This website uses cookies to ensure you have the best experience. Learn more

Should You Use Pgp? Essay

1465 words - 6 pages

Encryption and cryptography have been in existence since the time of the ancient Greeks. Man has always had the need to hide information from some while at the same time allowing others to know what it means. Typically during times of war, encryption has been important to transfer important messages. While encryption is important in cryptography, decryption is held even higher because once the code is broken the secret is exposed. This has in the past, had devastating consequences giving one side the upper hand in winning wars. Cryptography has long been performed by individuals with specialized talents. Encryption systems are often very complex and often difficult to comprehend. At present the type of cryptography we use has moved into the digital arena.With as many individuals using computers these days and all of the personal information everywhere the need for encryption standards is of the utmost importance. Encryption systems are even more complex today instilling fear into governments who are afraid that normal citizens will be able to hold unbreakable secrets because of complex algorithms that are almost impossible to break. Encryption applications such as PGP can help organizations and individuals alike to protect their proprietary and personal information, yet because of the complexity of using cryptography many choose not to. I argue that encryption for organizations and individuals is a good idea, but implementation of that strategy is not easy.Encryption is a way to make some kind of information unclear by those who do not know the code or understand the language. "In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. Encryption has been used to protect communications for centuries, but only organizations and individuals with an extraordinary need for secrecy had made use of it." (3) Encryption methods for individuals has come a long way since the days of the ancient Greeks. People and organizations, if they take the time and have a basic understanding of cryptography can securely protect their personal information. One method that exists for doing this is a software application called PGP. PGP, an acronym for Pretty Good Privacy, was created by Phil Zimmerman in 1991. "He was one of the first to make asymmetric, or public key, encryption software readily available to the general public." (4) Originally PGP was supposed to be used for authoring PGP signed and encrypted e-mail messages, but its uses have since become much more advanced. Signing an e-mail message with PGP provides assurance to the receiver that the e-mail has not been tampered with or modified in any way since its transmission to its destination. "While originally used primarily for encrypting the contents of email messages and attachments from a desktop client, PGP products have been diversified since 2002 into a set of encryption applications which can be managed by an...

Find Another Essay On Should You Use PGP?

"The Siege" by Helen Dunmore: How does Dunmore effectively dramatize the power of cold and starvation in pg 36-39? You should closely analyze the use of language and techniques

553 words - 2 pages like a stove". This simile that Dunmore uses is very effective in the sense that we can understand how much food they needed, and if they didn't get enough food, they would be "extinguished", like a fire in a stove.General hunger's and general winter's speeches are very dark in mood and very rhythmic and while reading them, you can see the horrible images of people "melting faster than a candle", "big strong bones that stand out" and loosened

Privacy Essay

2145 words - 9 pages of dangers that they must control the use of cryptography. However, a guy by the name of Phil Zimmerman did not find this reason acceptable. Phil Zimmerman came up with the idea of PGP or Pretty Good Privacy. PGP is another method of computer privacy. Zimmerman’s passion for politics, computers, and privacy led him to the production of Pretty Good Privacy. He essentially believed that the power of privacy should be shared with the "have nots

Privacy - What about it? ... A comprehensive and easy to understand overview of public key cryptography and the main tool to apply it: Pretty Good Privacy

5283 words - 21 pages your mail so no one can read it, scan it or pilfer with it. But if you want a short, non mathematical intro on how PGP works, including explanations of all the hyped up words it will use, read on.Encryption is a complex thing! Actually that should read: Good encryption is a complex thing. Tjoqmf fmdszqujpm ibt fyjtufe tjmdf uif ebxm pg obn. Now there! You didn't understand a word of the previous sentence, because I encrypted it. But put your

Kevin Mitnick

1123 words - 5 pages recipient. When all the keys are checked the then it will look up in the next phase to check the global directory for the most trusted key. If not found it then use a proper key to transmit the message automatically and this message will be sent without encrypting. In order to obtain the key, it should be generated during the encryption and decryption of the process of the message or email, hence a PGP key is generated on the Key menu. The key

Pretty Good Privacy - A Program for Encrypting Dycrypting of Data

1126 words - 5 pages will have two kinds of key. A public key which is known publically or can be found on the profile of the recipient, and also another key which is a private key, own and only known by the recipient only (Network Associates, Inc., 1999). To use this method, you can send a message to your intended recipient using their public key. And when they receive it, only using his or her public key, can that person decode the message into plain text. Using this

