Академический Документы
Профессиональный Документы
Культура Документы
What is cryptography?
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.
Digital Signature
Digital signatures enable the recipient of information to verify the authenticity of the informations origin, and also verify that the information is intact. Thus, public key digital signatures provide authentication and data integrity. A digital signature also provides non-repudiation, which means that it prevents the sender from claiming that he or she did not actually send the information.
A one-way hash function takes variable-length input, a message of any length and produces a fixed-length output.The hash function ensures that, if the information is changed in any way even by just one bit an entirely different output value is produced. PGP uses a cryptographically strong hash function on the plaintext the user is signing. This generates a fixedlength data item known as a message digest.
Hash Function
Digital certificates
Digital certificates are used to thwart attempts to substitute one persons key for another. A digital certificate consists of three things: A public key. Certificate information. (Identity information about the user, such as name, user ID, and so on.) One or more digital signatures.
What is Passphrase?
A passphrase is a longer version of a password. PGP uses a passphrase to encrypt your private key on your machine. Your private key is encrypted on your disk using a hash of your passphrase as the secret key. You use the passphrase to decrypt and use your private key. A passphrase should be hard for you to forget and difficult for others to guess.
Conclusion
An expensive and formidable cryptanalytic attack could possibly be mounted by someone with vast supercomputer resources, such as a government intelligence agency. They might crack your public key by using some new secret mathematical breakthrough.There can be no absolute security guarantees in practical cryptographic implementations. Still, some optimism seems justified. The public key algorithms, message digest algorithms, and block ciphers used in PGP. Method explained is simple to understand and easy to Debug.
Thank you
Queries