E-Mail Security through Pretty Good Privacy Algorithm
International Journal of Electronics and Communication Engineering |
© 2014 by SSRG - IJECE Journal |
Volume 1 Issue 1 |
Year of Publication : 2014 |
Authors : C.Suriya |
How to Cite?
C.Suriya, "E-Mail Security through Pretty Good Privacy Algorithm," SSRG International Journal of Electronics and Communication Engineering, vol. 1, no. 1, pp. 1-3, 2014. Crossref, https://doi.org/10.14445/23488549/IJECE-V1I1P101
Abstract:
This paper aims to address the ever increasing problem of privacy and security while communication through the internet. By making use of an algorithm known as Pretty Good Privacy (PGP) we achieve high amount of security and privacy compared to other algorithms. This is a protocol which was introduced by Phil Zimmerman. It performs encryption and integrity protection on files. Using this algorithm the file is first converted into cipher text and then transmitted using the traditional mailer. Each user has a private key and a public key. The private key is used for encrypting the file and it is kept as a secret. The public key is known to everyone and is used for decrypting the file which was encrypted by that user. Although this process may seem long and tedious, this process works faster than described above
Keywords:
Pretty Good Privacy (PGP) , Guerilla Freeware
References:
[1]. Cryptography and network security, William Stallings, Pearson education.
[2]. Network security, Charlie Kaufmann, Radia Pearlman and Mike Spencer, Pearson Education.