# Editing Pretty Good Privacy

**Warning:** You are not logged in.

The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision | Your text | ||

Line 1: | Line 1: | ||

− | + | '''Pretty Good Privacy (PGP)''' is currently one of the best ways to combat surveillance and eavesdropping in the digital world. | |

− | + | ||

− | '''Pretty Good Privacy (PGP)''' | + | |

− | + | ||

− | + | ||

− | + | ||

− | + | ||

== Motivation == | == Motivation == | ||

− | The internet without encryption is synonymous | + | The internet without encryption is synonymous to a crowd of people yelling at each other; a curious eavesdropper can easily walk up to the party in question and listen. It would simply be too dangerous to transmit obviously sensitive information over the internet, such as social security numbers or online banking passwords. You may try to encrypt those sensitive communications, but dedicated eavesdroppers can take the composite of the remainder of your internet communications to paint a detailed picture of your personality and habits. |

− | + | <blockquote>"My life's an open book," people might say. "I've got nothing to hide." But now the government has large dossiers of everyone's activities, interests, reading habits, finances, and health. What if the government leaks the information to the public? What if the government mistakenly determines that based on your pattern of activities, you're likely to engage in a criminal act? What if it denies you the right to fly? What if the government thinks your financial transactions look odd—even if you've done nothing wrong—and freezes your accounts? What if the government doesn't protect your information with adequate security, and an identity thief obtains it and uses it to defraud you? Even if you have nothing to hide, the government can cause you a lot of harm.</blockquote> | |

− | + | In the above passage from the book ''Nothing to Hide'', Daniel J. Solove extrapolates on what could happen if everybody simply accepted the notion that the benefits of government surveillance outweigh the disadvantages. In order to avoid that situation, you must value your privacy and try to encrypt all data that you thing falls under the category of "personal". | |

− | === | + | == Practice == |

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

− | + | ||

== Theory == | == Theory == | ||

− | |||

− | |||

− | |||

− | |||

'''Secret-key (symmetric) cryptography'''—Alice wants to send Bob a secret message. They both agree on a single secret password to use as an encryption/decryption key. Alice can use that key to encrypt data to send to Bob, and Bob can use that key to decrypt data received from Alice. Mathematically, a symmetric cipher is just a one-to-one function that is easily invertible—apply the function to encrypt data, or apply its inverse decrypt data. The key describes the characteristics of the function; without the key, one cannot determine the function or its inverse. | '''Secret-key (symmetric) cryptography'''—Alice wants to send Bob a secret message. They both agree on a single secret password to use as an encryption/decryption key. Alice can use that key to encrypt data to send to Bob, and Bob can use that key to decrypt data received from Alice. Mathematically, a symmetric cipher is just a one-to-one function that is easily invertible—apply the function to encrypt data, or apply its inverse decrypt data. The key describes the characteristics of the function; without the key, one cannot determine the function or its inverse. | ||

Line 87: | Line 48: | ||

* Only the public (decryption) key needs to be sent over the network, so an eavesdropper cannot simply steal the key by performing a man-in-the-middle attack. | * Only the public (decryption) key needs to be sent over the network, so an eavesdropper cannot simply steal the key by performing a man-in-the-middle attack. | ||

* Large groups of people can easily communicate because each person only needs to generate his or her own key pair. The number of key pairs in the network is linear with the number of people (2n). Alice never needed to negotiate with Bob to agree on a shared secret key—they each simply generated their own key pairs and grabbed each other's public key. | * Large groups of people can easily communicate because each person only needs to generate his or her own key pair. The number of key pairs in the network is linear with the number of people (2n). Alice never needed to negotiate with Bob to agree on a shared secret key—they each simply generated their own key pairs and grabbed each other's public key. | ||

− | |||

− | |||

− | |||

− | |||

== Links == | == Links == | ||

* [http://www.gnupg.org/gph/en/manual.html The GNU Privacy Handbook] | * [http://www.gnupg.org/gph/en/manual.html The GNU Privacy Handbook] | ||

− | |||

* [https://en.wikipedia.org/wiki/Symmetric-key_algorithm Symmetric-key algorithm – Wikipedia] | * [https://en.wikipedia.org/wiki/Symmetric-key_algorithm Symmetric-key algorithm – Wikipedia] | ||

* [https://en.wikipedia.org/wiki/Public-key_cryptography Public-key cryptography – Wikipedia] | * [https://en.wikipedia.org/wiki/Public-key_cryptography Public-key cryptography – Wikipedia] | ||

− | |||

− |