PGP: Pretty Good PrivacyUse of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this. PGP, which stands for Pretty Good Privacy, is a free and widely available encryption program that lets you protect files and electronic mail. Written by Phil Zimmermann and released in 1991, PGP works on virtually every platform and has become very popular both in the U.S. and abroad. Because it uses state-of-the-art public key cryptography, PGP can be used to authenticate messages, as well as keep them secret. With PGP, you can digitally "sign" a message when you send it. By checking the digital signature at the other end, the recipient can be sure that the message was not changed during transmission and that the message actually came from you. PGP offers a popular alternative to U.S. government initiatives like the Clipper Chip because, unlike Clipper, it does not allow the government or any other outside agency access to your secret keys. PGP: Pretty Good Privacy by Simson Garfinkel is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. Part I, "PGP Overview," introduces PGP and the cryptography that underlies it. Part II, "Cryptography History and Policy," describes the history of PGP -- its personalities, legal battles, and other intrigues; it also provides background on the battles over public key cryptography patents and the U.S. government export restrictions, and other aspects of the ongoing public debates about privacy and free speech. Part III, "Using PGP," describes how to use PGP: protecting files and email, creating and using keys, signing messages, certifying and distributing keys, and using key servers. Part IV, "Appendices," describes how to obtain PGP from Internet sites, how to install it on PCs, UNIX systems, and the Macintosh, and other background information. The book also contains a glossary, a bibliography, and a handy reference card that summarizes all of the PGP commands, environment variables, and configuration variables. |
Contents
III | 1 |
IV | 3 |
V | 4 |
VI | 7 |
VII | 8 |
VIII | 10 |
IX | 11 |
XI | 13 |
CXLVI | 180 |
CXLVII | 181 |
CXLVIII | 182 |
CXLIX | 183 |
CLI | 185 |
CLII | 186 |
CLIII | 187 |
CLIV | 188 |
XII | 14 |
XIII | 15 |
XIV | 17 |
XV | 20 |
XVI | 21 |
XVIII | 22 |
XX | 23 |
XXI | 24 |
XXII | 27 |
XXIII | 28 |
XXIV | 29 |
XXVI | 30 |
XXVII | 31 |
XXVIII | 33 |
XXX | 34 |
XXXI | 35 |
XXXII | 36 |
XXXIII | 39 |
XXXV | 40 |
XXXVI | 42 |
XXXVII | 43 |
XXXVIII | 44 |
XXXIX | 45 |
XL | 46 |
XLI | 47 |
XLIII | 49 |
XLIV | 51 |
XLVIII | 52 |
XLIX | 54 |
LI | 56 |
LIII | 57 |
LIV | 59 |
LV | 61 |
LVI | 62 |
LVII | 64 |
LVIII | 65 |
LIX | 66 |
LX | 67 |
LXI | 68 |
LXII | 69 |
LXIV | 71 |
LXV | 72 |
LXVI | 74 |
LXVII | 75 |
LXVIII | 77 |
LXIX | 79 |
LXX | 82 |
LXXI | 85 |
LXXIV | 87 |
LXXV | 88 |
LXXVI | 90 |
LXXVII | 91 |
LXXVIII | 92 |
LXXIX | 94 |
LXXX | 96 |
LXXXI | 97 |
LXXXII | 98 |
LXXXIII | 101 |
LXXXV | 102 |
LXXXVI | 103 |
LXXXVIII | 105 |
LXXXIX | 106 |
XC | 109 |
XCI | 111 |
XCII | 113 |
XCIV | 117 |
XCV | 118 |
XCVI | 121 |
XCVII | 123 |
XCVIII | 124 |
XCIX | 125 |
