Friday, April 22, 2016

About technique

PGP generates a community and confidential key for the user using the RSA method.The data is then encrypted and encrypted with the IDEA algorithm - which dissimilar to the DES, but the work factor to decode the encrypted message by brute force is much higher than what the DES could provide. The reason why the RSA issued only when generate the keys is that the RSA takes a very long time to encrypt an entire document, where using the RSA on the keys takes a me refraction of the time. At this time, Zimmerman is bang charged by the US government for his effort in developing the PGP. The administration considers encryption as a weapon, and they have documented regulations scheming or prohibiting the export of
munitions. Since the PGP is a powerful encryption program, it is considered and can be used as a powerful weapon and may be a threat to national security.On the Internet, it is clear that many people all over the world are against the US government's effort on limiting the PGP's encryption capabilities,and their reason is that the ban infringes on the people's right to privacy.The PGP must not be treated only as a weapon, for it contains analogies that are not used in wartime. One of them is authentication. The two-key cryptosystem is designed with authentication in mind: Using someone's public key-to encrypt enables only the owner of the private key to decry pt the same message.In the real world, we use our own signature to prove out identity in signing cherubs or contracts. There exists a retina scanner that checks the blood vessels
in our eyes, as well as fingerprint analysis devices. These use our physical characteristics to prove our identity. A digital signature generated by public key cryptosystem is much harder to counterfeit because of the mathematics of factoring - which is an advantage over conventional methods of tests for our identity.

No comments:

Post a Comment