The receiver receives the combination of encrypted secret key and message digest is received.PGP at the Sender site (A) Following are the steps taken to show how PGP uses hashing and a combination of three keys to generate the original message: Both the encrypted secret key and the encrypted combination of message and digest are sent together.
The secret key is encrypted by using a receiver's public key.The original message and signed digest are encrypted by using a one-time secret key created by the sender.The digest is then encrypted to form a signed digest by using the sender's private key, and then signed digest is added to the original email message.The e-mail message is hashed by using a hashing function to create a digest.
WHAT IS THE BEST PGP PROGRAM ZIP
It provides compression by using the ZIP algorithm, and EMAIL compatibility using the radix-64 encoding scheme.įollowing are the steps taken by PGP to create secure e-mail at the sender site:.It provides confidentiality through the use of symmetric block encryption.PGP provides authentication through the use of Digital Signature.
WHAT IS THE BEST PGP PROGRAM SOFTWARE