answersLogoWhite

0


Best Answer

Ans 1:PGP combines some of the best features of both conventional and public key cryptography. PGP is a hybrid cryptosystem. When a user encrypts plaintext with PGP, PGP first compresses the plaintext. Data compression saves modem transmission time and disk space and, more importantly, strengthens cryptographic security. Most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher. Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis. (Files that are too short to compress or which don't compress well aren't compressed.)

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

PGP is not a compressing program. Its an encryption program. Its one of the best encryption methods available today, and ensures that only the right people are able to read your emails.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Give two reasons why PGP compresses messages?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Who create pretty good privacy pgp?

Philip Zimmerman


What is the full form of PGP in computer language?

Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.


What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.


What is hushmail?

See the related link for more information. Hushmail offers secure and unreadable email to its users. It uses PGP encryption and a key management system to secure email for the sender and receiver.


How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works. An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages. Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to. To get more details on the mathematics of encryption and decrption using Public Key Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

Related questions

Why pgp compresses massages?

PGP does not compress messages. It encrypts them. PGP is used to ensure that confidential emails to do fall into the wrong hands, and that a message is in fact from the person you think it is.• Developed by Phil Zimmerman in 1995.• Documentation and source code is freely available.• The package is independent of operating system and processor.• PGP does not rely on the "establishment" and it's popularity and use have grown extensively since 1995.• PGP combines the best available cryptographic algorithms to achieve secure e-mail communication. • It is assumed that all users are using public key cryptography and have generated a private/public key pair.• Either RSA (with RSA digital signatures) or El Gamel (with DSA) can be used.• All users also use a symmetric key system such as triple DES or Rijndael.


When was PGP-RTB created?

PGP-RTB was created in 1958.


When was PGP-RTS created?

PGP-RTS was created in 1958.


What is the population of PGP Corporation?

The population of PGP Corporation is 2,006.


When was PGP Corporation created?

PGP Corporation was created in 2002.


Which algorithm is used in PGP?

IDEA


Is Pgp symmetric or asymmetric?

Asymmetric


What is the utility of detached signature in PGP?

They can be sent or stored separately, which is useful to maintain a separate log of messages sent and received, if more than one party must sign a document, or to monitor data integrity.


In what year did Pimco Global Stocksplus and Income Fund - PGP - have its IPO?

Pimco Global Stocksplus & Income Fund (PGP)had its IPO in 2005.


Which symmetrical algorithm is used in PGP?

IDEA


Which symmetrical algorithm used in PGP?

IDEA


Is pgp encryption safer than other encryptions?

"Evaluating cryptography is difficult since without 'breaking' the encryption its hard to say whether one encryption is better or not. Pretty Good Encryption (PGP) is asymmetric, that is the encryption and decryption keys are different which may give it an edge on symmetric encryption."