Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Annotated bibliography on privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Annotated bibliography on privacy
1. INTRODUCTION
Pretty Good Privacy, known as the PGP, is a popular program for encryption and decryption of data, providing security services for electronic mail messages and data files.
Created by Philip Zimmermann in 1991, this program has been widely used throughout the global computer community to protect the confidentiality and integrity of the users’ data, giving them the privacy of delivering messages and files only to their intended individual or authorized person (Singh, 2012). Not only being useful for individuals as a privacy-ensuring program, it has also been used in many corporations to protect their company’s data from falling into the wrong hands (Rouse, 2005).
This program uses mainly on the concept of cryptology. Cryptology is the study about secret communication between two parties, where there is a presence of a third party known as adversaries, and that party knows nothing about the content of the communication (Rivest, 1990).
The security that PGP offers basically is on the encryption and decryption concept, touching on different kind of keys such as public keys and conventional keys, hash function, digital signatures and sometimes a combination of a few methods to make sending data to the right and authorized recipients even more secure. Moreover, following the Internet Standard Track, this program is currently being of the trusted program that is widely used (Stallings, 2011).
2. CRYPTOGRAPHY IN PRETTY GOOD PRIVACY PROGRAM
2.1 Cryptology
Generally, the Pretty Good Privacy (PGP) program is all about cryptography, whereby the basic of it is encryption and decryption. Encryption is a process of encoding message, to the extent that the meaning of the message is not obvious or cannot be read ...
... middle of paper ...
...ey, so the more random the keystrokes, the better is the data needed to generate the key (Senderek, 2003).
2.2.4 Passphrase Based Symmetric Keys
Passphrase is very similar to password, except that it is a longer version of a password, and theoretically is a more secure compared to password (Network Associates, Inc., 1999). It is a secure code created with one or few small word chosen by the user for a security setting (Mitchell, n.d.).
Normally, for a passphrase, it contains multiple words, where words can be or cannot be found in a dictionary. Good passphrase are similar as good passwords, and the characteristics of a good one should be long and complex, containing upper and lowercase letters, symbols and numbers. Thus, it is obviously more secure compared to password, where by the attacker have tried all words in order to figure out the passphrase you used.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
In this process of end to end encryption, the unauthorized users such as service provider or any intermediate person can’t decrypt or read the communication between the sender and receiver. In the present day, Service Providers have access to our communication but when we deploy the end to end encryption then the service provider can intercept the communication but can’t read the content of our communication and the common example is WhatsApp messaging service. We can also secure our emails by using PGP encryption technology.
Governments, organizations and people have been circling around the use of encryption technology since the late 1960s when “...businesses started to use computers to share and store information in digital form...” (Information Technology & Innovation Foundation, 2016, P. 4, para. 2). Encryption is “...the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state” (Internet Society, 2016, p. 1, para. 2). The ability to “scramble” or protect data from being read without authorization highlights the importance of encryption to the world. The new technology for protecting information was initially utilized by governments (Information Technology & Innovation Foundation,
Each day, billions of people worldwide depend on the security of digital systems. From medical history and test results at a hospital, to financial information and account statements at a bank, or social connections and personal messages on a smart phone, nearly every facet of a person’s life has some component of personal data associated with it that is stored on a computer. Furthermore, new forms of personal data to collect are being identified, gathered, analyzed, and stored all the time. This growth in the collection of personal data is so immense that the amount of digital data in existence approximately doubles every two years, and large companies are responsible for creating about 80% of this data increase (Gantz & Reinsel, 2011).
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
[3] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in IEEE SP, pp. 197–213, 2003.
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
Many models, architectures and protocols have been proposed to precisely define privacy policy and increase the protection capacity.
we are using the AES also known as the (Advanced Encryption Standard) it is used by
...tal part of lives just like privacy. Using cryptology provides mechanisms through a digital signature. This signature is inserted using a key (that only the writer of the email possesses) whilst a timestamp binds itself to the document. This type of cryptography is used to control access of security installations or pay-per-view television channels.
Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not availab...
Marshall, Patrick. “Privacy Under Attack.” CQ Researcher. 15 Jun. 2001. <http://0-library.cqpress.com.sculib.scu.edu/cqresearcher/search.php>. (requires access to SCU library online databases)
Internet technology is accelerating the rate of globalization. Email, in particular, is now one of the fastest ways for us to communicate with each other, and to do business, making our world much smaller and more immediate. This same technology that can enhance our lives and accelerates the pace of global change can also destroy our personal privacy at the same rate.