C | 126 |
CI | 127 |
CII | 128 |
CIII | 129 |
CIV | 131 |
CV | 133 |
CVI | 135 |
CVII | 137 |
CVIII | 138 |
CX | 139 |
CXI | 141 |
CXIII | 143 |
CXIV | 145 |
CXV | 147 |
CXVI | 148 |
CXVIII | 151 |
CXX | 152 |
CXXI | 153 |
CXXIII | 154 |
CXXIV | 156 |
CXXVI | 159 |
CXXVII | 160 |
CXXVIII | 161 |
CXXIX | 162 |
CXXX | 163 |
CXXXII | 165 |
CXXXIV | 167 |
CXXXV | 168 |
CXXXVI | 171 |
CXXXVII | 172 |
CXXXVIII | 173 |
CXXXIX | 174 |
CXLI | 175 |
CXLII | 176 |
CXLIII | 177 |
CXLV | 178 |
CLVI | 190 |
CLVII | 191 |
CLVIII | 192 |
CLX | 193 |
CLXI | 195 |
CLXII | 196 |
CLXIV | 197 |
CLXVI | 198 |
CLXVII | 199 |
CLXIX | 203 |
CLXX | 204 |
CLXXII | 206 |
CLXXIII | 208 |
CLXXVI | 209 |
CLXXVII | 212 |
CLXXIX | 213 |
CLXXX | 214 |
CLXXXI | 215 |
CLXXXII | 217 |
CLXXXIII | 218 |
CLXXXV | 220 |
CLXXXVI | 222 |
CLXXXVII | 223 |
CLXXXIX | 226 |
CXC | 228 |
CXCI | 229 |
CXCII | 230 |
CXCIII | 231 |
CXCIV | 233 |
CXCV | 234 |
CXCVI | 235 |
CXCVII | 236 |
CXCIX | 238 |
CC | 240 |
CCI | 241 |
CCII | 244 |
CCIII | 245 |
CCIV | 246 |
CCVI | 247 |
CCVII | 248 |
CCVIII | 249 |
CCIX | 250 |
CCX | 251 |
CCXII | 253 |
CCXIII | 255 |
CCXIV | 256 |
CCXV | 261 |
CCXVI | 263 |
CCXIX | 264 |
CCXXI | 267 |
CCXXII | 268 |
CCXXIV | 269 |
CCXXV | 270 |
CCXXVI | 271 |
CCXXVIII | 272 |
CCXXX | 273 |
CCXXXI | 274 |
CCXXXII | 276 |
CCXXXIII | 285 |
CCXXXIV | 286 |
CCXXXVI | 287 |
CCXXXVIII | 288 |
CCXXXIX | 289 |
CCXL | 290 |
CCXLI | 291 |
CCXLIII | 293 |
CCXLIV | 295 |
CCXLV | 296 |
CCXLVI | 297 |
CCXLVII | 306 |
CCXLVIII | 307 |
CCXLIX | 308 |
CCLI | 309 |
CCLII | 311 |
CCLV | 315 |
CCLVI | 317 |
CCLVII | 319 |
CCLIX | 320 |
CCLX | 321 |
CCLXI | 323 |
CCLXIII | 325 |
CCLXV | 327 |
CCLXVI | 331 |
CCLXVII | 334 |
CCLXVIII | 336 |
CCLXIX | 339 |
CCLXXII | 340 |
CCLXXVI | 341 |
CCLXXVIII | 342 |
CCLXXIX | 343 |
CCLXXX | 345 |
CCLXXXI | 349 |
CCLXXXII | 355 |
CCLXXXV | 357 |
CCLXXXVI | 358 |
CCLXXXVII | 359 |
CCLXXXVIII | 360 |
CCLXXXIX | 361 |
CCXCI | 362 |
CCXCIII | 364 |
CCXCV | 365 |
CCXCVI | 367 |
CCXCVII | 377 |
CCXCVIII | 378 |
CCXCIX | 379 |
381 | |
Other editions - View all
Common terms and phrases
94 Distributed ASCII armor Bidzos C:\WORK certify Chapter cipher Clipper copy of PGP created Cylink decrypt Diffie-Hellman digital signatures disk electronic mail encrypted message encryption algorithm encryption key Export Garfinkel simsong@acm.org Institute of Technology Internet key encryption key escrow Key for user Key ID key server keys.asc knapsack license Massachusetts Institute Merritt message digest MIPS-years O'REILLY one-time pad option pass phrase patent PGP key PGP PUBLIC KEY PGP Version PGP's Phil Phil's Pretty Philip Zimmermann Pizza phil@pgp.com plaintext Pretty Good Pizza Pretty Good Privacy Pretty Good Software Privacy tm public key cryptography public key ring Public-key encryption random number restricted Rivest RSA algorithm RSA Data Security RSAREF run PGP Schiller jis@mit.edu secret key secret key ring session key Simson specify trust U.S. government unix user ID Version 2.6 version of PGP wiretap Zimmermann prz@acm.org