PGP (Pretty Good Privacy)
Stephen A. Weis, MIT Computer Science and Artificial Intelligence Laboratory
Introduction
Basics of PGP
Technology Highlights
Supported Algorithms and Key Recommendations
History of PGP
Origins of PGP
Patent Infringement
Export Licenses
PGP Variants and Alternatives
PGP Corporation and OpenPGP
MIT PGP Freeware and PGPi
GnuPG
S/MIME
Server-Side and Web-Based Secure E-Mail
PGP Problems and Lessons
Changing Law for Changing Technology
The Need for Industry Standards
“Why Johnny Can't Encrypt”
Future Directions and Conclusion
Glossary
Cross References
References
Further Reading
INTRODUCTION
A fascinating story from the early 1990s Internet boom is the development of PGP, or “Pretty Good Privacy.” PGP is a program for encrypting and digitally signing data and is most frequently used for e-mail. In fact, PGP may be the most well-known e-mail encryption software in existence with over 8 million users worldwide (PGP Corporation, n.d.). PGP's notoriety is largely due to the legal issues surrounding its creation, rather than for its technical merits.
PGP is one of the few examples of software created in blatant disregard of patent and export laws to evolve into a legitimate commercial product. Illegal software of this nature is sometimes referred to as guerillaware and might include peer-to-peer file sharing networks like Kazaa or DVD copying software such as DeCSS. The legal battles faced by PGP's creator, Phil Zimmermann, illustrate several policy barriers to ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.