Pretty Good Privacy

The issue with digital privacy was a major concern for all, even back in the 1990s. A guy by the name of Phil Zimmermann created an encryption and authentication program called Pretty Good Privacy (PGP). This allows a user to encrypt, decrypt, and sign messages, whether a file or even an email message (text).

How does PGP ensure the confidentiality and integrity of a message? Earlier in the chapter, we used two fictional characters, Alice and Bob. Once again, we'll create another analogy to further explain and describe how PGP secures our message between one device to another.

Let's assume Alice wants to send a message to Bob using an email messaging system. However, there's sensitive/confidential data in part of the body of the email message. This is a major concern for both Alice and Bob. Let's start the process:

  1. Alice writes the message, and she uses Bob's public key to encrypt the message, creating ciphertext.
  2. Alice send the ciphertext over to Bob:
  1. Bob receives the ciphertext and uses his private key to decrypt and read the message from Alice:
  1. In return, if Bob wants to send Alice a message, Bob would use Alice's public key to encrypt the message and send it.
  2. Only Alice's private key would be able to decrypt the message that Bob had sent.

In a public key system, two different keys are generated, a public key and private key. Only these key pairs can encrypt and decrypt messages between them. The public key is used to encrypt and the private key is used to decrypt.

Some uses of Pretty Good Privacy are as follows:

  • Authentication of digital certificates
  • Encryption and decryption of emails and files
https://keybase.io/ provides PGP keys to anyone who would like to get started using PGP for digital signing and encryption.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.79.59