Open Access Open Access  Restricted Access Subscription Access

A Critical Review of Different Cryptographic Technique in Pretty Good Privacy


Affiliations
1 Department of Electronics, University of York, York YO10 5DD, United Kingdom
 

E-mail service is one of the most essential Internet Services. E-mail security be composed of confidentiality, authentication and message integrity. Pretty Good Privacy (PGP) is an email security protocol. It helps in encryption of the plain text data giving them cryptographic privacy and authentication. Cryptographic technique is used to encrypt and decrypt data. Cryptography implements to store prime data or transmit it across the receiver so that only recipient can read that data. In this paper, we pointed out the review on different cryptographic techniques for PGP on the basis of difference in working and impact on level of security. We take into consideration the cryptographic technique such as The Rivest-Shamir-Adleman (RSA) and Digital Signature Standard (DSS) for authentication and integrity, the International Data Encryption Algorithm (IDEA) for confidentiality.

Keywords

PGP, RSA, DSS, IDEA, Authentication, Confidentiality, Encryption, CCA, WSN.
User
Notifications
Font Size

Abstract Views: 263

PDF Views: 0




  • A Critical Review of Different Cryptographic Technique in Pretty Good Privacy

Abstract Views: 263  |  PDF Views: 0

Authors

Sanket Jirapure
Department of Electronics, University of York, York YO10 5DD, United Kingdom
Raj Jirapure
Department of Electronics, University of York, York YO10 5DD, United Kingdom

Abstract


E-mail service is one of the most essential Internet Services. E-mail security be composed of confidentiality, authentication and message integrity. Pretty Good Privacy (PGP) is an email security protocol. It helps in encryption of the plain text data giving them cryptographic privacy and authentication. Cryptographic technique is used to encrypt and decrypt data. Cryptography implements to store prime data or transmit it across the receiver so that only recipient can read that data. In this paper, we pointed out the review on different cryptographic techniques for PGP on the basis of difference in working and impact on level of security. We take into consideration the cryptographic technique such as The Rivest-Shamir-Adleman (RSA) and Digital Signature Standard (DSS) for authentication and integrity, the International Data Encryption Algorithm (IDEA) for confidentiality.

Keywords


PGP, RSA, DSS, IDEA, Authentication, Confidentiality, Encryption, CCA, WSN.