A fingerprint like C3A6 5E46 7B54 77DF 3C4C 9790 4D22 B3CA 5B32 FF66 can be printed on a business card. From a fingerprint, someone can validate the correct corresponding public key. Current versions of PGP encryption include options through an automated key management server.Ī public key fingerprint is a shorter version of a public key. The first version of this system was generally known as a web of trust to contrast with the X.509 system, which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Each public key is bound to a username or an e-mail address. PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography each step uses one of several supported algorithms.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |