Filter by Category

What is PGP and How Does It Work?

When our users send a file over the internet, there are just a few things that seem important at the time:

a) Is the file complete?

b) Is it being sent to the right place?

c) Will it arrive intact?

d) Is sensitive data protected and encrypted from unauthorized recipients?

That's where encryption comes in. By scrambling the data using one or more encryption algorithms, the sender of the file feels confident that the data is secure.

But what about the file's recipient? Will they be able to decode the scrambled file?

Encrypting and Decrypting Files with PGP

For years, PGP has been one of the most widely used technologies for encrypting and decrypting files. PGP stands for "Pretty Good Privacy." It was developed in the early 1990s by Phillip Zimmerman. Today, PGP is considered one of the safest cryptographic technologies for signing, encrypting, and decrypting texts, e-mails, files, directories, and even partitions for increased security.

How PGP Works

PGP encryption employs a serial combination of hashing, data compression, symmetric-key cryptography, and public key cryptography. Each step uses one of several supported algorithms. A resulting public key is bound to a user name or email address. Current versions of PGP employ both the original "Web of Trust" authentication method and the X.509 specification of a hierarchical "Certificate Authority" method to ensure that only the right people decode the encrypted files.

Growing Pains for PGP

PGP has gone through some significant growing pains, including a widely publicized criminal investigation by the U.S. Government. (Don't worry! The investigation was closed in 1996 after Zimmerman published the source code.)

One result of PGP's growing pains has been the fragmentation of PGP. Earlier versions of the technology sometimes can't decode the more recent versions deployed within various software applications. This versioning problem has been exacerbated as PGP's ownership switched from one company to another over the last 20 years.

And yet, because PGP is such a powerful tool for ensuring privacy in data transmission, its use continues to spread far more quickly than other commercially-owned encryption technologies.

Fragmentation and the Future of PGP

How has the industry managed the issue of PGP fragmentation? The answer is the Open PGP Alliance. In January 2001, Zimmermann started the Open PGP Alliance, establishing a working group of developers that are seeking the qualification of Open PGP as an Internet Engineering Task Force (IETF) Internet Standard.

By establishing Open PGP as an Internet standard, fragmentation of PGP technology can be largely charted and controlled. This means the encrypted file destined for your system uses a documented, standardized encryption technology that allows Open PGP to be appropriately decrypted. Today's standardization ensures privacy, promotes interoperability between different computing systems, and charts a clear path for securely interchanging data.

Open PGP and GoAnywhere MFT

Open PGP has reached the second stage in the IETF's four-step standards process and currently seeks draft standard status. (The standards document for Open PGP is RFC4880.)

HelpSystems uses Open PGP in its GoAnywhere Managed File Transfer solution. Just as importantly, HelpSystems is an active member of the Open PGP Alliance, contributing to the processes that will ensure Open PGP becomes a documented IETF Internet Standard. By being a member, we will make sure your investment in GoAnywhere MFT remains current, relevant, and productive.

For more information about Open PGP and the Open PGP Alliance, go to http://www.openpgp.org. To understand how Open PGP can help you secure your file transfers, check out our Managed File Transfer solution page.

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


Why You Should Never Use FTP to Transfer Cloud Files

March 7, 2019

The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading…


Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

March 4, 2019

Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown…


Five Secure File Transfer Alternatives to FTP

February 21, 2019

The Need for Secure File Transfer Protocols Back in the day, File Transfer Protocol (FTP) was the go-to protocol for sending files. It was a simpler time, and security was far less of an issue than…


Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

February 14, 2019

Free SFTP Software vs. Enterprise-Level SFTP Software In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items…


What is Secure File Transfer?

February 5, 2019

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size…