Difference between PGP and GPG


Answer #: 1

PGP can refer to two things:

The Pretty Good Privacy software originally written by Phil Zimmermann, and now owned by Symantec. The formats for keys, encrypted messages and message signatures defined by that software. These have now been formalised as the OpenPGP standard.

The GPG software is an independent implementation of the OpenPGP standards, so you can use it to exchange encrypted messages with people using other OpenPGP implementations (e.g. Symantec’s PGP).

Due to its popularity on Linux systems, it is also fairly common for people to incorrectly use the term “GPG” to refer to the whole OpenPGP cryptography system (e.g. “GPG keys” or “GPG signatures”). It is usually pretty clear what they mean from the context though.

Answer #: 2

“PGP” stands for “Pretty Good Privacy.” It was developed by Phil Zimmermann. At first it was written as copyrighted freeware under the Gnu Public License. Later, PGP was upgraded...

0 0

I have some questions. What are differences between terms: gnupg, gpg, pgp, gpg4win, openpgp? Is that algorithm, encryption software or what? What are differences between them? What of that terms are algorithms, and what is software? And with what of these terms we can encrypt files or software?

Other Tips. I'm creating kiosks for public use and I'm trying to make them as tamper proof as possible. Many have keyboards attached so I'm trying to disable alt-tab to stop them switching out of my locked down environment, how can I do this? Also, is there a way I can disable the unity bars up the left and top? Or the gnome bars across the top and bottom? They make it very easy for the user to break out of the locked down environment. Thank you. It does not sound like you want to use a full-blown Ubuntu with the Unity desktop environment for this. Generally speaking, there are many window managers that allow more precise control of input. In case you are new to Linux and...

0 0

Other posts in this thread:

Yes, they are same. GPG is used for 'GNU Privacy Guard', a free PGP software.

Quote GPG, or GNU Privacy Guard, offers a free alternative to the now-commercial PGP. GPG is an implementation of the OpenPGP standard, and as such is quite similar to PGP, with the biggest difference being that it is openly available and supported strictly by donations. Like PGP, GPG lets users encrypt and sign data and emails. It works as a command line tool, and as such is easy to integrate ...

Quote from: Xialla on May 31, 2015, 05:04:01 PM Quote GPG, or GNU Privacy Guard, offers a free alternative to the now-commercial PGP. GPG is an implementation of the OpenPGP standard, and as such is quite similar to PGP, with the biggest difference being that it is openly available and supported strictly by donations. Like PGP, GPG lets users encrypt and sign data and emails. It works as a...

0 0
0 0

I use Kubuntu and have gpg installed as a default program.

First point. What is the difference between pgp and gpg?

I have downloaded a programme from a website and the page talks of using keys to validate the program.

Second point. Am I correct in assuming that the key must be imported into gpg before a validation can take place. Can validations be done ‘on the fly’?

I am wondering how validations can help.

Is it not possible to put a programme on a website, and place a key there that will fit, and the user (downloader) will note consistency on analysis. As for downloading keys, could someone not upload a key to a server that will show consistence on using gpg when the program itself may be problematic?

Point three. Should keys be used that are published a website, or only those available via servers?

No doubt, I will be back


Ps. Is there a good forum for gpg discussions

0 0

On 10/17/06, Conan Purves

[hidden email]

> wrote:

> Theoretically speaking, what is the difference between PGP and GPG? Is

> it just a different management tool handling the same encryption

> algorithm or is there some further translation between the two? Why

> does my Enigmail menu on Thunderbird say OpenPGP, but it is using the

> GnuGPG engine?

GnuPG, as well as recent versions of the commercial PGP-branded
products from PGP Corporation, implement the OpenPGP standard. They
are in almost all cases able to read each other's data, and
decrypt-verify that data.

We use both implementations at my company. I have tested sending
signed and encrypted email from a PGP desktop user to a GPG4Win user,
and vice-versa, and was able to verify at least plain-text messages,
as well as .sigs on attachments.

One small difficulty arises in that GnuPG tends to use.gpg as its main
file extension...

