MIME-Version: 1.0 Server: CERN/3.0 Date: Monday, 06-Jan-97 22:52:13 GMT Content-Type: text/html Content-Length: 5567 Last-Modified: Monday, 28-Oct-96 02:58:50 GMT Ken Harker - PGP Public Key

Ken Harker - PGP Public Key


"When encryption is outlawed, bayl bhgynjf jvyy unir rapelcgvba."

My Public Key

This is my PGP (Pretty Good Privacy) public key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCNAzBrQ2sAAAEEAPZblTJkdcF9Cg/4GT/Nwma9UJkl6ptj0kt8A/fQL5KLgBgC
zWkvCe9+k0jTJtQTV8EUc1HJ6p2lO3OXwBwbRATSFFphan96gMh6Sc/jogQA1ATA
Bs1+3urn3BakxQd3t6rpdukuxTrP3CmEnsn0cpQWLF9civTLezAXeuj7f8X5AAUT
tClLZW5uZXRoIEUuIEhhcmtlciA8a2hhcmtlckBjcy51dGV4YXMuZWR1PokAlQMF
EDBraihOLKyu2vVZNQEBL6kD/0tFCCJRb7cZrXB5D9Ex+SU1RmdZKkQAwH4ejn34
pBU0LgXGwF/sqWx2quuCOkgI7TIDeYsfLLCeUe1lFov9Q0IrDcKmbi0VjZN3ISGM
yKRoINNxRq6JPonKHylTJt5itkWoP9ngiBgkS/zwDDLY3JIuUzeMfnQBudYF4Co0
xJGy
=STiI
-----END PGP PUBLIC KEY BLOCK-----

What is PGP?

This comes from the PGP FAQ (Frequently Asked Questions).

PGP is a program that gives your electronic mail something that it
otherwise doesn't have: Privacy. It does this by encrypting your mail so
that nobody but the intended person can read it. When encrypted, the
message looks like a meaningless jumble of random characters. PGP has
proven itself quite capable of resisting even the most sophisticated
forms of analysis aimed at reading the encrypted text.
    
PGP can also be used to apply a digital signature to a message without
encrypting it.  This is normally used in public postings where you don't
want to hide what you are saying, but rather want to allow others to
confirm that the message actually came from you. Once a digital signature
is created, it is impossible for anyone to modify either the message or
the signature without the modification being detected by PGP.

Where to find more information


Contact Information | UTCS Home Page | This page is optimized for Lynx! HTML 3.2 Validated! | Last Updated 10/27/96
kharker@cs.utexas.edu


The World Wide Web facility on www.cs.utexas.edu is provided as a service to the faculty, students, staff, and guests of the Department of Computer Sciences at The University of Texas at Austin. The views and opinions expressed on this page are the sole responsibility of the author, Kenneth E.Harker, and do not necessarily reflect the views or opinions of the Department of Computer Sciences, The University of Texas at Austin, or The University of Texas System or its Board of Regents.