logo

Assessment of Pretty Good Privacy (PGP) Encryption

   

Added on  2023-04-19

11 Pages2428 Words91 Views
Running head: ASSESSMENT OF PRETTY GOOD PRIVACY (PGP) ENCRYPTION
Assessment of Pretty Good Privacy (PGP) Encryption
Student Name
University Name
Note by the Author
Assessment of Pretty Good Privacy (PGP) Encryption_1
1ASSESSMENT OF PRETTY GOOD PRIVACY (PGP) ENCRYPTION
Abstract
This report aims to explore the PGP encryption program in details. Here the security services
obtainable with the help of PGP are listed and the encryption process is explored in a step by
step manner. An illustration of the PGP message format is also provided in a tabular format
that is also explained thereafter. It further discusses the advantages and disadvantages of PGP
certificates. The report then identifies EFAIL as the business case study on the role of PGP in
the field of Internet of Things (IoT). A thorough analysis of the case study is conducted
investigating every flaw as also exploring the solutions. A note of the possible impact of
EFAIL in the IoT landscape is also provided.
Assessment of Pretty Good Privacy (PGP) Encryption_2
2ASSESSMENT OF PRETTY GOOD PRIVACY (PGP) ENCRYPTION
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Literature Review...................................................................................................................3
Critical review of Business Case............................................................................................5
Business Case Analysis..........................................................................................................6
Conclusion..................................................................................................................................8
References..................................................................................................................................9
Assessment of Pretty Good Privacy (PGP) Encryption_3
3ASSESSMENT OF PRETTY GOOD PRIVACY (PGP) ENCRYPTION
Introduction
The study is an assessment of the Pretty Good Privacy (PGP) program where it
explores the encryption mechanism in great detail. The assessment involves identifying the
various services offered by the PGP encryption program and describes the mechanism in the
order they occur along with illustrating the PGP message format in tabular format and briefly
describing the strengths to weaknesses of PGP certificates. After that the report identifies
Internet of Things (IoT) as the field for the case study which is chosen to be the infamous
EFAIL vulnerability of 2018. With a comprehensive analysis on the case study performed,
the study provides concluding notes.
Discussion
Literature Review
The encryption program Pretty Good Privacy (PGP) is used to provide cryptographic
authentication and privacy for data communication (Ruoti et al. 2015). PGP signs encrypts
and decrypts files, directories, texts and emails. The open standard platform OpenPGP (RFC
4880) is followed by PGP (Wouters 2016). Here a serial combination of symmetric-key
cryptography, data compression, hashing and public-key cryptography is employed. Every
public key must correlate to an email or username. As a result this encryption scheme has
become the industry standard in securing services for e-mail communication.
The security services obtained through PGP are:
Privacy
Sender Authentication
Message Integrity
Non-repudiation
Assessment of Pretty Good Privacy (PGP) Encryption_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Why Johnny Can't Encrypt: A Study of the Usability of Pretty Good Privacy
|6
|2192
|243

Crypto Hashes and PKI Cryptography Assignment
|5
|1391
|186

Encryption Algorithm Assignment
|6
|1103
|186