Synopsis: PGP(tm) uses public-key encryption to
protect E-mail and data files. Communicate securely with people you've never met, with no
secure channels needed for prior exchange of keys. PGP is well featured and fast, with
sophisticated key management, digital signatures, data compression, and good ergonomic
design.
Software and documentation (c) Copyright 1990-1994 Philip Zimmermann. All rights reserved.
For information on PGP licensing, distribution, copyrights, patents, trademarks, liability
limitations, and export controls, see the "Legal Issues" section in the
"PGP User's Guide, Volume II: Special Topics". Distributed by the Massachusetts
Institute of Technology.
"Whatever you do will be insignificant, but it is very important that you do
it." --Mahatma Gandhi
PGP (Pretty Good Privacy) ver 2.5 - RSA public-key encryption freeware for MSDOS, protects
E-mail. Lets you communicate securely with people you've never met, with no secure
channels needed for prior exchange of keys. Well featured and fast! Excellent user
documentation.
PGP has sophisticated key management, an RSA/conventional hybrid encryption scheme,
message digests for digital signatures, data
compression before encryption, and good ergonomic design. Source code is free.
a description of ASCII armor. An ASCII armored file is just like a binary file described
here, but with an extra layer of encoding added, framing lines, and a 24-bit CRC at the
end.
For Clinical Paranoia Sufferers Only
It is always possible that the PGP you have received has been tampered with in some way.
This is a risk because PGP is used as a system to assure security, so those wishing to
breach your security could likely do it by making sure that your copy of PGP has been
tampered with. Of course, if you receive PGP in a binary distribution, it makes sense to
check it for viruses, and if you receive PGP as source code, looking for signs of obvious
tampering might be a good idea. However, it is very difficult to actually determine if the
code has no subtle bugs
that have been introduced and that the executable you are using has not been tampered with
in any way.
If you have a previous version of PGP which you already trust, the cryptographic signature
on the executable will assure you that it has
not been tampered with (with the possible exception of a "stealth virus" already
existing on your system). If you are a really paranoid person, try getting a
cryptographically signed copy of the software from someone you trust to have a good copy.
It would also likely be good for you to pay special attention to the sections of the
manual on "Vulnerabilities." You are going to read the manual, aren't you?
Compilation Copyright (c) 1994 by the Massachusetts
Institute of Technology. All rights reserved.
Permission to use, copy, modify, and distribute this compilation for any
non-commercial purpose is hereby granted without fee, subject to the following license:
1. Any copy or modification of this compilation must include the above copyright notice
and this license.
2. Software included in this compilation includes a feature that causes the format of
messages generated by it to change on September 1, 1994. Modification to this software to
disable this feature is not authorized and will make this license, and the license in the
underlying software, null and void.
3. Users of the software included in this compilation agree to use their best efforts to
provide MIT with any modifications containing improvements or extensions and hereby grant
MIT a perpetual, royalty-free license to use and distribute such modifications under the
terms of this license. Such modifications may be provided to MIT
by email to [email protected].
4. The software included in this compilation makes use of the RSAREF(TM) Cryptographic
Toolkit, use and distribution of which are covered by the RSA Data Security, Inc., Program
License Agreement included in this compilation. This compilation also contains materials
copyrighted by Philip Zimmermann under terms also included in this compilation. (See the
"Legal Issues" section of the PGP User's Guide, Volume 2.) Users must also agree
to the terms of both of these licenses.
5. MIT makes no warranty or representation that the operation of the software in this
compilation will be error-free, and MIT is under no obligation to provide any services, by
way of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED
"AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
WILL MIT OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL
DAMAGES, EVEN IF MIT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
6.Users will not use the name of the Massachusetts Institute of Technology nor any
adaptation thereof in any publicity or advertising, without prior written consent from MIT
in each case.
7. Export of this software from the United States may require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting.
DOWNLOAD THESE FILES NOW!
Once downloaded unzip into new directories, use the file names for the directories names.