The application of PGP in e-mail

Source: Internet
Author: User
Keywords email PGP
Tags application authentication developed electronic signature email e-mail internet internet +
On the security issues in the e-mail system, the current more commonly used PGP technology, in addition, has become the Internet standard of PEM technology. PGP (Pretty-Privacy) was developed by Zimmermann in 1995. It is a complete e-mail security package that includes technologies such as encryption, authentication, electronic signature, and compression. PGP does not use any new concepts, it simply combines existing algorithms such as MD5, RSA, and idea. Because the entire package including the source program can be downloaded free from the Internet, PGP is widely used in Ms Dos/windows and UNIX platforms. It should be noted that PGP, though widely used, is not yet a formal standard for the Internet. PGP supports three RSA key lengths: 384bit (occasional), 512bit (commercial), and 1024bit (military). PGP is hard to break: It takes 300 million years, according to calculations, to decipher only the RSA part (the key is 1024bit long and the computer using l000mips). Therefore, it is now possible to consider PGP to be safe enough. The message format for PGP is shown in Figure 10.25. It can be seen that the PGP message consists of three parts, that is, the idea key part of the message, the signature part and the message itself. The key part is not only the key, but also the identifier of the key, because the user may have more than one public key. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=197 src= '/files/uploadimg/20051219/0927530. GIF "width=413> Key management is a key to PGP systems where each user maintains two data structures in their location: The secret key ring (private key rings) and the public key ring. A secret key ring consists of one or more users ' own secret keys-public key pairs. This is done so that users can frequently change their keys. Each pair of keys has a corresponding identifier. The sender notifies the recipient of this identifier, informing the recipient of which public key to decrypt. The public key ring includes the public key of some users ' regular communication objects. To force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) The original text: PGP application in e-mail return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.