| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
| |
PGP Overview | |
| |
| |
| |
Introduction to PGP | |
| |
| |
Why PGP? The Case for Encryption | |
| |
| |
Your Mail Can Go Astray | |
| |
| |
Protecting Your Privacy | |
| |
| |
Where Did PGP Come from? | |
| |
| |
Basic PGP Terminology | |
| |
| |
Keys: Public, Secret, and Session | |
| |
| |
Key Certificates | |
| |
| |
Key Rings | |
| |
| |
Pass Phrases | |
| |
| |
Digital Signatures | |
| |
| |
Signatures on Key Certificates | |
| |
| |
How to Run PGP | |
| |
| |
The Command Line Interface | |
| |
| |
Getting Help (-h Option) | |
| |
| |
Specifying Command Line Arguments | |
| |
| |
Using ASCII Armor (-a Option) | |
| |
| |
Encrypting and Signing Email (-e and -s Options) | |
| |
| |
PGP File Extensions | |
| |
| |
PGP Environment Variables | |
| |
| |
PGP Configuration Variables | |
| |
| |
The PGP Language File | |
| |
| |
PGP and Its Competitors | |
| |
| |
Key Certification with PGP | |
| |
| |
| |
Cryptography Basics | |
| |
| |
How Does Simple Cryptography Work? | |
| |
| |
Codes | |
| |
| |
Ciphers | |
| |
| |
Substitution ciphers | |
| |
| |
One-Time Pads | |
| |
| |
Keys and Key Length | |
| |
| |
Breaking the Code | |
| |
| |
Brute force (key search) attack | |
| |
| |
Cryptanalysis | |
| |
| |
Private Key Cryptography | |
| |
| |
Private Key Algorithms | |
| |
| |
A Private Key Example | |
| |
| |
Problems with Private Key Cryptography | |
| |
| |
The Key Distribution Center | |
| |
| |
The Outlook for Private Key | |
| |
| |
Public Key Cryptography | |
| |
| |
Public Key Systems | |
| |
| |
Advantages of Public Key Systems | |
| |
| |
Digital Signatures | |
| |
| |
Using Private and Public Key Cryptography Together | |
| |
| |
How Good is Cryptography? .. | |
| |
| |
The Strong and the Weak | |
| |
| |
The Case for Weakness | |
| |
| |
What Encryption Can't Do | |
| |
| |
U.S. Restrictions on Cryptography | |
| |
| |
Cryptography and the U.S. Patent System | |
| |
| |
Cryptography and Export Controls | |
| |
| |
| |
Cryptography History and Policy | |
| |
| |
| |
Cryptography Before PGP | |
| |
| |
Cryptography Through the Ages | |
| |
| |
National Security and the NSA | |
| |
| |
Lucifer and the DES | |
| |
| |
The National Bureau of Standards | |
| |
| |
The Security of the DES | |
| |
| |
DES Cracking | |
| |
| |
Alternatives to the DES | |
| |
| |
Public Key Cryptography | |
| |
| |
Ralph Merkle''s Puzzles | |
| |
| |
Diffie-Hellman Multi-User Techniques | |
| |
| |
Diffie-Hellman Exponential Key Exchange | |
| |
| |
The Birth of RSA | |
| |
| |
How does RSA work? | |
| |
| |
Technical Memorandum #82 | |
| |
| |
The Rise and Fall of Knapsacks | |
| |
| |
Taking Public Key to Market | |
| |
| |
| |
A Pretty Good History of PGP | |
| |
| |
Phil Zimmermann: On the Road to PGP | |
| |
| |
Metamorphic Systems | |
| |
| |
Charlie Merritt | |
| |
| |
Phil Zimmermann Meets Public Key | |
| |
| |
Face to Face with Jim Bidzos | |
| |
| |
The Rise of RSA Data Security | |
| |
| |
Working with Big Jim | |
| |
| |
A Pretty Good Program | |
| |
| |
The Anti-Crime Bill S.266 .. | |
| |
| |
The Birth of PGP-Version 1.0 | |
| |
| |
PGP Grows Up | |
| |
| |
Bass-O-Matic | |
| |
| |
The Real Thing-PGP Version 2.0 | |
| |
| |
The Cypherpunks | |
| |
| |
PEM, RSAREF, and RIPEM | |
| |
| |
ViaCrypt | |
| |
| |
MIT Steps in | |
| |
| |
Throwing PGP into the Wind | |
| |
| |
The Federal Investigation of Zimmermann | |
| |
| |
Whither PGP? | |
| |
| |
RSA-129 Solved! | |
| |
| |
| |
Privacy and Public Policy | |
| |
| |
Wiretapping and the U.S. Government | |
| |
| |
The FBI''s Digital Telephony Plan | |
| |
| |
The Untold Cost of Digital Telephony | |
| |
| |
Return of Digital Telephony | |
| |
| |
Where''s the Beef? | |
| |
| |
An Information Superhighway that''s "Wired for Sound" | |
| |
| |
The NSA''s Clipper Chip | |
| |
| |
Inside Clipper | |
| |
| |
Who Gets the Keys? | |
| |
| |
The Battle over Clipper and the EES | |
| |
| |
Problems with Clipper | |
| |
| |
| |
Cryptography Patents and Export | |
| |
| |
Patents and Policy | |
| |
| |
Export: 40 Bits is not Enough! | |
| |
| |
The Digital Signature Standard | |
| |
| |
The Battle over the DSS | |
| |
| |
The DSS and Patents | |
| |
| |
The Fall of PKP? | |
| |
| |
The Cylink Lawsuit | |
| |
| |
The Schlafly Lawsuit | |
| |
| |
| |
Using PGP | |
| |
| |
| |
Protecting Your Files | |