0 0

Applies to:

PGP Encryption/Decryption modules used in SAP Netweaver PI based Standard and Partner Adapters


The following sections briefly describe the steps to create PGP key pairs using open source tool gpg4win and converting them in to ASCII Armored format.


Sivasubramaniam Arunachalam

Company: SAP Labs
Created on: 11-Jan-2012
Author(s) Bio
Sivasubramaniam Arunachalam is a senior developer at SAP Labs (Technology Innovation Platform). He is currently occupied with PI 7.31 development/maintenace activities. Since Sivasubramaniam joined SAP Labs in July 2010, he has developed new features in several adapters/areas including File, JDBC, IDoc, SOAP/XI, HTTP, JPR, B2B(RNIF 1.1/2.0, CIDX & PIDX) Adapters, XML Validation and Mapping Runtime. Currently, he is the component responsible for File, JDBC, B2B Adapters and XML Validation and takes care of all new development, enhancement and maintenance...

0 0
MFPA wrote: > Could somebody explain the difference between pgp and pgp for me Both address a common communication standard - openpgp - but are different implimentations of the same protocol, so you can occasionally get compatability issues (thankfully, going away as patents on things like RSA expire) Early pgp was command line just like gpg is now, and used RSA and IDEA exclusively. Later pgps added DH support, and used CAST as the preferred symmetric element gpg entered the arena after the defacto pgp format was made a rfc "open" standard; much of openpgp relies on the "optional" components of RSA and IDEA for backwards compatability though, so typically gpg in its default "openpgp compatable" mode and pgp 5.0 and up can interoperate well, but old command line 2.x pgp (or anyone who uses a key compatable with it) requires the additional IDEA module installing in gpg. gpg however also has an enhanced "bis" mode which adds additional features that nothing before 7.0.4 of pgp could...
0 0

When working with encryption in Linux, it's common to see the terms PGP and GPG used interchangeably. Here we will clarify the difference, and why for all intents and purposes, it makes no difference from a user's perspective.

PGP (Pretty Good Privacy)

PGP stands for Pretty Good Privacy, and was developed by Phil Zimmermann. It's been turned into a proprietary program that was acquired by Symantec. However, the command line version is not owned, and not for sale.


The formats for keys, encrypted messages and message signatures defined by PGP were formalised as the OpenPGP standard, which is where GPG comes in.

GPG (GNU Privacy Guard)

The GPG software is an independently written program that adheres to the OpenPGP standards. Many consider this an "upgrade". It uses the AES algorithm instead of the IDEA algorithm that PGP uses. AES is not patented and royalty free, unlike the IDEA algorithm. It is also considered more secure. GPG...

0 0

Once you're using PGP, you may want be able to sign email from more than location, or you may switch computers. There's a few ways to accomplish this.

Copy All GnuPG Data

Your first choice is to copy all of your GnuPG data. This is a lot more data than just your key, but is still likely to be under 5MB. This method will copy all of your keys, everyone's key you have, and your entire trust database. It's ideal for backup, or for moving to a new computer. Simply copy all the contents of your GnuPG data directory, which would be as follows:

Windows: C:/Documents and Settings/username/application Data/GnuPG Unix/Linux/Mac: ~/.gnupg

Where username is your windows username. Just simply copy the entire contents of that directory from one machine to the other and you will be set. There are many ways to move this data, which I won't cover. Some examples might be zipping the data up and copying it to a disk.

This will also work between different operating...

0 0


“PGP” and “GPG” stand for “Pretty Good Privacy” and “Gnu Privacy Guard.” These are two different computer programs developed to protect electronic communications. Today almost everyone uses emails for correspondence and communication, but this medium is not as secure as we think it is. The emails can easily be forged by someone using anybody’s name or identity, and the emails can easily be stored and read by people with special skills. To solve these existing problems and improving the security of emails as well as making them more private, these two programs were developed and used. The privacy of emails is maintained by these programs because they allow encryption of messages by people, and only the people who are authorized can read the encrypted messages; secondly, they are difficult to forge.

