Briefly describe how PGP (or GPG) works.

What will be an ideal response?


Both PGP and GPG use both public and private key cryptography. PGP/GPG generates a random private (symmetric) key and uses it to encrypt the message. The private key is then encrypted using the receiver's public key and sent along with the message. When the recipient gets the message, the PGP/GPG software first decrypts the private key with the private key that belongs to the recipient.The decrypted private key is then used to decrypt the rest of the message.

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. Linked lists are collections of data items "lined up in a row"-- insertions and deletions can be made anywhere in a linked list. b. Insertions and deletions are made only at one end of a stack, its top. c. Insertions and deletions are made only at one end of a queue, its tail. d. Binary trees facilitate high-speed searching and sorting of data.

Computer Science & Information Technology

When formatting text, a careless color choice may elicit the incorrect psychological response.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

After establishing a connection with a database, data is available in the ____ window of the Visual Basic IDE.

A. Database B. DataSet C. Data Sources D. Tables

Computer Science & Information Technology

You might need to revoke a certificate before its expiry date. To revoke a certificate, you would use the ________________ node of the Certification Authority snap-in

a. Revoked certificates b. Issued certificates c. Pending requests d. Failed requests

Computer Science & Information Technology