Verified Document

PGP Encryption, Better Known As Pretty Good Essay

PGP Encryption, better known as Pretty Good Privacy is a computer program that provides cryptographic privacy and authentication. Phil Zimmerman, the developer of PGP, introduced his invention in 1991. Since then, major improvements have been made to the computer program and is now available from PGP Corporation and other companies. The original intent of PGP was to encrypt email and attachments. PGP encryption applications have expanded to a variety of components including laptop full disk encryption, digital signatures, protection for instant messaging sessions, file and folder security, files and folders stored on network servers, email and attachments and batch file transfer encryption.

The origin of PGP

PGP was first brought to the public in 1991. From 1991 to 2012, quite a few versions of PGP as well as several organizations or companies have maintained control of PGP. PGP was free on its...

According to Wikipedia, "Shortly after its release, PGP encryption found its way outside the U.S., and in February 1993 Zimmermann became the formal target of a criminal investigation by the U.S. Government for "munitions export without a license." Cryptosystems using keys larger than 40 bits were then considered munitions within the definition of the U.S. export regulations; PGP has never used keys smaller than 128 bits so it qualified at that time. Penalties for violation, if found guilty, were substantial. The investigation of Zimmermann was eventually closed without filing criminal charges against him or anyone else." In my opinion, this is a definite indicator of PGP's worth and supports individuals and companies using PGP…

Sources used in this document:
References

1. Why Use Pretty Good Privacy?, retrieved on 30 Oct 06, http://home.clara.net/heureka/sunrise/pgpwhy.htm

2. Pretty Good Privacy, retrieved on 30 Oct 06, http://en.wikipedia.org/wiki/Pretty_Good_Privacy
Cite this Document:
Copy Bibliography Citation

Related Documents

Cybercrime As Little As Ten
Words: 2633 Length: 7 Document Type: Term Paper

Since the late 1980s, the Council has addressed the growing international concern over computer-related crimes. In 1997, it established a Committee of Experts on Crime in Cyberspace (PC-CY) to begin drafting a binding Convention to facilitate international cooperation in the investigation and prosecution of computer crimes. The United States actively participated in both the drafting and plenary sessions (Chawki). The Convention stipulates actions targeted at national and inter-governmental levels, directed

Comprehensive Study of Cryptographic Methods in Practice Today
Words: 4113 Length: 15 Document Type: Term Paper

Internet Encryption The growing sophistication of internet, along with advancing abilities of individuals to hack into electronic systems is creating a growing need for improved encryption technology. The internet is becoming a domain all to itself, with its own rules, and requirements. The internet is creating new opportunities for the business and communication industries. It is also creating new demands. The internet is now facing a period in its evolution similar

Protocol and Network Management
Words: 1176 Length: 3 Document Type: Essay

wartime communication, business operations, or protecting oneself from identity theft, secure communication via the Internet is a top priority. Every day, malicious users are creating and releasing new forms of malware that are increasingly difficult to detect and combat. Many of these hackers are motivated by a desire to steal private information -- a crime that can be devastating to any victim. Fortunately, many "good guys" are also working

Internet Trust Certificates in Every
Words: 2900 Length: 10 Document Type: Term Paper

Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now