Developed by Phil Zimmerman in 1991. It combines symmetric, asymmetric (public key) encryption, hash, and digital signature all together providing confidentiality, integrity, and authentication. Good for email. The algorithm:
At the sender (Alice) side:
- Alice: Message M is hashed
- Sign (encrypt) the hash value with her private key (EP)
- Compress (zip) the message + signed hash value
- Use a session key Ks to encrypt zipped output (ES)
- Use Bob's public key to encrypt session key (EP)
- Send encrypted message and encrypted session key
At the recipient (Bob) side:
- Use Bob's private key to decrypt session key (DP)
- Use session key Ks to decrypt the zipped message
- unzip, got message and signed hash value
- Use Alice's public key to decrypt the hash value
- Computing hash value for the message received
- Compare with hash value Alice computed.
Below are the PGP diagram:
Mathematically:
Note:
Image copyright: Author of this post. Free to use but reference is required.
No comments:
Post a Comment