MIME-Version: 1.0 Server: CERN/3.0 Date: Monday, 06-Jan-97 22:52:13 GMT Content-Type: text/html Content-Length: 5567 Last-Modified: Monday, 28-Oct-96 02:58:50 GMT
This is my PGP (Pretty Good Privacy) public key:
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzBrQ2sAAAEEAPZblTJkdcF9Cg/4GT/Nwma9UJkl6ptj0kt8A/fQL5KLgBgC zWkvCe9+k0jTJtQTV8EUc1HJ6p2lO3OXwBwbRATSFFphan96gMh6Sc/jogQA1ATA Bs1+3urn3BakxQd3t6rpdukuxTrP3CmEnsn0cpQWLF9civTLezAXeuj7f8X5AAUT tClLZW5uZXRoIEUuIEhhcmtlciA8a2hhcmtlckBjcy51dGV4YXMuZWR1PokAlQMF EDBraihOLKyu2vVZNQEBL6kD/0tFCCJRb7cZrXB5D9Ex+SU1RmdZKkQAwH4ejn34 pBU0LgXGwF/sqWx2quuCOkgI7TIDeYsfLLCeUe1lFov9Q0IrDcKmbi0VjZN3ISGM yKRoINNxRq6JPonKHylTJt5itkWoP9ngiBgkS/zwDDLY3JIuUzeMfnQBudYF4Co0 xJGy =STiI -----END PGP PUBLIC KEY BLOCK-----
This comes from the PGP FAQ (Frequently Asked Questions).
PGP is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text. PGP can also be used to apply a digital signature to a message without encrypting it. This is normally used in public postings where you don't want to hide what you are saying, but rather want to allow others to confirm that the message actually came from you. Once a digital signature is created, it is impossible for anyone to modify either the message or the signature without the modification being detected by PGP.
![]() |
![]() |
![]() |
![]() |
Last Updated 10/27/96 kharker@cs.utexas.edu |
The World Wide Web facility on www.cs.utexas.edu is provided as a service to the faculty, students, staff, and guests of the Department of Computer Sciences at The University of Texas at Austin. The views and opinions expressed on this page are the sole responsibility of the author, Kenneth E.Harker, and do not necessarily reflect the views or opinions of the Department of Computer Sciences, The University of Texas at Austin, or The University of Texas System or its Board of Regents.