PGP Technology (FIG) (1)

Source: Internet
Author: User
PGP is the abbreviation of "Prettygood Privacy". Mainly from MIT, has run in MSDOS, Unix, VAX and other different types of operating system versions. It is based on the "Public key" (Rsapublic key) encryption technology, so that people can safely transmit confidential information through the public channel. One, single key and public key traditional cryptographic techniques use a single key, meaning that encryption and decryption are the same key. In this way, when an encrypted file is routed over a public channel, it is also necessary to find a secret key that is not public for secure channel transfer for decryption. and public key technology has two keys at the same time, this pair of keys is called "PublicKey" and "private key" respectively. They have a specific internal connection, that is, "PublicKey" encrypted files must be quot;private key to solve, and vice versa, with "privatekey" encryption only "public key" can be solved. "Public key" is open to the outside, "Privatekey" is privately owned. Anyone can use the PGP tool to generate the pair of keys, and then tell the "PublicKey" to a friend or public key database server for others to know. "Privatekey" is to be stored in a safe place that only knows. Second, encrypted email our general email is a plaintext transmission, after the Internet over multiple host forwarding, we can not guarantee that it has not been intercepted by others. Using PGP, you can send confidential letters very securely. First of all, using plaintext to send or check the database server to get the recipient's "PublicKey", and then use this "public key" encryption to send his letter, and then sent out. As this letter only with this "publickey" corresponding to the "private key" can be solved, and "private key" only in the hands of the addressee, even if others intercepted this letter can not be solved, thus ensuring the security of the letter. Third, electronic signature when you send an article or a file to the Internet, how can anyone guarantee that it is yours, not an imposter? Electronic signatures can solve this problem. You first encrypt your signature with your "Privatekey" and send it out. When someone receives it, use your "public key" to solve it, and if it is solved, you are the real one. It must be an imposter to solve it. Because your "Privatekey" only you personally have, no one can forge. Installation instructions Double-click Setup.exe to perform the PGP installer, and the following welcome page appears, clicking Next: 498) this.width=498; ' OnmouseWheel = ' Javascript:return big (This) ' style= ' width:159px; height:145px "height=359 src=" http://images.51cto.com/files/uploadimg/20051219/0921060.jpg "width=481 border=0> 1-2. The software provider needs you to read and accept the following license agreement before installing the software, select Yes and proceed to the next installation. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=357 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921061.jpg "width=479 border=0> 1-3, a new version of the pgpfreeware_6.5.3 pops up in the next window, click Next." 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=357 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921062.jpg "width=479 border=0> 1-4, enter the user information, enter the username and organization name in the" name "and" Company "boxes, and click Next. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=357 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921063.jpg "width=479 border=0> 1-5, the following form prompts you to choose the installation path, you can click" Next "to accept the defaults, or click" Browse "to change the path of the program installation. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=357 src= ' http://images.51cto.com/fileS/uploadimg/20051219/0921064.jpg "width=479 border=0> 1-6, check the components you want to install, select the components you want to install, and you can accept the agreed values. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=357 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921065.jpg "width=479 border=0>1-7, confirm you entered the installation information, need to change please click" Back ", otherwise click" Next "next. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=357 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921066.jpg "width=479 border=0> 1-8, copy the file, when you are finished, please select the network adapter type. Click OK next. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=227 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921067.jpg "width=411 border=0> 1-9, the system prompts you to use the existing keychain, you can choose" No "to the next step. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height=116 src= ' http://images.51cto.com/files/ Uploadimg/20051219/0921068.jpg "width=353 border=0> 1-10, select" Yes,i want to restart I computer now "in the following window, click" Finish " Complete the installation and restart Windows. 498) this.width=498 ' OnMouseWheel = ' javascript:rEturn big (This) ' height=357 src= ' http://images.51cto.com/files/uploadimg/20051219/0921069.jpg width=479 > < 1 2 next >> content navigation to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passed (0 Votes) original text: PGP technology (figure) (1) Return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.