Computer Science ›› 2008, Vol. 35 ›› Issue (3): 46-48.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: This paper, from the algorithm of IDEA, RSA, MD5 ,analyzes the achievable therory and flow of PGP. The secure business which is provided by PGP is also descibed in the essay. It also researchs on the secure capability of PGP according to many aspects of s

Key words: Secure E-mail, PGP, IDEA, RSA, MD5

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!