OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

DB0FHN

[JN59NK Nuernberg]

 Login: GUEST





  
VK2AAB > PGP      10.11.04 15:34l 28 Lines 1171 Bytes #-7126 (0) @ WW
BID : 33588_VKB
Read: DG8NGN GUEST DG4IAD DO1SEU DL7NDR
Subj: Re: How do you use it ?
Path: DB0FHN<DB0RGB<OK0PPL<DB0RES<ON0AR<7M3TJZ<JE7YGF<JN1ZPJ<VK7AX<VK4TX<
      VK4DGQ<VK4TRS<VK6HGR<ZL2TZE<VK5UJ<VK5BRC<VK5ATB<VK2AAB
Sent: 041110/0528Z @:VK2AAB.SYD.NSW.AUS.OC #:33588 [SYDNEY] FBB7 $:33588_VK2AAB
From: VK2AAB@VK2AAB.SYD.NSW.AUS.OC
To  : PGP@WW

I had a play around with it some years ago.
It is quite legal here to use as a guarentee of signature and message content.
I remember was a real controversy about it on packet.

I really can't see why the PGP  signature was banned in the UK because  all it
does is guarentee the signature and message contents which were in plain tex!

Our WICEN emergency network used it for  some tests in case we had to transmit
casualty lists etc. Another possible  use was the transmission of  information
the emergency management people might want to keep a lid on.

If I remember correctly I had a BAT file read the message ran PGP and produced
the encrypted message for transmission. It all worked flawlessly.

You have two keys, a private key and a public key. If you want to exchange and
encrpyted message you first exchange the public keys with the other station.
Generate the encrpyted message with both his public and your private key.
Send the message and he decrypts it with your public key and his private key.

The  keys  can  be  1024  bits long  so  for  all  practical  purposes  it  is
unbreakable.

73 Barry VK2AAB



Read previous mail | Read next mail


 18.05.2024 16:05:34lGo back Go up