There are many ways to provide encryption services. Pretty Good Privacy (PGP) is one example of an encryption package that is readily available.
Out of the 5 principal services that are provided by PGP, which services do you find the most important? Explain your answer in detail.
•Why does PGP generate a signature before adding compression?
•What is your personal opinion about PGP?
•Would you use PGP or a different encryption package? Explain your answer in detail.
•How would you implement PGP in your own company or at home?
•What are some situations where PGP would not be the best encryption package for an organization?

Solution PreviewSolution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

I consider the encryption performed by PGP being the most important service because of the security achieved by combining the symmetric and asymmetric protocols for obtaining confidentiality and authentication. The table from Stallings’ book (page 593) is very explicit towards this matter. The message to transmit (e.g. across the network) is firstly encrypting by using CAST-128, IDEA or 3DES (symmetric algorithms) with a session key (one-time) which is generated by the sender. This symmetric key is afterwards encrypted by using either RSA or Diffie-Helman (asymmetric algorithms) together with the public key of the receiver. More than this, the hashing of the message and RSA represent a veritable digital signature method for the message. The proof of identity can’t be denied in this situation. More than this, for an attacker (eavesdropper) will be virtually impossible to recover the plaintext message by cracking all the enumerated algorithms. Not last, since it is no pattern/connection between the keys and only a small plaintext is encrypted with each key, even a partial recovery of the plaintext will not make classical attacks feasible (known plaintext related)....

By purchasing this solution you'll be able to access the following files:

for this solution

or FREE if you
register a new account!

PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

Find A Tutor

View available Cryptography Tutors

Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Upload a file
Continue without uploading

We couldn't find that subject.
Please select the best match from the list below.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Live Chats