Abstract: The purpose of this paper is not to act as a manual for PGP, nor is it an in-depth analysis of its cryptographic algorithms. It is intended to provide additional information about PGP’s algorithms used for encryption and hashing.
PGP Signature: PGP.pdf.sig
References: The links in the .pdf file are not clickable, so they are listed here for your convenience.
[Adams] Adams, Carlisle. The CAST-128 Encryption Algorithm. http://finecrypt.tripod.com/cast.html.
[Anon] Anonymous. The IDEA Algorithm. http://www.momentus.com.br/PGP/doc/idea.html.
[Belldandy] “Don”. Belldandy: SHA-1 calculator. http://18.104.22.168/~omoikane/belldandy_zip.html.
[RSAFAQ] RSA Laboratories Cryptography FAQ. http://www.rsasecurity.com/rsalabs/faq/.
[Savard] Savard, John J. G. A Cryptographic Compendium. http://home.ecn.ab.ca/~jsavard/crypto/jscrypt.htm.
[Simpson1] Simpson, Sam. PGP DH vs. RSA FAQ. 1999. http://www.scramdisk.clara.net/pgpfaq.html.
[Simpson2] Simpson, Sam. A question on Twofish / AES / PGP, PGP-Users mailing list. 8th Mar 1999. http://cert.uni-stuttgart.de/archive/ietf-openpgp/1999/03/msg00012.html.
[SKWWHF98] Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N. Twofish: A 128-bit Block Cipher. 1998. http://www.counterpane.com/twofish-paper.html.
[Source] Source code. http://www.pgpi.org/cgi/download.cgi?filename=pgpsrc658win32.zip.
This page maintained by David
Back to David Yaw's homepage
Last update: 11/6/2001