PRETTY GOOD PRIVACY
(PGP)
SECURITY FOR ELECTRONIC
EMAIL
PGP
There are two main schemes which are especially
designed to provide confidentiality and authentication for
electronic mail systems. These are:
PGP(Pretty Good Privacy)
S/MIME(Secure/Multipurpose Internet Mail Extension)
INTRODUCTION OF PGP
• Developed by Phil Zimmerman in 1995.
• Documentation and source code is freely available.
• The package is independent of operating system and
processor.
PGP does not rely on the “establishment” and it’s popularity
and use have grown
extensively since 1995.
PGP combines the best available cryptographic algorithms to
achieve secure e-mail communication.
It is assumed that all users are using public key cryptography
and have generated a private/public key pair.
PRETTY GOOD PRIVACY
PGP is a remarkable phenomenon that provides
confidentiality, authentication, and compression
for email and data storage.
Its building blocks are made of the best available
cryptographic algorithms: RSA, DSS, Diffie-
Hellman.
It is independent of operating system and
processor.
It has a small set of easy-to-use commands
WHY USE PGP?
Security
Flexibility
It's Free!
Worldwide Strength and Compatibility
WORKING OF PGP
Compatibility
Confidentiality
Digital signatures
Web of trust
Certificates
Security quality
ADVANTAGES OF PGP
Your valuable information is always protected, others
cannot view it, and it cannot be stolen over the Internet
No compatibility problems - works with any email
application that you or your recipients are using
Verification of the sender of information ensures you are
not being spoofed by a third party
Absolute assurity that the information you send or receive
has not been modified in transit
Your secure mail and text cannot be infiltrated by hackers
or infected and mis-used by email attacks
DISADVANTAGES OF PGP
ADMINISTERING CONFLICTING VERSIONS
COMPATIBILITY ISSUES
COMPLEXITY
NO RECOVERY
CONCLUSIONS
Because PGP is freely available via the Internet,
and has a fully compatible low-cost commercial
version it is now widely used.
It has a wide range of applicability from
corporations to individuals who wish to
communicate worldwide securely over the
Internet and other networks.
It is not controlled by any government which
makes it attractive to many.