Statements (57)
Predicate | Object |
---|---|
gptkbp:instanceOf |
encryption standard
|
gptkbp:basedOn |
gptkb:IDEA_algorithm
RSA_algorithm |
gptkbp:developedBy |
gptkb:Phil_Zimmermann
|
gptkbp:firstPublished |
1991
|
gptkbp:has |
community support
user-friendly interfaces key management features various implementations a web of trust model |
https://www.w3.org/2000/01/rdf-schema#label |
PGP
|
gptkbp:isAvailableIn |
multiple platforms
|
gptkbp:isCompatibleWith |
OpenPGP standard
|
gptkbp:isConsidered |
a standard for email security
|
gptkbp:isCriticizedFor |
complexity
usability issues key management challenges |
gptkbp:isInfluencedBy |
the development of modern encryption methods
|
gptkbp:isNotableFor |
its role in privacy protection
|
gptkbp:isPartOf |
email clients
cybersecurity practices digital rights management secure communication protocols file encryption tools open-source software community digital communication standards |
gptkbp:isPromotedBy |
privacy organizations
|
gptkbp:isRelatedTo |
cryptography
data security information security privacy technology |
gptkbp:isSubjectTo |
legal regulations
|
gptkbp:isSupportedBy |
gptkb:Microsoft_Outlook
gptkb:Mozilla_Thunderbird Symantec various software applications GnuPG |
gptkbp:isUsedBy |
government agencies
journalists activists whistleblowers corporate entities privacy advocates |
gptkbp:isUsedFor |
data integrity
authentication secure communications |
gptkbp:isUsedIn |
secure messaging
secure file sharing |
gptkbp:isVulnerableTo |
man-in-the-middle attacks
social engineering attacks key compromise |
gptkbp:provides |
data encryption
digital signatures |
gptkbp:supports |
file encryption
email encryption |
gptkbp:uses |
hash functions
public key cryptography |