether a node is a leaf //Used mostly for debugging purposes for(int i =0; i

Online Data Tracking: An Invasion Of Privacy?

1588 words - 6 pages and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more