Pretty Good Privacy

Pretty Good Privacy provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such as Triple DES or CAST-128. Email messages can be protected by using cryptography in various ways, such as the following:

  1. Signing an email message to ensure its integrity and confirm the identity of its sender.
  2. Encrypting the body of an email message to ensure its confidentiality.
  3. Encrypting the communications between mail servers to protect the confidentiality of both message body and message header.
  4. The first two methods, message signing and message body encryption, are often used together; however, encrypting the transmissions between mail servers is typically used only when two organizations want to protect emails regularly sent between each other. For example, the organizations could establish a virtual private network (VPN) to encrypt the communications between their mail servers over the Internet. Unlike methods that can only encrypt a message body, a VPN can encrypt entire messages, including email header information such as senders, recipients, and subjects. In some cases, organizations may need to protect header information. However, a VPN solution alone cannot provide a message signing mechanism, nor can it provide protection for email messages along the entire route from sender to recipient.


Comments

Popular posts from this blog

MySQL ,My Sequel,relational database management system,Linux, Apache, MySQL, Perl