that would mean that the document has been modified after signing it.
PGP uses public-key cryptography, much like DSA or RSA. But, unlike DSA or RSA, PGP gives the option of signing someone’s public key with various levels of trust. Before using someone’s public key, one can easily look into who all have signed the public key and with what level of trust. As a result, it becomes much more difficult for attackers to forge someone’s public key and trick others into using it.
This is an introductory article. You will get more information on PGP in the following articles :
- How to install GPG on your computer? (GPG or GnuPG is an OpenPGP-compliant program developed by IETF under the GPL license)
- What is the difference between PGP, OpenPGP, and GPG?
- How to generate your GPG key pair?
- DSA vs RSA – which one should you select while generating your GPG key pair?
- How to edit your GPG key pair?
- How to share your GPG public key with others?
- How to make Digital Signatures of documents using GPG?
- How to encrypt and decrypt files using GPG?
- How to sign and encrypt emails using GPG?
- S/MIME and PGP – How are they different from each other in encrypting emails?
- How to use GnuPG in Python?
- How are GPG keys used for server-client communication?
Happy learning! Readers who want to know more about how different cryptographic algorithms and public key infrastructure work may want to refer to the book “Cryptography And Public Key Infrastructure.”










































0 Comments