For these programs to run properly, the computer used should be secure. If the computers are easily infected with viruses or attacked by spyware programs which...

0 0

“PGP” stands for “Pretty Good Privacy.” It was developed by Phil Zimmermann. At first it was written as copyrighted freeware under the Gnu Public License. Later, PGP was upgraded and made into a propriety program. The rights for this program are traded around. The reason for this upgrade was legal defense costs and royalty issues related to the export laws of the USA. Now the PGP program is owned by PGP Corporation.

Only the command line version is not owned by PGP Corporation which is also not for sale. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished

“GPG” stands for “Gnu Privacy Guard.” GPG is a re-write or upgrade of PGP. It does not use the IDEA encryption algorithm. This is to make it completely free. It uses the NIST AES, Advanced Encryption Standard. All the algorithm data is stored and documented publicly by OpenPGP Alliance. The main reason for this change is that AES costs...

0 0

Pretty Good Privacy encryption is used to encrypt and decrypt email, and authenticate messages with digital signatures. It can also be used to encrypt stored files. For years, PGP was the de facto standard for email security, and it is still widely used by both individuals and corporations. Although it was originally available as freeware, it was acquired in 2010 by Symantec, which offers a low-cost commercial version.

Keys and Keyrings

PGP -- and all of its open source variations -- is based on a public/private key model. A key, essentially a long string of characters, is used to encrypt clear text. In this model, the public key is used to encrypt data, and can be used by any sender. The private key, which is possessed only by the owner, is used to decrypt it. In this way, it is easier to send an encrypted message to anyone else using PGP. The public and private keys are stored in separate hard drive files called keyrings. As users start to communicate with...

0 0

When dealing with cryptography and encryption algorithms, there are two names that will appear in every once in a while. These are DSA and RSA. Both of these are encryption systems that are in common use when encrypting content. Both of them give good results and can be employed at will. However, if there is need of their specific abilities, some differences are noted. A thorough comparison of the two is discussed below.

The DSA commonly refers to the Digital Signature Algorithm. The RSA on the other hand refers to the initials of the people who created it. These are Ron Rivest, Adi Shamir, and Leonard Adleman. The DSA was designed as an encryption algorithm. The DSA was developed by the NSA to be used by the US government as a standard for digital signatures. This signature borrows heavily from the ElGamal Signature Algorithm from which most ideas were borrowed from. RSA, on the other hand, looks at the difficulty of factoring numbers as the main aspect of its...

0 0

Encryption vs Hashing

Encryption is the process of converting a plain text (that is some useful information) using an algorithm into a text that can be read by someone who has the key to unlock this information. The algorithm used is called a cipher, and to unlock the data you need to have a key. One of the simplest encryption processes is the Caesar Shift that employs a simple key. RSA is the most popular encryption method. This method makes use of a public/private key encryption that enables the exchanging of information between the sender and the receiver. Only the person with the correct public/private key can decrypt this message. Encryption is a two-way process. Information that is encrypted at the sender’s end is decrypted at the receiver’s end.

Hashing is another cryptographic method that converts information into a message that has no key to unlock it. In fact, the message is irreversible, and you cannot get the original information back. Thus it’s a...

0 0

RSA is an algorithm (actually, two algorithms: one for asymmetric encryption, and one for digital signatures -- with several variants). PGP is originally a piece of software, now a standard protocol, usually known as OpenPGP. OpenPGP defines formats for data elements which support secure messaging, with encryption and signatures, and various related operations such as key distribution. As a protocol, OpenPGP relies on a wide range of cryptographic algorithms, which it assembles together (which is not as easy as it seems, if you want the result to be secure). Among the algorithms that OpenPGP can use is RSA.

So, to keep with the car analogy, your question is like: "What is the difference between a combustion engine and a Honda Accord ? Why would one choose one over the other ?" The question makes no sense per se: the Accord comes with a combustion engine under its lid. It also comes with a bunch of other useful features, such as wheels; you cannot do much with a combustion...

0 0