AboutBlogContact
SecurityJune 5, 1991 2 min read 17

PGP: Phil Zimmermann's Crypto for the Masses

AunimedaAunimeda
📋 Table of Contents

PGP: Phil Zimmermann's Crypto for the Masses

For a long time, strong cryptography was the domain of the military and large financial institutions. But with the release of PGP (Pretty Good Privacy) version 1.0, Phil Zimmermann has given every computer user the power to encrypt their communications with military-grade security.

How It Works

PGP uses a "hybrid" approach. It uses RSA (asymmetric encryption) to securely exchange a session key, and then uses a faster symmetric algorithm (like Bass-O-Matic in the initial version) to encrypt the actual message. This solves the "key distribution problem" that has plagued cryptography for centuries.

You generate a public key and a private key. You give your public key to everyone, and keep your private key secret. If someone wants to send you a message, they use your public key. Only you can decrypt it.

A Snippet of a PGP Message

When you see a PGP-encrypted block, it looks like a wall of random characters. That’s the point.

-----BEGIN PGP MESSAGE-----
Version: 1.0

hIwDS4V8p6Y2G30BA/96X0R8... (lots of base64 data)
...
-----END PGP MESSAGE-----

The Controversy

The US government classifies strong encryption as a "munition," and Phil is already under investigation for "exporting" PGP when it was posted on an FTP site. It’s a fascinating legal battle: does code equal free speech?

Looking Ahead

Regardless of the legal outcome, the genie is out of the bottle. We’re moving into a world where digital signatures and encrypted email will be essential for business and personal privacy. PGP is the first step toward a secure, private Internet where your data is your own.

Read Also

OpenSSH Tunneling: Securing Database Connections Over Public Networks (2006)aunimeda
Security

OpenSSH Tunneling: Securing Database Connections Over Public Networks (2006)

Exposing MySQL or PostgreSQL to the public internet is a recipe for disaster. In 2006, SSH tunneling is the gold standard for secure remote database administration.

Mastering ipfwadm: Hardening Linux 2.0.x Firewalls (1998)aunimeda
Security

Mastering ipfwadm: Hardening Linux 2.0.x Firewalls (1998)

The internet is a dangerous place. If you're running a Linux box in 1998 without ipfwadm, you're just waiting for a script kiddie to find you. Here's how to lock it down.

SSH: Why You Should Stop Using Telnet Right Nowaunimeda
Security

SSH: Why You Should Stop Using Telnet Right Now

Tatu Ylönen has released Secure Shell (SSH). If you're still sending your passwords over the wire in plain text with Telnet, you're asking for trouble.

Need IT development for your business?

We build websites, mobile apps and AI solutions. Free consultation.

Get Consultation All articles