Essay on Pretty Good Privacy - A Program for Encrypting Dycrypting of Data

Missing Works Cited
Length: 930 words (2.7 double-spaced pages)
Rating: Yellow      
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


Pretty Good Privacy, known as the PGP, is a popular program for encryption and decryption of data, providing security services for electronic mail messages and data files.

Created by Philip Zimmermann in 1991, this program has been widely used throughout the global computer community to protect the confidentiality and integrity of the users’ data, giving them the privacy of delivering messages and files only to their intended individual or authorized person (Singh, 2012). Not only being useful for individuals as a privacy-ensuring program, it has also been used in many corporations to protect their company’s data from falling into the wrong hands (Rouse, 2005).

This program uses mainly on the concept of cryptology. Cryptology is the study about secret communication between two parties, where there is a presence of a third party known as adversaries, and that party knows nothing about the content of the communication (Rivest, 1990).

The security that PGP offers basically is on the encryption and decryption concept, touching on different kind of keys such as public keys and conventional keys, hash function, digital signatures and sometimes a combination of a few methods to make sending data to the right and authorized recipients even more secure. Moreover, following the Internet Standard Track, this program is currently being of the trusted program that is widely used (Stallings, 2011).


2.1 Cryptology

Generally, the Pretty Good Privacy (PGP) program is all about cryptography, whereby the basic of it is encryption and decryption. Encryption is a process of encoding message, to the extent that the meaning of the message is not obvious or cannot be read ...

... middle of paper ...

...ey, so the more random the keystrokes, the better is the data needed to generate the key (Senderek, 2003).

2.2.4 Passphrase Based Symmetric Keys

Passphrase is very similar to password, except that it is a longer version of a password, and theoretically is a more secure compared to password (Network Associates, Inc., 1999). It is a secure code created with one or few small word chosen by the user for a security setting (Mitchell, n.d.).

Normally, for a passphrase, it contains multiple words, where words can be or cannot be found in a dictionary. Good passphrase are similar as good passwords, and the characteristics of a good one should be long and complex, containing upper and lowercase letters, symbols and numbers. Thus, it is obviously more secure compared to password, where by the attacker have tried all words in order to figure out the passphrase you used.

Click the button above to view the complete essay, speech, term paper, or research paper

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

This essay is 100% guaranteed.

