From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

PGP and GnuPG

PGP and GnuPG

- [Instructor] Let's take a look at another asymmetric algorithm. In 1991, Phil Zimmerman released an algorithm that he called the Pretty Good Privacy, or PGP algorithm. PGP is still widely used today, and the details are freely available for anyone to use through the OpenPGP standard. PGP uses public and private key pairs, but it performs encryption and decryption in a little more complex manner that combines both symmetric and asymmetric cryptography. Let's first take a look at the encryption process using PGP. The sender of a message has the original plain text, and then generates a random symmetric encryption key. Next, the sender encrypts the message using the random symmetric key and then encrypts the random key using the recipient's public key. The sender then transmits the encrypted message, which is a combination of the encrypted data and the encrypted random key. When the recipient receives that encrypted…

Contents