Email Security and PGP Technical Analysis

Article Preview

Abstract:

Currently, Email is one of the most popular applications in people’s life. A secure email requires that the email system can provide encryption and digital signature, PGP is a popular email encryption and transmission method, the paper gives a brief overview of email security, details the PGP algorithm, function, encryption and decryption process and public/private key pair generation process, and analysis’s Security of PGP.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

1075-1079

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S/MIME and Open PGP [EB/OL] on http: /www. imc. org/smime-pgpmime. html.

Google Scholar

[2] Stallings W. Protect Your Privacy: The PGP User's Guide. Prentice Hall PTR. (1995).

Google Scholar

[3] J. Burns, A. Cheng, P. Gurung. Automatic Management of Network Security Policy. DARPA Information Survivability Conference and Exposition Volume 2[J]. June 2001, 1012–1026.

DOI: 10.1109/discex.2001.932156

Google Scholar

[4] Garfinkel S. PGP: Pretty Good Privaey. O'Reily&Assoeiates, (1994).

Google Scholar

[5] NAI. PGP Windows User's Guide [M]. Networks Associates Technology Inc, (2002).

Google Scholar

[6] Buchegger S, Le Boudec J-Y. The effect of rumor spreading in reputation systems for mobile ad-hoc networks [A]. Proc Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt) [C]. France: Sophia-Antipolis, (2003).

DOI: 10.1109/wiopt.2005.13

Google Scholar

[7] Housley R. Internet X. 509 Public Key Infrastructure, Certificate and CRL Profiles [S]. RFC2459, (1999).

DOI: 10.17487/rfc2459

Google Scholar

[8] Zimmermann PR. The official PGP User's Guide. MIT Press, (1995).

Google Scholar