
In the email world, checking the authenticity of an email is nothing but to check whether it actually came from the person it says. To login into some sites sometimes we give our account name and password, that is an authentication verification procedure.

In this article, we will see about Authentication and Confidentiality.Īuthentication basically means something that is used to validate something as true or real. The following are the services offered by PGP: The application is based on a few commands which are very easy to use. PGP software is an open source one and is not dependent on either of the OS (Operating System) or the processor. He designed it in such a way, that the best cryptographic algorithms such as RSA, Diffie-Hellman key exchange, DSS are used for the public-key encryption (or) asymmetric encryption CAST-128, 3DES, IDEA are used for symmetric encryption and SHA-1 is used for hashing purposes. It was designed by Phil Zimmermann way back in 1991. One was S/MIME which we will see later and the other was PGP.Īs said, PGP (Pretty Good Privacy), is a popular program that is used to provide confidentiality and authentication services for electronic mail and file storage. Interestingly, among the various plug-ins and extensions that people started to use, there were two main programs that were solely responsible for the complete email security that the people needed. Among the services people opted for, most particularly for Emails, were different plug-ins and extensions for their browsers. In 2013, when the NSA (United States National Security Agency) scandal was leaked to the public, people started to opt for the services which can provide them a strong privacy for their data.


Difference between Monoalphabetic Cipher and Polyalphabetic Cipher.Shannon-Fano Algorithm for Data Compression.LZW (Lempel–Ziv–Welch) Compression technique.Data Compression With Arithmetic Coding.PGP – Authentication and Confidentiality.

