0% found this document useful (0 votes)
65 views3 pages

Experiment No. 6 Aim: Theory:: Phil Zimmermann

PGP (Pretty Good Privacy) is a software that allows secure communication over the internet by using public/private key encryption. A user generates two keys - a public key that others can use to encrypt messages, and a private key that only the user can use to decrypt messages received. PGP was created in 1991 by Phil Zimmermann to allow activists to securely share information. PGP is easy to use and integrate with email clients like Apple Mail, which allows encrypting messages with a recipient's public key and decrypting received messages using one's own private key.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views3 pages

Experiment No. 6 Aim: Theory:: Phil Zimmermann

PGP (Pretty Good Privacy) is a software that allows secure communication over the internet by using public/private key encryption. A user generates two keys - a public key that others can use to encrypt messages, and a private key that only the user can use to decrypt messages received. PGP was created in 1991 by Phil Zimmermann to allow activists to securely share information. PGP is easy to use and integrate with email clients like Apple Mail, which allows encrypting messages with a recipient's public key and decrypting received messages using one's own private key.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

EXPERIMENT NO.

Aim : ​Case study on PGP

Theory :
  Sending sensitive information through the internet is always nerve-racking.
Somebody else can see the bank information a person is sending Or even those dank
memes that should not be spoken of. So a pretty good solution to this problem is ​Pretty
 Good Privacy (PGP). A software engineer named ​Phil Zimmermann ​created PGP back in

1991. He was an anti-nuclear activist, and wanted a way to transfer information securely
over the Internet.
Working :

 PGP is very easy to understand, on the surface. We will have two keys. The first key will
only be able to lock the box. The second key will only be able to open the box. That way,
only the person who needs to get the content of the box has the key that allows them to
 unlock it.This is how PGP works. You have a ​public key (to lock/encrypt the message)

and a ​private key (to unlock/decrypt the message). You would send the public key to all
your friends so that they can encrypt sensitive messages that they want to send to you.
Once you receive an encrypted message, you use your private key to decrypt it.

Example of Apple Mail :


 There are plenty of ​software tools that implement the OpenPGP standard. They all have
different ways of setting up PGP encryption. One particular tool that works very well is
 Apple Mail​.If you are using a Mac computer, you can download the ​GPGTools​. This
application will generate and manage your public and private keys. It also integrates
 automatically with Apple Mail. Once the keys are generated, you will see a ​lock icon in the

subject line, when composing a new message in Apple Mail. This means that the message
will be encrypted with the public key you’ve generated.

 After
sending the e-mail to someone, it will look like this. They will not be able to see the
 content of the e-mail until they decrypt it using the private key. Note that ​PGP encryption
does not encrypt the subject line of an e-mail. Never put any sensitive information in the
subject line.

If
you are using software that automatically decrypts the message using your private key,
like Apple Mail, it will look something like this:

Conclusion :

Thus we have learnt that ​Pretty Good Privacy (PGP) allows you to send files and
 messages securely over the Internet.PGP generates a ​public key (to encrypt messages)

and a ​private key​ (to decrypt messages).

You might also like