<?xml version="1.0" encoding="UTF-8"?>
		<www.ijeece.com>
		<Title>E-Mail Protection Using a Good Privacy Algorithm</Title>
		<Author>G Mohit</Author>
		<Volume>01</Volume>
		<Issue>01</Issue>
		<Abstract>The purpose of this research is to discuss the growing issue of online communication security and privacyCompared to other methods we achieve a high level of security and privacy by using the Pretty Good Privacy PGPalgorithm Phil Zimmerman is credited with establishing this protocol It protects files integrity and encrypts themThis algorithm first transforms the file into ciphertext before sending it via conventional mailer Every user possessesboth a public key and a private key The file is encrypted using the private key which is kept confidential Everyoneis aware of the public key which is used to decrypt the file that the user encrypted This procedure operates morequickly than previously mentioned despite the fact that it may appear drawn out and tiresome</Abstract>
		<permissions>
<copyright-statement>Copyright (c) Journal of Engineering Technology and Sciences. All rights reserved</copyright-statement>
<copyright-year>2026</copyright-year>
</permissions>
		</www.ijeece.com>
		