did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781593270711

PGP & GPG

by
  • ISBN13:

    9781593270711

  • ISBN10:

    1593270712

  • Format: Paperback
  • Copyright: 2006-03-01
  • Publisher: No Starch Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $24.95

Summary

PGP & GPG is an easy-to read, informal tutorial for implementing electronic privacy on the cheap using the standard tools of the email privacy field - commercial PGP and non-commercial GnuPG (GPG). The book shows how to integrate these OpenPGP implementations into the most common email clients and how to use PGP and GPG in daily email correspondence to both send and receive encrypted email. The PGP & GPG book is written for the moderately skilled computer user who is unfamiliar with public key cryptography but who is nevertheless interested in guarding their email privacy. Lucas's trademark informal and relaxed tone makes public key cryptography as simple and clear as possible, so that any reasonably savvy computer user can understand it.

Author Biography

Author Bio Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press).

Author Bio Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press). Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press).

Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press).

Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press).

Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press).

Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, and Cisco Routers for the Desperate (all No Starch Press).

Table of Contents

ACKNOWLEDGMENTS xv
INTRODUCTION 1(136)
The Story of PGP
2(4)
OpenPGP
4(1)
How Secure Is OpenPGP?
5(1)
Today's PGP Corporation
6(1)
What Is GnuPG?
7(1)
PGP Versus GnuPG
7(3)
Ease of Use
7(1)
Support
8(1)
Transparency
9(1)
Algorithm Support
9(1)
OpenPGP and the Law
10(1)
What This Book Contains
10(1)
Stop Wasting My Precious Time. What Do I Need to Read?
11(2)
1 CRYPTOGRAPHY KINDERGARTEN
13(14)
What OpenPGP Can Do
13(1)
Terminology
14(3)
Plaintext and Ciphertext
15(1)
Codes
15(1)
Ciphers
16(1)
Hashes
16(1)
Cryptanalysis
17(1)
Goals of PGP's Cryptography
17(2)
Confidentiality
17(1)
Integrity
17(1)
Nonrepudiation
18(1)
Authenticity
18(1)
Encryption Algorithms
19(3)
Symmetric Algorithms
20(1)
Asymmetric Algorithms
21(1)
Public-Key Encryption
22(1)
Digital Signatures
22(1)
Combining Signatures and Asymmetric Cryptography
23(1)
Passphrases and Private Keys
24(3)
Choosing a Passphrase
25(2)
2 UNDERSTANDING OPENPGP
27(12)
Security and OpenPGP
28(1)
Web of Trust
29(1)
Trust in OpenPGP
30(1)
Where to Install
31(1)
Your Keypair
32(3)
Key Length
32(1)
Key Expiration Date
33(1)
Name, Email, and Comment
34(1)
Revocation Certificates
35(1)
Storing Your Keypair
35(1)
Storing Your Revocation Certificate
36(1)
Photo IDs and OpenPGP Keys
36(1)
Key Distribution
36(3)
Keyservers
37(2)
3 INSTALLING PGP
39(14)
Downloading PGP
40(1)
Installing PGP
40(5)
Key Type
42(1)
Key Size
42(1)
Expiration
42(1)
Ciphers
42(1)
Hashes
43(2)
PGP Key Backups
45(1)
Important Installation Locations
46(1)
Revocation Certificates and PGP
46(5)
Disabling Keyserver Updates
47(1)
Revoke the Key
48(1)
Re-import Your Private Key
49(1)
Key Properties
50(1)
Using the Revocation Certificate
51(1)
Keyservers and PGP
51(2)
4 INSTALLING GNUPG
53(28)
Downloading GnuPG
54(1)
Checking Checksums
54(2)
Calculating Checksums Under Windows
55(1)
Calculating Checksums Under Unix
55(1)
GnuPG Home Directory
56(1)
gpg.conf
57(1)
Installing GnuPG on Windows
57(3)
Command-Line GnuPG Win32 Installation
58(2)
Graphical GnuPG Installation
60(7)
WinPT
60(3)
Creating Keypairs in WinPT
63(2)
Key Manager
65(1)
WinPT Revocation Certificate
65(1)
Sending Your Key to a Keyserver
66(1)
Installing GnuPG on Unix-like Systems
67(2)
Randomness and GnuPG
67(2)
Building from Source Code
69(3)
Installing GnuPG
69(1)
Configuration Options
70(1)
Setuid Root GnuPG
71(1)
Don't Run GnuPG as Root
72(1)
Command-Line GnuPG Keypairs
72(4)
GnuPG Revocation Certificates
76(2)
Publicizing Your Key
78(3)
Text Exports
78(1)
Keyservers
79(1)
Web Forms
80(1)
5 THE WEB OF TRUST
81(10)
Keyservers
82(1)
subkeys.pgp.net
82(1)
keyserver.pgp.com
82(1)
Searching for Keys
83(1)
Signing a Key
83(5)
Signing Keys of Friends and Family
