3
Most read
4
Most read
11
Most read
PRETTY GOOD PRIVACY
(PGP)
SECURITY FOR ELECTRONIC
EMAIL
PGP
 There are two main schemes which are especially
designed to provide confidentiality and authentication for
electronic mail systems. These are:
 PGP(Pretty Good Privacy)
 S/MIME(Secure/Multipurpose Internet Mail Extension)
INTRODUCTION OF PGP
• Developed by Phil Zimmerman in 1995.
• Documentation and source code is freely available.
• The package is independent of operating system and
processor.
 PGP does not rely on the “establishment” and it’s popularity
and use have grown
extensively since 1995.
 PGP combines the best available cryptographic algorithms to
achieve secure e-mail communication.
 It is assumed that all users are using public key cryptography
and have generated a private/public key pair.
PRETTY GOOD PRIVACY
 PGP is a remarkable phenomenon that provides
confidentiality, authentication, and compression
for email and data storage.
 Its building blocks are made of the best available
cryptographic algorithms: RSA, DSS, Diffie-
Hellman.
 It is independent of operating system and
processor.
 It has a small set of easy-to-use commands
Pretty good privacy
WHY USE PGP?
 Security
 Flexibility
 It's Free!
 Worldwide Strength and Compatibility
WORKING OF PGP
 Compatibility
 Confidentiality
 Digital signatures
 Web of trust
 Certificates
 Security quality
ADVANTAGES OF PGP
 Your valuable information is always protected, others
cannot view it, and it cannot be stolen over the Internet
 No compatibility problems - works with any  email
application that you or your recipients are using 
 Verification of the sender of information ensures you are
not being spoofed by a third party
 Absolute assurity that the information you send or receive
has not been modified in transit
 Your secure mail and text cannot be infiltrated by hackers
or infected and mis-used by email attacks
DISADVANTAGES OF PGP
 ADMINISTERING CONFLICTING VERSIONS
 COMPATIBILITY ISSUES
 COMPLEXITY
 NO RECOVERY
CONCLUSIONS
 Because PGP is freely available via the Internet,
and has a fully compatible low-cost commercial
version it is now widely used.
 It has a wide range of applicability from
corporations to individuals who wish to
communicate worldwide securely over the
Internet and other networks.
 It is not controlled by any government which
makes it attractive to many.

More Related Content

PPTX
Data backup and disaster recovery
PPTX
Pgp pretty good privacy
PPTX
Hash Function
PPTX
Mobile Forensics
PPTX
Hash function
PPT
introduction To Operating System
PPTX
Computer security
PDF
Impact Factor
Data backup and disaster recovery
Pgp pretty good privacy
Hash Function
Mobile Forensics
Hash function
introduction To Operating System
Computer security
Impact Factor

What's hot (20)

PPTX
Internet Key Exchange Protocol
PDF
symmetric key encryption algorithms
PPT
Email Security : PGP & SMIME
PPT
Email security
PPTX
User authentication
 
PPTX
Data Encryption Standard (DES)
PDF
Web Security
PPTX
Kerberos
PPTX
Transport Layer Security
PPTX
SSL And TLS
PPTX
Encryption ppt
PPTX
Steganography
PPTX
Security services
PPT
Message authentication
 
PPS
Message AUthentication Code
PPT
PDF
Email security presentation
PDF
RSA ALGORITHM
PPTX
Diffie hellman key exchange algorithm
PPT
Mime
Internet Key Exchange Protocol
symmetric key encryption algorithms
Email Security : PGP & SMIME
Email security
User authentication
 
Data Encryption Standard (DES)
Web Security
Kerberos
Transport Layer Security
SSL And TLS
Encryption ppt
Steganography
Security services
Message authentication
 
Message AUthentication Code
Email security presentation
RSA ALGORITHM
Diffie hellman key exchange algorithm
Mime
Ad

Similar to Pretty good privacy (20)

PPTX
Pretty_Good_Privacy_Method_Cryptography .pptx
PPTX
Network and information security
PPTX
pgp.ppt.pptx
PPTX
CRYPT.pptx
PPTX
pgp s mime
PPTX
Pretty good privacy - Email Security
PDF
Digital Certified Mail
PDF
Ramona Tăme - Email Encryption and Digital SIgning
PDF
G43053847
DOCX
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
PPTX
Netwok & Email Security.pptx is a large of www
PPT
Lesson 2 Cryptography tools
PPTX
PRESENTATION ON CRYPTOGRAPHY.pptx
PPT
Celebrity Cricket League 2016 - http://ccl5.com/
PPT
computer netwok security Pretty Good Privacy PGP.ppt
PDF
10 Ways to Prevent Information Security Incidents
PDF
Network Security CS2
Pretty_Good_Privacy_Method_Cryptography .pptx
Network and information security
pgp.ppt.pptx
CRYPT.pptx
pgp s mime
Pretty good privacy - Email Security
Digital Certified Mail
Ramona Tăme - Email Encryption and Digital SIgning
G43053847
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
Netwok & Email Security.pptx is a large of www
Lesson 2 Cryptography tools
PRESENTATION ON CRYPTOGRAPHY.pptx
Celebrity Cricket League 2016 - http://ccl5.com/
computer netwok security Pretty Good Privacy PGP.ppt
10 Ways to Prevent Information Security Incidents
Network Security CS2
Ad

