PGP: Pretty Good Privacy

Front Cover
"O'Reilly Media, Inc.", 1995 - Computers - 393 pages
Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this. PGP, which stands for Pretty Good Privacy, is a free and widely available encryption program that lets you protect files and electronic mail. Written by Phil Zimmermann and released in 1991, PGP works on virtually every platform and has become very popular both in the U.S. and abroad. Because it uses state-of-the-art public key cryptography, PGP can be used to authenticate messages, as well as keep them secret. With PGP, you can digitally "sign" a message when you send it. By checking the digital signature at the other end, the recipient can be sure that the message was not changed during transmission and that the message actually came from you. PGP offers a popular alternative to U.S. government initiatives like the Clipper Chip because, unlike Clipper, it does not allow the government or any other outside agency access to your secret keys. PGP: Pretty Good Privacy by Simson Garfinkel is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. Part I, "PGP Overview," introduces PGP and the cryptography that underlies it. Part II, "Cryptography History and Policy," describes the history of PGP -- its personalities, legal battles, and other intrigues; it also provides background on the battles over public key cryptography patents and the U.S. government export restrictions, and other aspects of the ongoing public debates about privacy and free speech. Part III, "Using PGP," describes how to use PGP: protecting files and email, creating and using keys, signing messages, certifying and distributing keys, and using key servers. Part IV, "Appendices," describes how to obtain PGP from Internet sites, how to install it on PCs, UNIX systems, and the Macintosh, and other background information. The book also contains a glossary, a bibliography, and a handy reference card that summarizes all of the PGP commands, environment variables, and configuration variables.
 

Contents

III
1
IV
3
V
4
VI
7
VII
8
VIII
10
IX
11
XI
13
CXLVI
180
CXLVII
181
CXLVIII
182
CXLIX
183
CLI
185
CLII
186
CLIII
187
CLIV
188

XII
14
XIII
15
XIV
17
XV
20
XVI
21
XVIII
22
XX
23
XXI
24
XXII
27
XXIII
28
XXIV
29
XXVI
30
XXVII
31
XXVIII
33
XXX
34
XXXI
35
XXXII
36
XXXIII
39
XXXV
40
XXXVI
42
XXXVII
43
XXXVIII
44
XXXIX
45
XL
46
XLI
47
XLIII
49
XLIV
51
XLVIII
52
XLIX
54
LI
56
LIII
57
LIV
59
LV
61
LVI
62
LVII
64
LVIII
65
LIX
66
LX
67
LXI
68
LXII
69
LXIV
71
LXV
72
LXVI
74
LXVII
75
LXVIII
77
LXIX
79
LXX
82
LXXI
85
LXXIV
87
LXXV
88
LXXVI
90
LXXVII
91
LXXVIII
92
LXXIX
94
LXXX
96
LXXXI
97
LXXXII
98
LXXXIII
101
LXXXV
102
LXXXVI
103
LXXXVIII
105
LXXXIX
106
XC
109
XCI
111
XCII
113
XCIV
117
XCV
118
XCVI
121
XCVII
123
XCVIII
124
XCIX
125
C
126
CI
127
CII
128
CIII
129
CIV
131
CV
133
CVI
135
CVII
137
CVIII
138
CX
139
CXI
141
CXIII
143
CXIV
145
CXV
147
CXVI
148
CXVIII
151
CXX
152
CXXI
153
CXXIII
154
CXXIV
156
CXXVI
159
CXXVII
160
CXXVIII
161
CXXIX
162
CXXX
163
CXXXII
165
CXXXIV
167
CXXXV
168
CXXXVI
171
CXXXVII
172
CXXXVIII
173
CXXXIX
174
CXLI
175
CXLII
176
CXLIII
177
CXLV
178
CLVI
190
CLVII
191
CLVIII
192
CLX
193
CLXI
195
CLXII
196
CLXIV
197
CLXVI
198
CLXVII
199
CLXIX
203
CLXX
204
CLXXII
206
CLXXIII
208
CLXXVI
209
CLXXVII
212
CLXXIX
213
CLXXX
214
CLXXXI
215
CLXXXII
217
CLXXXIII
218
CLXXXV
220
CLXXXVI
222
CLXXXVII
223
CLXXXIX
226
CXC
228
CXCI
229
CXCII
230
CXCIII
231
CXCIV
233
CXCV
234
CXCVI
235
CXCVII
236
CXCIX
238
CC
240
CCI
241
CCII
244
CCIII
245
CCIV
246
CCVI
247
CCVII
248
CCVIII
249
CCIX
250
CCX
251
CCXII
253
CCXIII
255
CCXIV
256
CCXV
261
CCXVI
263
CCXIX
264
CCXXI
267
CCXXII
268
CCXXIV
269
CCXXV
270
CCXXVI
271
CCXXVIII
272
CCXXX
273
CCXXXI
274
CCXXXII
276
CCXXXIII
285
CCXXXIV
286
CCXXXVI
287
CCXXXVIII
288
CCXXXIX
289
CCXL
290
CCXLI
291
CCXLIII
293
CCXLIV
295
CCXLV
296
CCXLVI
297
CCXLVII
306
CCXLVIII
307
CCXLIX
308
CCLI
309
CCLII
311
CCLV
315
CCLVI
317
CCLVII
319
CCLIX
320
CCLX
321
CCLXI
323
CCLXIII
325
CCLXV
327
CCLXVI
331
CCLXVII
334
CCLXVIII
336
CCLXIX
339
CCLXXII
340
CCLXXVI
341
CCLXXVIII
342
CCLXXIX
343
CCLXXX
345
CCLXXXI
349
CCLXXXII
355
CCLXXXV
357
CCLXXXVI
358
CCLXXXVII
359
CCLXXXVIII
360
CCLXXXIX
361
CCXCI
362
CCXCIII
364
CCXCV
365
CCXCVI
367
CCXCVII
377
CCXCVIII
378
CCXCIX
379
CCC
381
Copyright

Other editions - View all

Common terms and phrases

About the author (1995)

Simson Garfinkel, CISSP, is a journalist, entrepreneur, and international authority on computer security. Garfinkel is chief technology officer at Sandstorm Enterprises, a Boston-based firm that develops state-of-the-art computer security tools. Garfinkel is also a columnist for Technology Review Magazine and has written for more than 50 publications, including Computerworld, Forbes, and The New York Times. He is also the author of Database Nation; Web Security, Privacy, and Commerce; PGP: Pretty Good Privacy; and seven other books. Garfinkel earned a master's degree in journalism at Columbia University in 1988 and holds three undergraduate degrees from MIT. He is currently working on his doctorate at MIT's Laboratory for Computer Science.