Preview

Pretty Good Privacy

Good Essays
Open Document
Open Document
647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pretty Good Privacy
Topic: Pretty Good Privacy
Justification:
Information security is a significant issue which attract people’s a lot attention in current society. The email security is highlighted problem in this area.
According to Email Statistics Report 2012-2016 (Radicati Group), there are 3.3 billion worldwide email accounts in 2012, and are expected to increase to 4.3 billion accounts in 2016. In general, transfer of email has many protocols; the SMTP is a main one. In this protocol, the content is required to be plaintext for transfer. So, the detail of email is actual send as plaintext. Any attempted individual or group can intercept emails. For example, companies or websites reply a notice mail to you for confirming you register information. This kind of mail usually contains some sensitive information (account ID, password). The leaking of this information will produce many security problems. The email providers only offer security methods in physics layers or servers, while the practical content of mails always is plaintext in the email environment. Therefore, people consider a method which is able to encrypt the contents of emails to achieve the security requirement.
Pretty Good Privacy (PGP) is system which is widely used in the email environment and digital signature. This system employs few encryptions to ensure the information security and integrity during network transmission. In this project, we are going to analyze many aspects of PGP, such as standards, protocols and implementations. Also, we will use SVO logic to proof the authentication of PGP.
Description:
In this project, firstly, we will collect some general information to review the background and history PGP.
Then we will focus on the details of mechanism of its different aspects, like what algorithm does it use to achieve authentication, and how does it encrypt the emails, etc. In this step, We are going to read some papers and books to get good understanding of the encryption system it

You May Also Find These Documents Helpful

  • Good Essays

    The GNU Privacy Guard (GnuPG) is GNU 's tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, and help authenticating using Secure Shell and to provide a framework for public key cryptography. It includes an advanced key management facility and is compliant with the OpenPGP and S/MIME standards. Gpg4win is GNU Privacy Guard for Windows and Kleopatra is the certificate manager in Gpg4win. To create OpenPGP and X.509 certificates, Gpg4win uses a key length of 2048bit by default. The default algorithm for signing and encrypting is RSA. [1]…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In addition to the already existing security layers, there should be an added layer specifically for incoming and outgoing emails.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Emails can be used to send information to individuals or a whole company, there are many different facilities within email software that can ensure the recipient has read the email this is important if the email contained time critical information. Also as email can be used as a legal form of communication it can be used to send contractual information and purchase orders.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 210 handling mail

    • 510 Words
    • 3 Pages

    Mail may have confidential information. It may include personal information about employees or contain business secrets such as the names of customers and confidential information related to the business, customers and clients. Also, mails and packages have to be checked for suspicious features. So security procedures will have to be followed while dealing with mails and packages.…

    • 510 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    You are going to allow your remote users to relay mail via your mail server across the internet, as this will encrypt the username and…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I do not agree with that statement. There are many ways to make email secure – whether using an end to end encrypted email, a virtual private network (VPN), secure erasure programs, and many other counter measures. If all countermeasures are taken, you would be able to trust an email to an individual just about as much as you can trust that individual. If someone wants information badly enough they will get that information regardless of what form of communication is being used.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In a business environment it’s essential that you have correct mail handling procedures in order to keep information safe and secure this can be client’s details, account details, personal information of employees etc. This needs to be protected in order to avoid illegal misuse of data and personal information leading to fraudulent activities.…

    • 2151 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Inability to offer regard for the range of security preparing puts a venture at extraordinary hazard since security of organization assets is as much a human issue as it is an innovation issue. Another kind of NIST 800 is Electronic Mail Security. Electronic mail (email) is maybe the most prevalently utilized framework for trading business data over the Internet (or some other PC organize). And no more fundamental level, the email procedure can be isolated into two primary segments: first mail servers, which are hosts that convey, forward, and store email; and the second is mail customers, which interface with clients and enable clients to peruse, form, send, and store email. This record addresses the security issues of mail servers and mail customers, including Web-based access to mail. Mail servers and client workstations running mail customers are much of the time focused by aggressors. Since the figuring and systems administration advances that underlie email are universal and surely knew by numerous, assailants can create assault strategies to endeavor security shortcomings. Mail servers are additionally focused on in light of the fact that they (and open Web servers) must impart to some degree with…

    • 715 Words
    • 3 Pages
    Good Essays

Related Topics