ANOVA Paper

1145 words - 5 pages an existing relationship with several prominent companies, perhaps most notably H & R Block. The financial services firm uses PGP products for a number of reasons: compliance, protecting brand value, and preserving the one-to-one relationship it has with the tens of millions of customers who use H & R Block's tax preparation service annually (PGP Case Study, 2006.)There are a number of regulations that drive H & R Block's compliance

Ethics of Encryption

2198 words - 9 pages email he had received from someone in Latvia the day Boris Yeltsin was going to war with his Parliament: "Phil I wish you to know: let it never be, but if dictatorship takes over Russia your PGP is widespread from Baltic to Far East now and will help democratic people if necessary. Thanks." [sic] (Liquia) Clearly, although U.S. export laws strictly restrict the distribution of encryption algorithms and software, PGP is available and used

Data Encryption

1032 words - 4 pages three different key sizes such as 128, 192 or 256 bits. Philip Zimmerman created software known as PGP, which stands for Pretty Good Privacy. When an individual wants to encrypt his or her e-mail, they use PGP software. When using this encrypting software, it allows you to digitally sign the e-mail which shows the recipient that no one has messed with the document. PGP is another type of public key encryption. The PGP software creates a

Security - You're Still Doing it Wrong

1620 words - 7 pages , but pounding the pulpit with "this is how you secure your data/network/traffic." While I don't want this to be a technical write up filled with Visio diagrams, RFC references, I need to add some to clarify my statement - "You're doing it wrong... still!" Let's begin with the fundamentals of disk based encryption, which WILL include message encryption. Message encryption could be anything you choose, PGP, steganography, it could be Pig Latin

What are the security problems and solutions of the Internet?

1356 words - 5 pages between a reliable connection-oriented network layer protocol (e.g. TCP/IP) and the application protocol layer (e.g. HTTP). SSL provides for secure communication between client and server by allowing mutual authentication, the use of digital signatures for integrity, and encryption for privacy.¡¨ (1) Another latest security system is Security Electronic Transactions (SET) ¡§Security Electronic Transactions (SET) is a system for making payments

security

3132 words - 13 pages called “Massive Volume Reduction”. It only takes 30% of data, which is filled mostly with meta-data. They classify data by the volume and priority. For example peer-to-peer download is classified by “large-volume low value” data and will be rejected intially. For gathering the communication tapping, they use trigger words or targeted person to be selected as a should-be-observed content. Same purpose but different implementation is done by U.S

Similar Essays

Why Should You Use The Public Transports?

544 words - 2 pages , you will find that an Octopus card is far more economical. If you live in an urban area and use the buses or trains as your primary transportation source, you will save even more on car payments, insurance and repairs. In addition, many public bus and mini-bus systems have sectional payment, which will cost you cheaper if you just ride a short distance, such as a several stops.Convenience is the next advantage. Most trains and buses run on a set

10 Killer Headline Templates And Why You Should Use Them!

885 words - 4 pages Site The prevalence of "Top Five/Seven/Ten/Twenty" lists may seem overdone but savvy marketers know that headlines offering a list get readers. Readers want to know what's trending and lists are a perfect way to provide that information. As an added bonus, lists allow content marketers to use subheading in a natural way to increase readership. Do You Want Great Headlines? Addressing the reader directly with a question is a great way to grab

Science Fiction Essay "Planet Of The Apes": There Should Scientific Elements That Are To Be Considered, Use Them In Your Essay If You Can

944 words - 4 pages Science fiction text like the one studied "Planet of the Apes" has typical and common elements such as conventional characters, setting, themes and plots. These are explored in Planet of the Apes and in numerous different ways across a number of different texts which helps to classify science fiction genre.Conventional characters in Planet of the Apes would be that the good guys are not considered to be as powerful as the bad guys. The good

Discuss The Similarities And Differences Of Miller And Hawthorne's Use Of Language In 'the Crucible' And 'the Scarlet Letter'. You Should Include In Your Answer Reference To The Importance Of Genre

1073 words - 4 pages interpretations and opinions of the events discussed, and there are inevitably several contrasts in their approaches, particularly to the characters' dialogue.As 'The Crucible' is a play, it is concerned mostly with dialogue, save Miller's various informative interludes, whilst 'The Scarlet Letter' is a novel and makes use of descriptive, figurative and allegorical language, although dialogue is still present. When deciding how to write his dialogue