Design
PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and, finally, public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a user name and/or an e-mail address. The first version of this system was generally known as a web of trust to contrast with the X.509 system, which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Current versions of PGP encryption include both options through an automated key management server.
Read more about this topic: Pretty Good Privacy
Famous quotes containing the word design:
“Delay always breeds danger; and to protract a great design is often to ruin it.”
—Miguel De Cervantes (15471616)
“Westerners inherit
A design for living
Deeper into matter
Not without due patter
Of a great misgiving.”
—Robert Frost (18741963)
“You can make as good a design out of an American turkey as a Japanese out of his native stork.”
—For the State of Illinois, U.S. public relief program (1935-1943)