From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,000 courses taught by industry experts.

PGP and GnuPG

PGP and GnuPG

- [Instructor] Let's take a look at another asymmetric algorithm. In 1991, Phil Zimmerman released an algorithm that he called the Pretty Good Privacy or PGP algorithm. PGP is still widely used today and the details are freely available for anyone to use through the OpenPGP standard. PGP uses public and private key pairs, but it performs encryption and decryption in a little more complex manner that combines both symmetric and asymmetric cryptography. Let's first take a look at the encryption process using PGP. The sender of a message has the original plain text and then generates a random symmetric encryption key. Next, the sender encrypts the message using the random symmetric key and then encrypts the random key using the recipient's public key. The sender then transmits the encrypted message, which is a combination of the encrypted data and the encrypted random key. When the recipient receives that encrypted message, they perform the decryption process. First, they decrypt the…

Contents