PGP: Pretty Good Privacy Free encryption Software

Here’s a clean, well-structured, and readable format of your text, with improved flow and corrected typos—without changing the original meaning.

PGP (Pretty Good Privacy)

PGP, originally from Phil Zimmermann’s Pretty Good Software, is a high-security cryptographic software application available on a wide range of platforms, including:

  • Amiga
  • Atari
  • BeOS
  • EPOC (Psion, etc.)
  • MacOS
  • MS-DOS
  • Newton
  • OS/2
  • PalmOS
  • Unix
  • Windows 3.x, 95/98/NT, ME, 2000
  • And other computer systems

PGP allows people to exchange files or messages with privacy, authentication, and convenience.

Key Benefits of PGP

  • Privacy
    Only the intended recipient can read the message.
  • Authentication
    Messages that appear to be from a particular person can only have originated from that person.
  • Convenience
    Privacy and authentication are provided without the hassles of managing keys associated with conventional cryptographic software.

Unlike traditional cryptographic systems, no secure channels are required to exchange keys, making PGP significantly easier to use. This is possible because PGP is based on a powerful technology called public key cryptography.

How Public Key Cryptography Works

In a public key cryptosystem, every user has two complementary keys:

  • Public Key – Freely shared with others
  • Secret (Private) Key – Kept confidential

Each key unlocks what the other key encrypts.

Key Principles

  • Knowing the public key does not allow anyone to deduce the secret key.
  • The public key can be widely distributed across a communications network.
  • Anyone can encrypt a message using the recipient’s public key.
  • Only the recipient can decrypt the message using their private key.
  • Not even the sender can decrypt the message once it has been encrypted.

Message Authentication & Digital Signatures

PGP also provides message authentication:

  • The sender encrypts the message using their own secret key, creating a digital signature.
  • Anyone can verify the signature using the sender’s public key.
  • This proves:
    • The sender is the true originator of the message
    • The message has not been altered in transit

Only the sender possesses the secret key capable of creating that signature.

Phil Zimmermann & PGP’s Future

Phil Zimmermann, who released PGP free to the public 10 years ago, had a falling out with Network Associates, which acquired PGP in 1997.

Zimmermann has since moved on to Dublin-based HushMail, where he serves as Chief Cryptologist. With Phil on board, we strongly recommend that you take a serious look at HushMail.

Zimmermann has publicly stated that PGP 7.0.3, the last version released under his direct oversight, contains no back doors. He has also implied that future versions released after his departure could potentially include back doors without public knowledge.

Recommendation

We therefore strongly suggest that you download PGP 7.0.3 now, before any possible back doors could be introduced in future releases.

Downloading PGP

When downloading PGP, select either the International or U.S. version:

  • Both versions use full-strength, unencumbered 128-bit encryption
  • Both are fully interoperable with one another
  • Some U.S. versions may lack certain features found in International versions (e.g., support for legacy RSA keys)

You may download:

  • The FREE U.S. versions, or
  • The International versions

Remember: Early protection provides the best solution for the future.