The topics covered in the attachments are:
1. Pretty Good Privacy
2.1Operational Description of PGP-1
2.2Operational Description of PGP-2
3.Cryptographic Keys and Key Rings
4..Format of PGP Message (from A to B)
5.Key Rings
6.Public-Key Management
2.2Operational Description of PGP-2
3.Cryptographic Keys and Key Rings
4..Format of PGP Message (from A to B)
5.Key Rings
6.Public-Key Management
No comments:
Post a Comment