October 24, 2013

GnuPG

GnuPG



GnuPG is a complete and free replacement for PGP. Because it does not use the patented IDEA algorithm , it can be used without restriction. GnuPG is an application that complies with RFC 4880 ( OpenPGP ).

GnuPG is Free Software. It can be used , freely modified and distributed under the GNU General Public License ( GNU General Public License ).

Version 1.0.0 was released on September 7, 1999.

Gpg4win Project Provides a Windows version of GnuPG. It is nicely integrated into an installer and features as well as several frontends Inglés and German manuals.

GPGTools Project Provides a Mac OS X version of GnuPG. It is nicely integrated into an installer and features all required tools.

The project aegypten provides protocol -compliant clients Sphinx ( Mutt , Kmail , etc. . ) Compatible with S / MIME in a GnuPG. Within this project we have developed some new tools, particularly "gpgsm" counterpart S / MIME "gpg".



The GNU Privacy Guard ( GPG commonly known as ) is a data encryption tool that uses an asymmetric encryption system , which means this?, Each user has a key pair:
public key

Which can ( and should) make known to all those who want to send encrypted information.
private Key
This key should be saved and in no circumstances give anyone, it is used to decrypt the encrypted messages sent to us

This method is used because it is much safer than a single-key system , for example : If person A and person B want to start to be shipped encrypted mail, should establish a key with which to encrypt ( and decrypt ) information (messages mail in this case) that exchange . Person A provides a key and mailed it to B , but unencrypted mail (because B still having no key could not decrypt the message of A) . B starts to receive encrypt messages sent to A, and A uses the same key to decrypt and encrypt theirs to B. This seems safe, but in fact it is not as if anyone else could intercept the message from A to B (not encrypted) with the key, then using that key can decrypt all messages that A and B share no problem.

The asymmetric encryption system solves this problem, since A and B then have two keys each, then A sends its public key to B and B sends its public key to A. Then A uses that public key B to encrypt messages to B , so does B with the public key of A. Those messages encrypted with B 's public key can only be decrypted with the private key of B as messages encrypted with the public key A may be decrypted with the private key of A. As these private keys are held by their owners and nobody else , anyone who intercepts the messages encrypted with the public keys of A and B , you can not use them to decipher any message, and that the only use they have public keys is encrypt ( and decrypt ) information that can be decrypted only by the owner of the public key.

www.systemdeveloper.org

Ditulis Oleh : Angelo Hari: 8:56 AM Kategori:

2 comentarios:

  1. Gönderme ve benzeri yararlı bu yazıyı paylaştığınız için çok teşekkür ederim. Ben her zaman burada bazı diğer bilgileri bilmek istiyordu.
    dunia remaja

    ReplyDelete