PGP Newbie
2004-10-15 08:57:13 UTC
have been re-introduced to e-mail encryption via PGP. I haven't used it since about 1991 or so
when I had an old IBM-XT (I think it was PGP v2.6 that I had then) so I am catching up on its use
and effectiveness.
My question is, which of the five algorithms offered is the "strongest" one to use for signing and
encrypting? I've been reading the manual but it doesn't really clarify that matter. Any opinions?
Key size doesn't matter, the computer is fast.
The reason why i'm getting back into e-mail encryption..?? Two reasons:
First, it's kinda neat. I dabbled in encrytion back in the mid-1980's with an Apple ][e. We used
to experiment and share encrypted messages with a few other crypto buffs that were online during
those 300 baud BBS days. The program we used was based on the same type of operation as the
historical Enigma machine (anyone remember the name of the software..??). It was neat and majorly
pi$$ed off the SysOps of the BBS's we were on. Its use got us kicked off several of them as we
deprived a SysOps favourite passtime of reading other peoples e-mail. (evil laughter).
Second, I just discovered that passtime is still alive and well it seems. We have to use the
internal e-mail client at the school I am attending, and in a round-about way I heard that
occasionally for entertainment purposes, private e-mail is read, also supposedly there is a law
requiring schools and businesses to store e-mail history for x-amount of time (haven't determined
that yet.. seems to be 6 months to 7 years?). So it's all the more reason to establish some level
of privacy, right?
Thanks for any suggestions!
when I had an old IBM-XT (I think it was PGP v2.6 that I had then) so I am catching up on its use
and effectiveness.
My question is, which of the five algorithms offered is the "strongest" one to use for signing and
encrypting? I've been reading the manual but it doesn't really clarify that matter. Any opinions?
Key size doesn't matter, the computer is fast.
The reason why i'm getting back into e-mail encryption..?? Two reasons:
First, it's kinda neat. I dabbled in encrytion back in the mid-1980's with an Apple ][e. We used
to experiment and share encrypted messages with a few other crypto buffs that were online during
those 300 baud BBS days. The program we used was based on the same type of operation as the
historical Enigma machine (anyone remember the name of the software..??). It was neat and majorly
pi$$ed off the SysOps of the BBS's we were on. Its use got us kicked off several of them as we
deprived a SysOps favourite passtime of reading other peoples e-mail. (evil laughter).
Second, I just discovered that passtime is still alive and well it seems. We have to use the
internal e-mail client at the school I am attending, and in a round-about way I heard that
occasionally for entertainment purposes, private e-mail is read, also supposedly there is a law
requiring schools and businesses to store e-mail history for x-amount of time (haven't determined
that yet.. seems to be 6 months to 7 years?). So it's all the more reason to establish some level
of privacy, right?
Thanks for any suggestions!