![]() ![]() The digest is then encrypted to form a signed digest by using the sender's private key, and then signed digest is added to the original email message.The e-mail message is hashed by using a hashing function to create a digest.It provides compression by using the ZIP algorithm, and EMAIL compatibility using the radix-64 encoding scheme.įollowing are the steps taken by PGP to create secure e-mail at the sender site:.It provides confidentiality through the use of symmetric block encryption.PGP provides authentication through the use of Digital Signature. ![]() PGP is an open source and freely available software package for email security. ![]() Therefore, we can say that the digital signature uses one hash function, one secret key, and two private-public key pairs. PGP uses a combination of secret key encryption and public key encryption to provide privacy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |