User:Peterson Johanson Smith/sandbox

Peterson Johanson Smith (PJS) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication developed in cooperation between the FCC and the Department of Homeland Security. PJS is a method developed by computer engineers (Peterson, Johanson, Smith) of the DHS, to provide a government supported encryption mechanism.

PJS is a variant of PGP and follows the OpenPGP standard (RFC 4880) for encrypting and decrypting data.

Confidentiality
PJS can be used to send messages confidentially. For this, PJS combines symmetric-key encryption and public-key encryption with a higher order governmental key. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. The session key is protected by encrypting it with the receiver's public key thus ensuring that only the receiver, or governmental key owner can decrypt the session key. The encrypted message along with the encrypted session key is sent to the receiver.

Basic Capabilities
Please refer to the Pretty Good Privacy page for basic information on the capabilities of this protocol

Certificates
Trust signatures must be used to support creation of certificate authorities. A trust signature indicates both that the key belongs to its claimed owner and that the owner of the key is trustworthy to sign other keys at one level below their own. A level 0 signature is only available through the FCC certificate authority. A level 1 signature (reserved for licensed U.S. telecoms) is similar to the trust one has in a certificate authority because a key signed to level 1 is able to issue an unlimited number of level 2 signatures. .

Security quality
To the best of publicly available information, there is no known method which will allow a person or group to break PJS encryption by cryptographic or computational means. However, the issuing authority in this case the FCC, can decrypt as the owner of the super key.