Operation of PGP
When a user wants to encrypt a piece of text, file, partition or e-mail with PGP. PGP then compresses the text. Due to this algorithm that is used enables to reduce the time to encrypt the message and send it.
How does PGP Public Key work?
A key is a cryptographic algorithm that enables you to encrypt your text, image, file or partition.
This is a combination of numbers and computer characters whose length is measured in BITS.The longer the key, the more secure the encryption. The public and private key pair consists of two unique related cryptographic keys (basically long random numbers). Below is an example of a Public Key:
3048 0241 D0C9 18FX CQ8D EB2D F0139 FD37 89B9 E069 EA97 FC20 5E33 F567 EE31 C4FB C6E4 4811 7D86 BC8F BAFA 362F 922B EFD5 2F40 C744 C0DD 2654 2881 4003 C266 D673 CA2B E2CD CB02 0201 0007
What is a public PGP Key?
The public key is says it all it is a public key, though it is public. When you use it correctly it does not matter how public it is. The public key is made available to all through a public access actual directory. On the other hand, the private key must be kept confidential. This is only visible and useable by the owner.
Jim wants to send sensitive data to Elise and wants to make sure that Elise’s only one that will be able to read it. He will encrypt the data with Elise’s public key. Elise’s only has access to its private key, and therefore the only one that has the ability to decrypt the message.
PGP private key
The public key is what the name suggests – Public. It is made available to everyone through a publicly accessible repository or directory. On the other hand, the private key must remain confidential to its respective owner. It is impossible to ensure the private key even if the public key is known.
X-PGP has just launched the X-PGP 9900 cell phone that enables the usability of a normal phone in combination with an encrypted partition that enables you to encrypt everything and make it as secure as you want it to be.With 256-bit AES encryption method X-PGP is un-hackable.