Statements (92)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
gptkb:security |
gptkbp:available_on |
gptkb:open-source_software
commercial software |
gptkbp:can |
documents
|
gptkbp:can_be_used_with |
symmetric key algorithms
|
gptkbp:can_decrypt |
files
|
gptkbp:developed_by |
gptkb:Phil_Zimmermann
|
gptkbp:first_released |
gptkb:1991
|
gptkbp:has |
graphical user interfaces
a graphical user interface key management features a user community a command line interface various implementations a web of trust model a key size of up to 4096 bits a legacy in digital privacy advocacy a user-friendly interface in some versions |
https://www.w3.org/2000/01/rdf-schema#label |
PGP
|
gptkbp:investigates |
signatures
|
gptkbp:is |
a proprietary technology
a government standard |
gptkbp:is_adopted_by |
corporations
government agencies individual users |
gptkbp:is_available_in |
multiple languages
|
gptkbp:is_available_on |
gptkb:multiple_platforms
|
gptkbp:is_based_on |
gptkb:IDEA_algorithm
RSA algorithm |
gptkbp:is_compatible_with |
gptkb:Gnu_PG
gptkb:Symantec_Encryption_Desktop gptkb:Open_PGP_standard gptkb:S/_MIME |
gptkbp:is_considered |
a standard for email security
a pioneer in encryption technology a standard for email encryption a tool for whistleblowers a pioneer in email encryption |
gptkbp:is_implemented_in |
various software applications
|
gptkbp:is_influenced_by |
the rise of the internet
the need for secure communication |
gptkbp:is_influential_in |
the field of information security
|
gptkbp:is_notable_for |
its strong encryption
|
gptkbp:is_often_used_in |
cybersecurity
|
gptkbp:is_part_of |
gptkb:Open_PGP_standard
digital communication tools cybersecurity practices digital communication protocols data protection strategies the fight for digital privacy |
gptkbp:is_related_to |
gptkb:crypt
data integrity authentication data confidentiality data privacy identity verification information security digital rights |
gptkbp:is_subject_to |
legal regulations
export restrictions legal scrutiny debate over privacy debate over security |
gptkbp:is_supported_by |
various email clients
various operating systems |
gptkbp:is_used_by |
gptkb:activists
gptkb:Journalist businesses privacy advocates |
gptkbp:is_used_for |
data integrity
secure communication secure online transactions secure messaging secure file sharing file integrity verification |
gptkbp:is_used_in |
VPN services
secure messaging secure file sharing secure cloud storage secure backups secure software development |
gptkbp:provides |
data encryption
digital signatures |
gptkbp:security |
files
emails |
gptkbp:supports |
file encryption
email encryption |
gptkbp:uses |
gptkb:crypt
|
gptkbp:bfsParent |
gptkb:crypt
gptkb:Rivest–_Shamir–_Adleman_(RSA)_algorithm |
gptkbp:bfsLayer |
4
|