Skip to content

PGP: Pretty Good Privacy Pretty Good Privacy

Best in textbook rentals since 2012!

ISBN-10: 1565920988

ISBN-13: 9781565920989

Edition: 1994 (Reprint)

Authors: Simson Garfinkel, Deborah Russell

List price: $34.95
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

PGP is a freely available encryption program that protects the privacy of files and electronic mail. It uses powerful public key cryptography and works on virtually every platform. This book is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. It describes how to use PGP and provides background on cryptography, PGP's history, battles over public key cryptography patents and U.S. government export restrictions, and public debates about privacy and free speech.
Customers also bought

Book details

List price: $34.95
Copyright year: 1994
Publisher: O'Reilly Media, Incorporated
Publication date: 1/10/1995
Binding: Paperback
Pages: 430
Size: 7.25" wide x 9.25" long x 1.25" tall
Weight: 1.540
Language: English

Foreword
Preface
PGP Overview
Introduction to PGP
Why PGP? The Case for Encryption
Your Mail Can Go Astray
Protecting Your Privacy
Where Did PGP Come from?
Basic PGP Terminology
Keys: Public, Secret, and Session
Key Certificates
Key Rings
Pass Phrases
Digital Signatures
Signatures on Key Certificates
How to Run PGP
The Command Line Interface
Getting Help (-h Option)
Specifying Command Line Arguments
Using ASCII Armor (-a Option)
Encrypting and Signing Email (-e and -s Options)
PGP File Extensions
PGP Environment Variables
PGP Configuration Variables
The PGP Language File
PGP and Its Competitors
Key Certification with PGP
Cryptography Basics
How Does Simple Cryptography Work?
Codes
Ciphers
Substitution ciphers
One-Time Pads
Keys and Key Length
Breaking the Code
Brute force (key search) attack
Cryptanalysis
Private Key Cryptography
Private Key Algorithms
A Private Key Example
Problems with Private Key Cryptography
The Key Distribution Center
The Outlook for Private Key
Public Key Cryptography
Public Key Systems
Advantages of Public Key Systems
Digital Signatures
Using Private and Public Key Cryptography Together
How Good is Cryptography? ..
The Strong and the Weak
The Case for Weakness
What Encryption Can't Do
U.S. Restrictions on Cryptography
Cryptography and the U.S. Patent System
Cryptography and Export Controls
Cryptography History and Policy
Cryptography Before PGP
Cryptography Through the Ages
National Security and the NSA
Lucifer and the DES
The National Bureau of Standards
The Security of the DES
DES Cracking
Alternatives to the DES
Public Key Cryptography
Ralph Merkle''s Puzzles
Diffie-Hellman Multi-User Techniques
Diffie-Hellman Exponential Key Exchange
The Birth of RSA
How does RSA work?
Technical Memorandum #82
The Rise and Fall of Knapsacks
Taking Public Key to Market
A Pretty Good History of PGP
Phil Zimmermann: On the Road to PGP
Metamorphic Systems
Charlie Merritt
Phil Zimmermann Meets Public Key
Face to Face with Jim Bidzos
The Rise of RSA Data Security
Working with Big Jim
A Pretty Good Program
The Anti-Crime Bill S.266 ..
The Birth of PGP-Version 1.0
PGP Grows Up
Bass-O-Matic
The Real Thing-PGP Version 2.0
The Cypherpunks
PEM, RSAREF, and RIPEM
ViaCrypt
MIT Steps in
Throwing PGP into the Wind
The Federal Investigation of Zimmermann
Whither PGP?
RSA-129 Solved!
Privacy and Public Policy
Wiretapping and the U.S. Government
The FBI''s Digital Telephony Plan
The Untold Cost of Digital Telephony
Return of Digital Telephony
Where''s the Beef?
An Information Superhighway that''s "Wired for Sound"
The NSA''s Clipper Chip
Inside Clipper
Who Gets the Keys?
The Battle over Clipper and the EES
Problems with Clipper
Cryptography Patents and Export
Patents and Policy
Export: 40 Bits is not Enough!
The Digital Signature Standard
The Battle over the DSS
The DSS and Patents
The Fall of PKP?
The Cylink Lawsuit
The Schlafly Lawsuit
Using PGP
Protecting Your Files