PGP Dictionary

Source: Internet
Author: User
Keywords PGP
ASCII Armor ASCII encoding, encoding binary files with 7bits of display ASCII code, which can be passed in only 7bits-supported emails. The MIME BASE-64 encoding is used in PGP. ciphertext ciphertext; Encrypted later information, generally unrecognized. Cryptanalysis analysis of cryptography, from the point of view of cryptography to find a loophole and attack it, PGP in cryptography is still quite solid. Even the Hacker's attack papers admit that the PGP system has not been breached yet. Compromised key has been leaked secret keys, no longer reliable, generally refers to private key. Conventional encryption traditional encryption, relative to the public key encryption method, usually with the same key encryption and encryption. The so-called single key system. Digital Signature Digital signature, the means of authentication to the source of information, generally with the use of public key encryption system to complete. Idea a traditional encryption method that is used in conjunction with PGP and RSA to improve speed. Its strength is much higher than classic DES encryption, which is now no longer impenetrable. Key key; don't say much. In PGP the key is a very long number, the general use of 576-bit keys, 712 are considered to have a commercial level of confidentiality, 1024-bit key for military purposes. The longer the key, the better the confidentiality, of course, the more time the encryption takes. PGP allows the user to choose the key length, ranging from 576 to 2048 bits. Key ID keys identification, "abbreviation" of the key, PGP is a 64-bit binary number, for convenience, users can only see its 2-bit, in the use of the key to distinguish between different keys. Key Certificate certificate; A block of data used to exchange keys, which contains the user ID of the key master, the time the key pair is generated, the key identifier, and of course the key itself. Key pair keys, the characteristics of public key system, public key and private key to complete the process of encryption and decryption, the key generated by the user randomly generated a pair of keys as their own public key and private key. These two keys are called a key pair. Key Revocation certificate key cancellation certificate; When the key is compromised or discarded by the owner, the owner can generate a key revocation declaration, and the specified key is marked as void when the other person joins it in their keyring. Key ring keyring; Mei Chong  艹 vertebral s to take a message  Alex file milk,  not  ping 4 swastika? A person's public key, oneself also can use a few private key necessary, so need to keep the key in the key ring.Legal_kludge a legal issue-related option, using PGP differently in the United States and elsewhere, see the PGPI question and answer book for details. MD5 message Digest 5, a Mail digest algorithm. MD5 's author is that the code used in Ron Rivest,pgp was written by Colin Plumb, MD5 itself a public software. Mpilib Mpilib is simply another implementation of RSA subroutine in Rsaref. Mpilib was originally written by Phil Zimmermann and was used in all versions of PGP until and including 2.3a. For more information on Mpilib and Rsaref, see the PGPI question and answer book. Message digests Mail Digest; The simple thing is that sin can represent a small amount of information about an e-mail message-"essence", which rarely produces the same "essence".  Prz, founder of Phil R. Zimmermann,pgp, holder of PGP trademarks. Pass phrase password; the password used to protect the private key, the user is free to choose. You cannot use private keys without a password, so passwords and private keys are equally important. In order to choose a secure password, it is best to refer to some expert advice. plaintext plaintext; unencrypted text or data. Public keys public key, with your public key other people can decrypt you use the corresponding private key encrypted data. Public keyserver PKI server, used to facilitate users to Exchange public key set up the organization, running on the internet a lot of such servers, you can email to it to send your public key, you can retrieve the public key of others. pubring, public key ring; see "Keyring", the default keyring file in PGP is pubring. PGP. RSA RSA (Rivest-shamir-adleman) algorithm is a public key system based on the assumption that large numbers cannot be decomposed into mass factorization, which is the core of PKI. Rsaref Rsaref is an implementation package for RSA encryption algorithms. (RSA is a subroutine used in PGP, which is the core of the public key encryption system.) Rsaref is free software that is released by RSA Data Security Inc., which also has a patent for RSA algorithms in the United States. See the PGPI question and answer book. Revoke a public key to abolish a common spoon, users in their own public key ring to abolish a public spoon, the reasons are many, mainly security issues. Maybe it's a forged public key, or maybe itThe owner's statement is invalid. The abolished key will no longer be used. See compromised key entry. Secret key, private key private key, private key, used to decrypt other people with your public key encrypted information. Use the private key must give the password, in order to release the private key from the private key ring. Signature Certificate Signature certificate; I understand. Certificate refers to a block of data, it is easy to understand that Signatue certi-ficate refers to an additional digital signature. This can refer to both the signature of the message and the referral of the other's public key. Trust parameter trusting parameters; Because of the transitivity of the formula referral mechanism, you can use a parameter to identify the reliability of the public key in your hand, the trust parameter of the public key referred by friend is slightly lower than his own parameter. Of course you can specify someone's parameters. This parameter is only a reference for PGP, and it is up to you to decide whether to trust a public key or not. User ID username; user name; user information attached to the key, a key can have multiple user names, so it is best to use the full name and add some unique logo, such as an email address, to avoid confusing the username. The user name of PGP can be very long, but it can be used to only enter its first few characters, enough to distinguish the line. If you remember, the 32-bit key identification can also be used to distinguish between keys. To force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passed (0 Votes) original text: PGP dictionary return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.