More from Pushkar Dutt (20)

PPT
Wireless usb
PPT
Wearable computers
PPT
Watermarking
PPT
Tsunami warning system
PPT
Smart card technology
PPT
PPT
Network security
PPT
Mobile cloning
PPT
PPT
Jquery
PPTX
Intelligent highway
PPT
PPT
Face recognition technology
PPTX
Eye phone
PPTX
PPT
E commerce
PPT
Digital jewellary
PPT
Cloud computing
PPT
Atm security
PPT
5 pen pc
Wireless usb
Wearable computers
Watermarking
Tsunami warning system
Smart card technology
Network security
Mobile cloning
Jquery
Intelligent highway
Face recognition technology
Eye phone
E commerce
Digital jewellary
Cloud computing
Atm security
5 pen pc

Recently uploaded (20)

PDF
The TKT Course. Modules 1, 2, 3.for self study
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PDF
Laparoscopic Imaging Systems at World Laparoscopy Hospital
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
PPTX
operating_systems_presentations_delhi_nc
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PPTX
Designing Adaptive Learning Paths in Virtual Learning Environments
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PPTX
Neurological complocations of systemic disease
PDF
Health aspects of bilberry: A review on its general benefits
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PDF
Compact First Student's Book Cambridge Official
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
The TKT Course. Modules 1, 2, 3.for self study
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Laparoscopic Imaging Systems at World Laparoscopy Hospital
faiz-khans about Radiotherapy Physics-02.pdf
Diabetes Mellitus , types , clinical picture, investigation and managment
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Disorder of Endocrine system (1).pdfyyhyyyy
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
operating_systems_presentations_delhi_nc
ACFE CERTIFICATION TRAINING ON LAW.pptx
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
Designing Adaptive Learning Paths in Virtual Learning Environments
PLASMA AND ITS CONSTITUENTS 123.pptx
Neurological complocations of systemic disease
Health aspects of bilberry: A review on its general benefits
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Compact First Student's Book Cambridge Official
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Everyday Spelling and Grammar by Kathi Wyldeck

Pretty good privacy

  • 1. PRETTY GOOD PRIVACY (PGP) SECURITY FOR ELECTRONIC EMAIL
  • 2. PGP  There are two main schemes which are especially designed to provide confidentiality and authentication for electronic mail systems. These are:  PGP(Pretty Good Privacy)  S/MIME(Secure/Multipurpose Internet Mail Extension)
  • 3. INTRODUCTION OF PGP • Developed by Phil Zimmerman in 1995. • Documentation and source code is freely available. • The package is independent of operating system and processor.  PGP does not rely on the “establishment” and it’s popularity and use have grown extensively since 1995.  PGP combines the best available cryptographic algorithms to achieve secure e-mail communication.  It is assumed that all users are using public key cryptography and have generated a private/public key pair.
  • 4. PRETTY GOOD PRIVACY  PGP is a remarkable phenomenon that provides confidentiality, authentication, and compression for email and data storage.  Its building blocks are made of the best available cryptographic algorithms: RSA, DSS, Diffie- Hellman.  It is independent of operating system and processor.  It has a small set of easy-to-use commands
  • 6. WHY USE PGP?  Security  Flexibility  It's Free!  Worldwide Strength and Compatibility
  • 8.  Compatibility  Confidentiality  Digital signatures  Web of trust  Certificates  Security quality
  • 9. ADVANTAGES OF PGP  Your valuable information is always protected, others cannot view it, and it cannot be stolen over the Internet  No compatibility problems - works with any  email application that you or your recipients are using   Verification of the sender of information ensures you are not being spoofed by a third party  Absolute assurity that the information you send or receive has not been modified in transit  Your secure mail and text cannot be infiltrated by hackers or infected and mis-used by email attacks
  • 10. DISADVANTAGES OF PGP  ADMINISTERING CONFLICTING VERSIONS  COMPATIBILITY ISSUES  COMPLEXITY  NO RECOVERY
  • 11. CONCLUSIONS  Because PGP is freely available via the Internet, and has a fully compatible low-cost commercial version it is now widely used.  It has a wide range of applicability from corporations to individuals who wish to communicate worldwide securely over the Internet and other networks.  It is not controlled by any government which makes it attractive to many.