Solved

PGP

Posted on 2002-05-07
2
448 Views
Last Modified: 2010-04-11
I would like to learn more bout PGP, so, where can i get all the useful references, especially the algorithm of it.
0
Comment
Question by:zeBes
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 6994321
0
 
LVL 4

Accepted Solution

by:
EricWestbo earned 50 total points
ID: 6996266
The RSA Algorithm & PSP:
http://citeseer.nj.nec.com/back96rsa.html

PGP User's Guide:
http://pgp.rasip.fer.hr/docs.html


ALSO:

MIT Distribution Center for PGP
- MIT distributes PGP Freeware for personal, non-commercial use, in cooperation with Philip Zimmerman (PGP’s inventor).
http://www.epic.org/privacy/bill_track.html 

PGP FAQ
- PGP 2.6.2: Frequently Asked Questions, Known Bugs, and Improvements
http://www.epic.org/privacy/bill_track.html 

Flaw in PGP Software Played Down, Associated Press
- PGP Vulnerability discussed
http://www.nytimes.com/aponline/business/AP-E-Mail-Security.html?searchpv=aponline?ex=986315150&ei=1&en=4b009ca745c6d72a 

The comp.security.pgp FAQ
- Another, less technical, Frequently Asked Questions list, from the comp.security.pgp newsgroup
http://www.dk.pgp.net/pgpnet/pgp-faq/ 

PGP Security
- PGP Security, a Network Associates business, helps companies worldwide secure their e-business operations through firewall, encryption, intrusion detection, risk assessment and VPN technologies.
http://www.epic.org/privacy/bill_track.html 

Interview with author of PGP, High Tech Today
- An interview by Russell D. Hoffman with Philip Zimmerman, PGP’s inventor, on the radio show High Tech Today
http://www.redherring.com/industries/2001/0118/ind-mag-90-privacy011801.html 


0

Featured Post

[Live Webinar] The Cloud Skills Gap

As Cloud technologies come of age, business leaders grapple with the impact it has on their team's skills and the gap associated with the use of a cloud platform.

Join experts from 451 Research and Concerto Cloud Services on July 27th where we will examine fact and fiction.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month6 days, 13 hours left to enroll

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question