Computer Security Pretty Good Privacy
#1

Computer Security Pretty Good Privacy



.pdf   Computer Security.pdf (Size: 563.65 KB / Downloads: 0)

Pretty Good Privacy

The success of our information economy depends, in large part, on
the ability to protect information as it flows. This relies on the
power of cryptography. RSA provides extremely strong encryption,
but is not particularly easy to use.
Phil Zimmermann had the goal of providing strong encryption for
the masses, in the form of an encryption system for email that is:
extremely strong, using state of the art cryptographic
algorithms;
easy to use and accessible to all.



Did Zimmermann Succeed?

From Wikipedia page on PGP:
In 2003, an incident involving seized Psion PDAs
belonging to members of the Red Brigade indicated that
neither the Italian police nor the FBI were able to decode
PGP-encrypted files stored on them.
A more recent incident in December 2006 (see United
States v. Boucher) involving US customs agents and a
seized laptop PC which allegedly contained child
pornography indicates that US Government agencies find
it “nearly impossible” to access PGP-encrypted files.
Additionally, a judge ruling on the same case in
November 2007 has stated that forcing the suspect to
reveal his PGP pass-phrase would violate his Fifth
Amendment rights i.e. a suspect’s constitutional right
not to incriminate himself.


Growth of PGP

PGP has grown explosively and is widely used.
1 Available free worldwide for Windows, UNIX, Macintosh, and
others. The commercial version satisfies businesses needing
vendor support.
2 Based on algorithms with extensive public review.
Public key encryption: RSA, DSS, Diffie-Hellman.
Symmetric encryption: CAST-128, IDEA, and 3DES.
Hash coding: SHA-1.
3 Wide applicability: standardized scheme for encryption,
supports secure communication over Internet and other
networks.
4 Not developed by or controlled by any government.
5 Now on track to become an Internet standard (RFC 3156).



PGP Authentication
This is a digital signature function.
1 Sender creates a message.
2 SHA-1 (or DSS/SHA-1) is used to generate a 160-bit hash
code of the message.
3 The hash code is encrypted with RSA using the sender’s
private key and the result is prepended to the message.
4 The receiver uses RSA with the sender’s public key to decrypt
and recover the hash code.
5 The receiver generates a new hash code for the message and
compares it with the decrypted hash code.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: pretty good privacy pdf, pgp inhibitors, sha cha sauce, who is holden on pretty, sha de iran, questionnaire on good day biscuitsading computer, pretty good privacy algorithm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Paper Presentation on Software Development Automation by Computer Aided Software seminar paper 4 3,157 23-03-2016, 02:05 PM
Last Post: dhanabhagya
  Wireless LAN Security FULL REPORT seminar details 3 5,133 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Computer virus seminar addict 2 2,866 28-01-2013, 03:28 PM
Last Post: seminar details
  BRAIN COMPUTER INTERFACE project uploader 1 1,537 01-01-2013, 10:48 AM
Last Post: seminar details
  Privacy-Preserving Updates to Anonymous and Confidential Databases - JAVA project uploader 3 2,173 23-12-2012, 07:35 PM
Last Post: mr.patil1234
  COMPUTER SCIENCE AND INFORMATION TECHNOLOGY SYLABUS seminar details 1 1,454 23-11-2012, 01:00 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,969 14-11-2012, 12:29 PM
Last Post: seminar details
  Computer Graphics ppt seminar details 1 4,874 31-10-2012, 01:09 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,370 22-10-2012, 02:29 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,708 08-10-2012, 03:08 PM
Last Post: seminar details

Forum Jump: