Help


from Wikipedia
« »  
The cryptographic security of PGP encryption depends on the assumption that the algorithms used are unbreakable by direct cryptanalysis with current equipment and techniques.
For instance, in the original version, the RSA algorithm was used to encrypt session keys ; RSA's security depends upon the one-way function nature of mathematical integer factoring.
Likewise, the symmetric key algorithm used in PGP version 2 was IDEA, which might, at some future time, be found to have a previously unsuspected cryptanalytic flaw.
Specific instances of current PGP, or IDEA, insecurities — if they exist — are not publicly known.
As current versions of PGP have added additional encryption algorithms, the degree of their cryptographic vulnerability varies with the algorithm used.
In practice, each of the algorithms in current use is not publicly known to have cryptanalytic weaknesses.

1.997 seconds.