{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T07:40:11Z","timestamp":1740987611457,"version":"3.38.0"},"reference-count":24,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[1996,4,1]],"date-time":"1996-04-01T00:00:00Z","timestamp":828316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[1996,4]]},"abstract":"<jats:p> The use of codes and other methods of concealing the contents of messages is as old as recorded information. With the advent of computer communication, the need for a method of ensuring secure communication over insecure channels, such as the Internet, has seen an increased demand for good cryptography. However, the recent avail ability of public domain public-key encryption software, such as Philip R. Zimmermann's Pretty Good Privacy (PGP), has been described as 'letting the cryptographic genie out of the bottle', and has raised issues of national communication policy and personal privacy. In the USA, the government's Clipper encryption chip initiative sought to implement a key escrow system which would enable law enforcement agencies to wiretap all digital communi cation. Civil liberty opponents of key escrow systems argue that they will not affect criminals, and fear that they can only be made effective by banning the use of alternative encryption systems, such as PGP. Methods for obtaining and using PGP to encrypt and decrypt e-mail messages are described. <\/jats:p>","DOI":"10.1177\/016555159602200207","type":"journal-article","created":{"date-parts":[[2007,3,18]],"date-time":"2007-03-18T03:37:35Z","timestamp":1174189055000},"page":"133-146","source":"Crossref","is-referenced-by-count":1,"title":["Pretty good encryption"],"prefix":"10.1177","volume":"22","author":[{"given":"George","family":"McMurdo","sequence":"first","affiliation":[{"name":"Queen Margaret College, Edinburgh, Scotland, UK"}]}],"member":"179","published-online":{"date-parts":[[1996,4,1]]},"reference":[{"volume-title":"The Codebreakers: The Story of Secret Writing","year":"1966","author":"D. Kahn","key":"atypb1"},{"volume-title":"Cybersecrecy","year":"1995","author":"Channel 4 TV","key":"atypb2"},{"volume-title":"Alan Turing: The Enigma","year":"1983","author":"A. Hodges","key":"atypb3"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.1177\/016555159602200107"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1109\/5.4442"},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"atypb8","first-page":"50","author":"P. Elmer-DeWitt","year":"1994","journal-title":"Time (International)"},{"volume-title":"Cryptography and Data Security","year":"1983","author":"D.E.R. Denning","key":"atypb9"},{"volume-title":"PGP User's Guide","year":"1995","author":"P. Zimmerman","key":"atypb10"},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0293-30b"},{"issue":"2","key":"atypb12","first-page":"54","volume":"1","author":"S. Levy","year":"1993","journal-title":"Wired (US)"},{"issue":"7","key":"atypb13","first-page":"193","volume":"19","author":"W. Stallings","year":"1994","journal-title":"Byte"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1016\/0267-3649(94)90044-2"},{"key":"atypb15","first-page":"4","author":"C. Reed","year":"1994","journal-title":"Guardian (Online)"},{"volume-title":"MailSafe: Public Key Encryption Software User's Manual","year":"1994","author":"RSA Data Security Inc","key":"atypb16"},{"issue":"11","key":"atypb17","volume":"2","author":"S. Garfinkel","year":"1994","journal-title":"Wired (US)"},{"key":"atypb18","first-page":"31","volume":"16","author":"S. Mace","year":"1994","journal-title":"InfoWorld"},{"volume-title":"On the design and security of block ciphers, ETH Series in Information Processing 1","year":"1992","author":"X. Lai","key":"atypb19"},{"volume-title":"The MD5 Message Digest Algorithm RFC 1312","year":"1991","author":"R. Rivest","key":"atypb20"},{"issue":"2","key":"atypb21","first-page":"161","volume":"20","author":"W. Stallings","year":"1995","journal-title":"Byte"},{"volume-title":"PGP: Pretty Good Privacy","year":"1995","author":"S. Garfinkel","key":"atypb22"},{"volume-title":"Protect Your Privacy: A Guide for PGP Users","year":"1995","author":"W. Stallings","key":"atypb23"},{"issue":"8","key":"atypb24","first-page":"78","volume":"6","author":"J. Ubois","year":"1995","journal-title":"Internet World"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/016555159602200207","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/016555159602200207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T07:01:00Z","timestamp":1740985260000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/016555159602200207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,4]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1996,4]]}},"alternative-id":["10.1177\/016555159602200207"],"URL":"https:\/\/doi.org\/10.1177\/016555159602200207","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"type":"print","value":"0165-5515"},{"type":"electronic","value":"1741-6485"}],"subject":[],"published":{"date-parts":[[1996,4]]}}}