Title Length Color Rating  
Essay on Regulation Data Protection and Personal Data Privacy - CONTENTS PAGE EXECUTIVE SUMMARY iv CHAPTER 1 - INTRODUCTION 1 Background 1 Statement of Purpose 1 Scope 2 Limitations 2 Methods of Research 2 CHAPTER 2 - FINDINGS 3…………………………………………………………3 Current Regulations 3 Current Expectations from customers 6 Reason Additional Regulations should be added 8 Future Potential 9 CHAPTER 3 - CONCLUSIONS AND RECOMMENDATIONS 11 Conclusions 11 Recommendations 12 WORKS CITED 13 EXECUTIVE SUMMARY This report will describe the history of government regulations and FTC....   [tags: Data Privacy]
:: 10 Works Cited
2928 words
(8.4 pages)
Research Papers [preview]
Privacy Conserving in Data Processing: An Overview Essay - INTRODUCTION Data mining is a crucial analysis space in database system. Data processing provides us a strong tool for analysis the unknown data within the known information sets. Whereas within the same time, the explosion of knowledge brings us a aspect impact that is that private information may well be desecrated by others with none protection. And this might bring negative effects for analysis the pregnant data. Privacy Preserving Data Mining is planned to resolve this drawback. It is eluded unseaworthy the sensitive information of users....   [tags: data mining, data cube, warehouse]
:: 7 Works Cited
2032 words
(5.8 pages)
Term Papers [preview]
Protection of Consumer Privacy in E-Business Essay - The protection of consumer privacy in e-business The digital era arrives. Blue Book information editorial board and Social Science Literature Publishing House (2010) pointed out that “China's e-commerce transaction volume reached 3.85 trillion yuan in 2009”. Utilisation of e-business services was also high amongst Hong Kong people. About 98.3% of all persons had used e-business services such as Octopus Card and Automatic Teller Machine (Census and Statistics Department, 2009). One of the pitfalls for the development of e-business, however, is the concerns on consumer privacy....   [tags: Consumer Privacy, Data, Solutions] 1281 words
(3.7 pages)
Strong Essays [preview]
Essay on The Importance of Data Protection in the EU: A Critical Reflection - ... Member States must protect their citizens’ right to privacy concerning personal data processing. A set of definitions is outlined in the text of the Directive: Personal data regards any information related to a natural person (address, credit card number, medical record, etc.); The term processing refers to any set of operations performed upon personal data regardless of whether the processing is automated or not; The controller is a natural or legal person or body which determines the purposes of the processing of personal data; The processor is the natural or legal person or body that processes the data on behalf of the controller; The third party refers to any natural or legal person...   [tags: privacy, personal data] 914 words
(2.6 pages)
Better Essays [preview]
How Privacy Preserving Data Mining Protects Your Information Essay - The popularity of internet as a communication medium, there is an increasing need for distributing data that encompass personal information from large database. With the propagation of information about individual’s personal data available in the databases, data mining is considered as a threat to privacy of data. Extraction of concealed predictive information from large databases is a powerful technology with great potential to support companies focus on the most important information in their data warehouses....   [tags: internet, algorithm, data set] 621 words
(1.8 pages)
Better Essays [preview]
Data Mining and Privacy-an ethical look Essay - Data Mining and Privacy-an ethical look I. Introduction In 2001, the MIT Technology Review listed data mining as one of the top 10 technologies that will change the world.[i] So, what is data mining. For many people, the simple answer is that data mining is the collecting of people’s information when logged onto the Internet. But Webopedia emphasizes that data mining is not the collection of data itself, but the statistical interpretation of it – allowing people to obtain new information or find hidden patterns within that collected data.[ii] It is the combination of these, collection and analysis, which are cause for concern....   [tags: Data Mining Technology Technological Essays]
:: 13 Works Cited
3249 words
(9.3 pages)
Strong Essays [preview]
Data Collection and Individual Privacy Essay - Data Collection and Individual Privacy In deliberation of the topic of the use of individual information, the moral issue of importance is whether public or private sector entities have the right to create individual profiles of consumers and their obligation in protecting the consumer's privacy is in question. The exponential growth of the information age in particular the personal computer has created a situation where economies of the public and private sector are at odds with the privacy of the consumer or citizen....   [tags: Expository Exemplification Essays] 1197 words
(3.4 pages)
Strong Essays [preview]
All the Pretty Horses Essay - All the Pretty Horses John Grady is not your average cowboy. All the Pretty Horses is not your typical coming-of-age story. This is an honest tale. Cormac McCarthy follows John Grady as he embarks on his journey of self-discovery across the border. Armed with a few pesos in his pocket, a strong horse and a friend at his side, John Grady thinks he’s ready to take on the Wild West of Mexico. At their final steps in America, a stranger, aged thirteen, joins our heroes. This unexpected variable named Blevins challenges John Grady, testing his character and pushing him to uncomfortable limits....   [tags: All Pretty Horses Essays] 1459 words
(4.2 pages)
Powerful Essays [preview]
Data Encryption Essay - Missing Chart Encryption Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption....   [tags: Data Security]
:: 1 Works Cited
1027 words
(2.9 pages)
Good Essays [preview]
Essay on Accuracy of Data - The accuracy of data input is important within means of a business. Printed questionnaires are great for ideas of improvement and the quality of performance received from the company. Restaurants use printed questionnaires for complaints and suggestions from the customers. This is a wonderful way of accomplishing better service and reliable customers. It is also used by sensors to determine how many people are living in your home; this in turns allows them to determine how many people live in ones city....   [tags: Data Input ] 731 words
(2.1 pages)
Strong Essays [preview]