Pgp Encryption Research Paper

Improved Essays
Have you ever heard of Spy-Free or Spy-Proof Emails? Most of people do not know well about the importance of privacy in their email and even they realize its importance, they are not sensitive to it. Now, the world’s best-known email providers Yahoo, and Google put in a great deal of effort to encrypted email system. They will introduce a new secure email system in the near future. However, some experts bring up several problems of encrypted mail. Christopher Soghoian, a security and privacy researcher at the American Civil Liberties Union, said “Yahoo and Google are taking early steps to making the technology easier for normal consumers.” It can be interpreted that few users will adopt the technology immediately. This paper explains what PGP encryption is and how it works, merit of PGP security, what makes difficulty of using PGP encryption, and its limitation.
What is PGP encryption and how does it work? PGP is an abbreviation for “Pretty Good Privacy.” It is a hybrid encryption since PGP is a combination of some best features of both original and public key cryptography. If you encrypt the plaintext using PGP, it firstly compresses the plaintext and by data compression, modem transmission time and disk space are saved. Also, data compression strengthens cryptographic
…show more content…
Because standard email messages that they normally use can make it possible for someone else to trace their personal information. (Poremba, 2013) For instance, my email which included my banking account and its password can be leaked by hackers. PGP has its advantages and disadvantages; many of the disadvantages to PGP can be overcome through training and some are hardly occured. But for better using, developers of the PGP encryption system should gradually minimize its weak points. This technology will contribute to secure email

Related Documents

  • Decent Essays

    Software testing, account testing and website testing is loaded with risks. If the worst happens, such as if a program goes rogue, if a program wrecks your hardware, if your information is stolen, and so forth, it is a good idea to have a few contingency plans. Your personal contingency plan should depend on your methods and the types of software you are testing. With that in mind, here are a few elements you may wish to enter into your contingency plans. Burnable Email Addresses The first piece of advice is an easy one, as a tester and as a hardcore Internet user, you should have more than one email address.…

    • 1060 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    As people use smartphones more and more it is crucial that the smartphone keeps being safe. Important is to distinguish the ways security could be compromised. iOS jailbreaks for example, are bad for third party app developers and Apple since it enables users to download apps for free. However, in this chapter we will look for the security issues that are bad for the user, not for the companies. As there is a restriction as to how much we can cover here, we will only cover some the most important issues: permissions, lighter browsers, unofficial apps, network spoofing and data density.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The protocol uses public parameters the researchers state have the advantages of no trapdoor information associated with them, avoids transmitting certificates, and are accessible by any client and server making them very useful. The authors then launch into a very detailed mathematical proof of their theorem. Since a large portion of this article is dedicated to the proof of their theorem, the article can be somewhat difficult to follow. However, there is still some value to be had by the novice in their introductory explanation of how security systems are breached. Their conclusion that an attack can eventually compromise any security measure relying only on a password is especially profound and unsettling.…

    • 1436 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 7 Assignment 1

    • 3155 Words
    • 13 Pages

    As we know cryptography is process of encryption and decryption of our original information into secret message and vice versa. Two famous methods of cryptography are symmetric key and asymmetric key. In symmetric key a common key is used for both encryption and decryption of message. The widely used algorithm for this is DES. Asymmetric key cryptography is much more secure because it used two keys private and public.…

    • 3155 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    As stated before, Apple 's best interest is to look out for their customers and the FBI has spent more time over simplifying the truth. The FBI handles their issues much more differently than Apple does, they claim that they only want one piece of software from Apple but later they will undeniably ask for more. Furthermore, according to source G, a similar case to that is the one of Lavabit, when the founder Ladar Levison had to install a pen to obtain the metadata which eventually resulted in his company shutting down. However the FBI demanded for Levison’s company encryption key, the same is likely to happen to Apple if they create the operating system. The FBI operates so they can get whatever they need from a company, whether it 's an encryption key or any additional needed information, they fail to keep in mind that these demands will deteriorate a majority of these companies customer’s privacy.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Like previously mentioned, trust is easy to lose and with this decision the majority of people have lost trust in Apple (The Verge). Google responds to this situation by mentioning in their advertisement that their phone includes a 3.5mm headphone jack which is “surprisingly not new” (Google). The appeal to logos is evident here by stating facts. Every feature of the Google Pixel is new but the headphone jack has been around for quite some time and Google plans to keep it that way. Taking Apple’s misfortune and creating an advantage with it is a great way to try to win the hearts of iPhone users and will most likely get them to stay attracted to their brand.…

    • 1112 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Not even legitimate, trusted websites are protected from being affected by malvertising. According to Rohan Patil’s article, “Weeding Out Malvertising”, the news site Daily Mail was a victim of malvertising and infected users’ computers with “ransomware that took control of users’ computers and forced them to pay to get access to their device again” (Patil). The most effective way to avoid malicious advertisements is to use Adblock; these malicious advertisements do not require clicks to be activated, they simply need to be viewed to infect a visitor with malware (Patil). This gives people more incentive to use ad-block, although “the lost of trust could translate into serious damage to revenues”…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I do not want to be tricked into going to a web site that could contain viruses or malware that can affect the functionality of my computer or worse, steal my personal information. I appreciate that they are attempting to make ads less intrusive. Experiencing the early days of the internet I remember web pages being crippled by pop up advertisements. Consumers should always have a choice in the way that consume ads. If an ad begins.…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Probably one of the biggest issues is the sneak and peek section I mentioned earlier. It was put in place to find out information about terrorists, but people believe it is rarely used during terrorist investigation. They believe they use it in regular investigations, which they believe shouldn’t be allowed because that is not why the law was created. Equally as disputed is the government’s ability to use wiretaps because people believe the government is abusing this power and spying on…

    • 1579 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Adbusters

    • 805 Words
    • 4 Pages

    Recently, in my opinion, some audience create great content without advertising, which I mean its content become valuable content and enable to earn benefit by its contents, as well as it become competitor on the digital society against business companies. Because consumption of time in digital space is limited for people to consume. Of course I know, the author describe about how to engage with audience in digital advertising culture, therefore, most of the view are balanced well, it is not big problem though, I feel it is one of the weakness point. On the other hand, throughout the chapter, I am able to understand the key points of digital advertising culture, because the chapter describe any aspects of digital advertising culture not only positive possibility but also negative prediction by example, as well as illustrate what happens with digital in the future. One of example is that tracing our activity by correcting date by using a wearable device.…

    • 805 Words
    • 4 Pages
    Improved Essays