Where to find out more:
Bruce Schneier, “Applied Cryptography”, 2nd Ed.
“Pretty Good Privacy” system uses public-key cryptography
Widely available: linux, exmh, EUDORA,…
Look on-line for details, source code, etc.
Even if you don’t use it, try it!
Previous slide
Back to first slide
View graphic version