Solved

PGP

Posted on 2002-05-07
2
444 Views
Last Modified: 2010-04-11
I would like to learn more bout PGP, so, where can i get all the useful references, especially the algorithm of it.
0
Comment
Question by:zeBes
2 Comments
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 6994321
0
 
LVL 4

Accepted Solution

by:
EricWestbo earned 50 total points
ID: 6996266
The RSA Algorithm & PSP:
http://citeseer.nj.nec.com/back96rsa.html

PGP User's Guide:
http://pgp.rasip.fer.hr/docs.html


ALSO:

MIT Distribution Center for PGP
- MIT distributes PGP Freeware for personal, non-commercial use, in cooperation with Philip Zimmerman (PGP’s inventor).
http://www.epic.org/privacy/bill_track.html 

PGP FAQ
- PGP 2.6.2: Frequently Asked Questions, Known Bugs, and Improvements
http://www.epic.org/privacy/bill_track.html 

Flaw in PGP Software Played Down, Associated Press
- PGP Vulnerability discussed
http://www.nytimes.com/aponline/business/AP-E-Mail-Security.html?searchpv=aponline?ex=986315150&ei=1&en=4b009ca745c6d72a 

The comp.security.pgp FAQ
- Another, less technical, Frequently Asked Questions list, from the comp.security.pgp newsgroup
http://www.dk.pgp.net/pgpnet/pgp-faq/ 

PGP Security
- PGP Security, a Network Associates business, helps companies worldwide secure their e-business operations through firewall, encryption, intrusion detection, risk assessment and VPN technologies.
http://www.epic.org/privacy/bill_track.html 

Interview with author of PGP, High Tech Today
- An interview by Russell D. Hoffman with Philip Zimmerman, PGP’s inventor, on the radio show High Tech Today
http://www.redherring.com/industries/2001/0118/ind-mag-90-privacy011801.html 


0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question