Pretty Good Privacy/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (create) |
No edit summary |
||
Line 13: | Line 13: | ||
{{r|email}} | {{r|email}} | ||
{{r|Phil Zimmerman}} | {{r|Phil Zimmerman}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Hash (cryptography)}} | |||
{{r|CAST (cipher)}} | |||
{{r|Digital signature}} | |||
{{r|Asymmetric key cryptography}} |
Latest revision as of 16:01, 6 October 2024
- See also changes related to Pretty Good Privacy, or pages that link to Pretty Good Privacy or to this page or whose text contains "Pretty Good Privacy".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
Subtopics
- GNU Privacy Guard [r]: An open source implementation of the Open PGP specification for the PGP email encryption program. [e]
- Open PGP [r]: An IETF specification for PGP, RFC 4880 [e]
- PGP corporation [r]: Add brief definition or description
- Email [r]: A method of composing, sending, storing, and receiving messages over electronic communication systems. [e]
- Phil Zimmerman [r]: Add brief definition or description
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- CAST (cipher) [r]: A general procedure for constructing a family of block ciphers. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]