--%>

Reasons for using PGP

Specify the reasons for using the PGP?

E

Expert

Verified

a) It is available free worldwide in different versions which run upon several platforms, involving DOS/windows, UNIX, Macintosh.

b) It is based upon the algorithms which have survived the extensive public review and are regarded as really secure. For example: DSS, RSA and Diffie-Hellman for public key encryption, IDEA, 3DES for the conventional encryption, SHA-1for the hash coding.

c) It consists of the wide range of applicability from the corporations which wish to select and implement a standardized scheme for encrypting the files and communication.

d) It was not designed by nor is it controlled by any of the governmental or the standards organization.

   Related Questions in Computer Network Security

  • Q : Problems related to Cryptography and

    A) Provide a specific illustration of how inference control might be implemented in the database.B) For a public-key encryption system (like PGP), list some areas for and against utilizing the similar key pair for both encryption and signature.

  • Q : Cryptographic Systems What are

    What are Cryptographic Systems?

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc

  • Q : What do you mean by Wifi Hardware What

    What do you mean by Wifi Hardware?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : What is Key Expansion Algorithm Explain

    Explain the Key Expansion Algorithm.

  • Q : Inverse cipher and AES decryption

    State the difference between equivalent inverse cipher and AES decryption algorithm?

  • Q : Distribution of secret keys to

    Specify the ways through which the secret keys may be distributed to the two communicating parties.

  • Q : Requirements for process of message

    State requirements for the process of message authentication.

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio