0% found this document useful (0 votes)
61 views12 pages

PGP - Pretty Good Encryption: Public Key Unbroken

PGP (Pretty Good Privacy) is a strong public key encryption program that can encrypt emails, texts, and files to make them unreadable by anyone except the intended recipient. It uses public/private key pairs to encrypt messages for asymmetric encryption, allowing users to encrypt messages with the recipient's public key but requiring the recipient's private key for decryption. PGP can also digitally sign messages to verify their integrity and authenticity.

Uploaded by

faris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views12 pages

PGP - Pretty Good Encryption: Public Key Unbroken

PGP (Pretty Good Privacy) is a strong public key encryption program that can encrypt emails, texts, and files to make them unreadable by anyone except the intended recipient. It uses public/private key pairs to encrypt messages for asymmetric encryption, allowing users to encrypt messages with the recipient's public key but requiring the recipient's private key for decryption. PGP can also digitally sign messages to verify their integrity and authenticity.

Uploaded by

faris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

PGP - Pretty Good Encryption

● Very strong public key encryption.


● Unbroken.
● Encrypt emails, text or files.
● Sign message or files to verify integrity.
David John

Secret message
Secret message

Symmetric encryption.

Secret Key
David John

Secret message
Secret message
● Decrypts the message.
● Should be kept a secret.
● Needs to be shared with recipient .

Secret Key
David John

Secret message
Secret message

Asymmetric encryption.
David John

Secret message
Secret message
● Mathematically related.
● One used for encryption.
● One used for decryption .
→ Decryption key is never shared!

Key Pair
David John

David’s Public key


Sender (David):
1. Encrypts message with receiver's public key.
2. Signes message with own private key.

Secret message
Receiver (John):
1. Verifies signature with sender’s public key.
2. Decrypts message with own private key. John’s Private Key
David John

Public key Public key

Private Key Private Key

Key Server
David John

Public key Public key

Private Key Private Key

Key Server
David John

Public key Public key

Private Key Private Key

Key Server
David John

Public key Public key

Private Key Private Key

Key Server
John’s Public key
David John

Public key Public key

Private Key Private Key

Key Server
John’s Public key David’s Public Key
David John

Public key Public key

Private Key Private Key

Key Server
John’s Public key David’s Public Key

You might also like