The first version of this system was generally known as a web of trust to contrast with the X.509 system, which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Each public key is bound to a username or an e-mail address. PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography each step uses one of several supported algorithms.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |