Digital Signal Processing


Encrypted Transmission of a PGP Public Key to Destinations

Authors: Peiman Ghasemi

To protect your private information, you may use a data encryption and decryption computer program like PGP. But for an espionage agency even the PGP Public Key is not completely unbreakable. So you may prefer to encipher the Public Key before you send it to the destination, then it would become probably an impossible goal for the Internet fraud operatives to decipher the contents.

Comments: 5 Pages.

Download: PDF

Submission history

[v1] 2015-08-13 09:53:15

Unique-IP document downloads: 163 times

Articles available on are pre-prints that may not yet have been verified by peer-review and should therefore be treated as preliminary and speculative. Nothing stated should be treated as sound unless confirmed and endorsed by a concensus of independent qualified experts. In particular anything that appears to include financial or legal information or proposed medical treatments should not be taken as such. will not be responsible for any consequences of actions that result from any form of use of any documents on this website.

Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.

comments powered by Disqus