Pretty Good Privacy

(redirected from Pgp encryption)
Also found in: Medical.

Pretty Good Privacy

(tool, cryptography)
(PGP) A high security RSA public-key encryption application for MS-DOS, Unix, VAX/VMS, and other computers. It was written by Philip R. Zimmermann <pkz@acm.org> of Phil's Pretty Good(tm) Software and later augmented by a cast of thousands, especially including Hal Finney, Branko Lankester, and Peter Gutmann.

PGP was distributed as "guerrilla freeware". The authors don't mind if it is distributed widely, just don't ask Philip Zimmermann to send you a copy. PGP uses a public-key encryption algorithm claimed by US patent #4,405,829. The exclusive rights to this patent are held by a California company called Public Key Partners, and you may be infringing this patent if you use PGP in the USA. This is explained in the PGP User's Guide, Volume II.

PGP allows people to exchange files or messages with privacy and authentication. Privacy and authentication are provided without managing the keys associated with conventional cryptographic software. No secure channels are needed to exchange keys between users, which makes PGP much easier to use. This is because PGP is based on public-key cryptography.

PGP encrypts data using the International Data Encryption Algorithm with a random session key, and uses the RSA algorithm to encrypt the session key.

In December 1994 Philip Zimmermann faced prosecution for "exporting" PGP out of the United States but in January 1996 the US Goverment dropped the case. A US law prohibits the export of encryption software out of the country. Zimmermann did not do this, but the US government hoped to establish the proposition that posting an encryption program on a BBS or on the Internet constitutes exporting it - in effect, stretching export control into domestic censorship. If the government had won it would have had a chilling effect on the free flow of information on the global network, as well as on everyone's privacy from government snooping.

FAQ. UK FTP. USA FTP. http://pegasus.esprit.ec.org/people/arne/pgp.html.

Justice Dept. announcement.

["Protect Your Privacy: A Guide for PGP Users", William Stallings, Prentice-Hall, ISBN 0-13-185596-4].
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

PGP

(1) See Personal Genome Project.

(2) (Pretty Good Privacy) A data encryption program from PGP Corporation, Palo Alto, CA (www.pgp.com). Published as freeware in 1991 and widely used around the world for encrypting email messages and securing files, PGP is available for commercial use and as freeware for personal use. Freeware versions are also available from www.pgpi.org. PGP also supports digital signatures and PKI.

The Public Key Sends the Secret Key
For email, PGP sends the key and encrypted message at the same time. It encrypts the key using a public key algorithm such as RSA and encrypts the message using a secret key algorithm such as IDEA (the original), CAST5, Triple DES and AES. On the receiving side, the public key method decrypts the secret key first, which it uses to decrypt the message.

To Network Associates and Back
PGP was developed by Phil Zimmermann (www.philzimmermann.com), founder of Pretty Good Privacy, Inc., San Mateo, CA, and recipient of numerous awards for his pioneering work in cryptography. In 1997, Network Associates acquired his company, and the IETF formed the OpenPGP working group to support an open PGP standard. In 2002, the PGP assets of Network Associates were acquired by the newly formed PGP Corporation, and Zimmermann became a consultant to the company. See cryptography, digital signature and web of trust.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Xgenplus's remarkable features like Rights Management, Virtual Storage, Chat, Secure folders, Group Email, Alias & Downgrading, Anti-spam, PGP Encryption, Scheduling tasks and Reminders, Sending SMS through mail and support for Government of India's initiative for .bharat (in vernacular language) makes it unique and best fit for Government department and Public Sector Undertakings.
TELECOMWORLDWIRE-July 10, 2017-eM email client adds PGP encryption for more secure emailing
M2 EQUITYBITES-July 10, 2017-eM email client adds PGP encryption for more secure emailing
Those keys are generated by third party companies that support PGP encryption. The public-key encrypts the message while the private-key decrypts it.
(m) An English Islamic State deep web forum user posted the same month also extolled the virtues of PGP encryption. "This method of encryption is the same one used by the assassins, drug dealers, and smugglers on the hidden internet, and this is due to its high level of security, such that one cannot even respond to a post or message without having the cypher," the user stated.
The video includes beheadings and footage of the ISIS gunmen who killed more than 100 people in Paris in November.&nbsp;But Snowden, an outspoken encryption advocate, said the code has too few letters to be a true example of PGP encryption, which ISIS claims to use.
We launched PGP encryption in the browser earlier this year which highlights our forward thinking, innovation and dedication to security,” says Georgina Park, Maytech's Marketing Manager.
In the next phase, Symantec plans to deliver cloud information security by leveraging Symantec's leading DLP and PGP encryption technologies to automatically detect, block and encrypt confidential information before it's stored or shared in the cloud.
brute-force attack on the widely available PGP encryption suite could
To keep that data from being compromised as it is sent over insecure networks (i.e., the Internet), NTCA uses a technology known as PGP encryption.
"With PGP Command Line for mainframes, businesses now have the flexibility to address security needs with PGP encryption throughout their organization-no matter where the data originates or where it is stored."