84(1)
Signing Strangers' Keys
85(2)
What to Do with Signed Keys
87(1)
When You Get New Signatures
87(1)
Keysigning Parties
88(1)
Key Trust
89(1)
Avoiding the Web of Trust
90(1)
6 PGP KEY MANAGEMENT
91(8)
Adding Keyservers
91(2)
Adding Keys to Your Keyring
93(4)
Searching Keyservers
93(1)
Importing from a File
94(1)
Fingerprint Comparisons
95(2)
Returning the Signed Key
97(1)
Viewing Signatures
97(1)
Updating Signatures
97(1)
Adding Photos to Your Keys
98(1)
7 MANAGING GNUPG KEYS
99(16)
Keyservers
99(2)
Keyserver Options
100(1)
Keyservers and WinPT
101(1)
Adding Keys to Your Keyring
101(4)
Command-Line Key Fetching
102(1)
Command-Line Key Viewing
102(2)
WinPT Key Viewing and Fetching
104(1)
Command-Line Key Imports
104(1)
WinPT File Imports
104(1)
Signing a Key
105(4)
Checking Fingerprints
105(1)
Signing Keys on the Command Line
105(1)
Signing Keys in WinPT
106(1)
Viewing Key Signatures
107(1)
Command-Line Exports
107(1)
WinPT Exports
108(1)
Importing New Signatures
108(1)
Pushing Signatures to Keyservers
108(1)
Updating Keys
109(1)
Deleting Public Keys from Your Keyring
109(1)
GnuPG and Photos
110(3)
Adding Photos to Your Key
110(1)
Viewing Photos with GnuPG
111(1)
WinPT and Photographs
112(1)
Building the Web of Trust with GnuPG
113(2)
PGP
113(1)
GnuPG
113(1)
Command-Line Trust Configuration
113(1)
WinPT Trust Configuration
114(1)
8 OPENPGP AND EMAIL
115(10)
Message Encoding
16(102)
Inline Encoding
116(2)
PGP/MIME
118(1)
Email Client Integration
118(1)
Proxies
119(1)
Plug-Ins
119(1)
Saving Email—Encrypted or Not?
119(1)
Saving Unencrypted Email
120(1)
Encrypt to Self
120(1)
Email from Beyond Your Web of Trust
120(2)
Expanding Your Web of Trust
121(1)
Tracing the Web of Trust
121(1)
Repeatable Anonymity
122(2)
Unprotected Email Components
124(1)
9 PGP AND EMAIL
125(12)
PGP and Your Email Client
126(1)
Identifying OpenPGP Mail
126(1)
Email Storage
127(1)
PGP Policies
127(11)
Opportunistic Encryption
128(1)
Require Encryption
128(1)
Mailing List Submissions
129(1)
Mailing List Admin Requests
129(1)
Creating Custom Policies
130(2)
Sample Custom Policy: Exceptions to Default Policy
132(2)
Sample Custom Policy: Overriding the Defaults
134(1)
Custom Policies Order and Disabling Policies
134(3)
10 GNUPG AND EMAIL 137(18)
Microsoft Mail Clients and GnuPG
138(1)
Outlook Express and GnuPG
138(3)
Configuring Outlook Express for OpenPGP
139(1)
Sending OpenPGP Mail
140(1)
Receiving and Verifying Signed and Encrypted Mail
141(1)
Outlook and GnuPG
141(4)
Installation
142(1)
Configuring the Plug-In
142(3)
Sending OpenPGP Mail
145(1)
Receiving OpenPGP Mail
145(1)
Decrypting PGP/MIME Messages with Microsoft Mail Clients
145(2)
Thunderbird and GnuPG
147(9)
Installing the Thunderbird GnuPG Plug-In
147(1)
Configuring Enigmail
147(2)
Sending OpenPGP Mail
149(2)
Reading OpenPGP Mail
151(1)
Upgrading Thunderbird and Enigmail
152(3)
11 OTHER OPENPGP CONSIDERATIONS 155(12)
What Can Go Wrong?
156(5)
Poor Usage
156(1)
Poor Signing
156(1)
Hardware Compromise
157(1)
Software Compromise
158(1)
People Compromise
159(2)
Fake Keys
161(1)
OpenPGP Interoperability
161(1)
Teams and OpenPGP
162(1)
OpenPGP and Shared Systems
163(1)
Other Software Features
164(4)
Passphrase Caching
164(1)
Shredding
165(2)
A INTRODUCTION TO POP COMMAND LINE 167(10)
PGP Command Line Configuration
168(1)
Testing and Licensing
169(1)
Creating a Keypair
170(2)
Setting the Key Type
170(1)
Assigning a Passphrase
170(1)
Setting an Expiration Date
170(1)
Generating Revocation Certificates
171(1)
Exporting Your Public Key
171(1)
Viewing Keys
172(1)
Managing PGP Command Line Keyrings
173(2)
Searching for Keys
173(1)
Importing Keys
174(1)
Signing a Key
174(1)
Updating Keys on a Keyserver
175(1)
Encryption and Decryption
175(3)
Signing and Verifying
176(1)
B GNUFG COMMAND LINE SUMMARY 177(6)
GnuPG Configuration
178(1)
Output Control
178(1)
Keypair Creation, Revocation, and Exports
178(1)
Revoking a Key
178(1)
Exporting a Key
179(1)
Sending a Key to a Keyserver
179(1)
Managing Keyrings
179(1)
Viewing Keys
179(1)
Adding and Removing Keys
180(1)
Key Signatures
180(1)
Encryption and Decryption
181(1)
Signing Files
181(1)
Output Formats
181(2)
INDEX 183

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program