Alt Text: PGP/GPG Encryption for Data Security
Title: The Imperative of PGP/GPG Encryption for Data Security in Transit and at Rest
Caption: Securing data with PGP and GPG encryption methods
Description: This paper explores the importance of PGP and GPG encryption for securing data in transit and at rest.
International Journal of Computer Techniques – Volume 7 Issue 1, February 2020
Tulasiram Yadavalli
Role: Senior Software Engineer, USA
Abstract
Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) encryption are critical tools for securing data both during transmission (in transit) and when stored (at rest). These encryption methods use advanced algorithms like RSA and AES to protect information from unauthorized access. PGP and GPG are known for their versatility. They can encrypt files, emails, and entire disks. They also rely on strong key management practices, using public and private key pairs to ensure data confidentiality. Despite their strength, there are challenges. Poor key management, compatibility issues, and the details of setup can affect their effectiveness. However, when implemented correctly, PGP and GPG provide reliable defense against many modern cyber threats.
Keywords
PGP, GPG, encryption, data security, AES, RSA, key management, data in transit, data at rest, cybersecurity.
References
- M. M. I. Kamarudin Shafinah, “File Security based on Pretty Good Privacy (PGP) Concept,” Computer and Information Science, vol. 4, no. 4, p. 10, 2011.
- P. Q. Nguyen, “Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3,” in Advances in Cryptology – EUROCRYPT 2004, France, 2004.
- S. Garfinkel, PGP: Pretty Good Privacy, USA: O’Reily & Associates Inc., 1995.
- R. McCollum, “A Pretty Good Paper about Pretty Good Privacy,” ERIC, USA, 1995.
- A. R. H. P. H. a. G. C. Ulrich, “Investigating the openpgp web of trust.,” in Computer Security–ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, 2011.
- C. Z. W. W. S Zhu, “A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256,” Entropy, vol. 20, no. 9, p. 716, 23 August 2018.
- S. Friedman, “PGP & Encrypted Communication,” in 29th Annual Criminal Law Conference, Ottawa, 2017.
- J. K. &. B. S. Kahil Jallad, “Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG,” in International Conference on Information Security, Maryland, 2002.
- N. H. Walfield, “An Advanced Introduction to GnuPG,” Code GmbH, USA, 2017.
- M. W. a. R. H. Jacek Jonczy, “A Probabilistic Trust Model for GnuPG,” University of Berne, Switzerland, 2006.
How to Cite
Independent Researcher, “The Imperative of PGP/GPG Encryption for Data Security in Transit and at Rest,” International Journal of Computer Techniques, Volume 7 Issue 1, February 2020 . ISSN 2394-2231.
Opportunities to Collaborate
We invite you to become part of our esteemed reviewer board or submit your research paper for publication.
Join Our Reviewer Board Submit Your Research Paper