Tuesday, June 27, 2017
Monday, June 26, 2017
Sunday, June 25, 2017
When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, PGP uses a faster encryption algorithm to encrypt the message and then uses the public key to encrypt the shorter key that was used to encrypt the entire message.Nov 24, 2014
Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. 




Download this free guide
5 Ways to Prevent Ransomware: Download Now
Ransomware attacks are not only becoming more common, they're becoming more creative. In this guide, industry expert Kevin Beaver uncovers 5 ways to prevent a ransomware infection through network security.
Start Download
Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security.
How PGP works
Pretty Good Privacy uses a variation of the public key system. In this system, each user has an encryption key that is publicly known and a private key that is known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, PGP uses a faster encryption algorithm to encrypt the message and then uses the public key to encrypt the shorter key that was used to encrypt the entire message. Both the encrypted message and the short key are sent to the receiver who first uses the receiver's private key to decrypt the short key and then uses that key to decrypt the message.
PGP comes in two public key versions -- Rivest-Shamir-Adleman (RSA) and Diffie-Hellman. The RSA version, for which PGP must pay a license fee to RSA, uses the IDEA algorithm to generate a short key for the entire message and RSA to encrypt the short key. The Diffie-Hellman version uses the CAST algorithm for the short key to encrypt the message and the Diffie-Hellman algorithm to encrypt the short key.
When sending digital signatures, PGP uses an efficient algorithm that generates a hash (a mathematical summary) from the user's name and other signature information. This hash code is then encrypted with the sender's private key. The receiver uses the sender's public key to decrypt the hash code. If it matches the hash code sent as the digital signature for the message, the receiver is sure that the message has arrived securely from the stated sender. PGP's RSA version uses the MD5 algorithm to generate the hash code. PGP's Diffie-Hellman version uses the SHA-1 algorithm to generate the hash code.
Getting PGP
To use Pretty Good Privacy, download or purchase it and install it on your computer system. It typically contains a user interface that works with your customary email program. You may also need to register the public key that your PGP program gives you with a PGP public-key server so that people you exchange messages with will be able to find your public key.
PRO+
Content
Find more PRO+ content and other member only offers, here.
E-Handbook
Get the details on Office 365 advanced security management
E-Handbook
Recent ransomware attacks got you? Don't cry; fight back!
E-Zine
Cloud access security brokers: Hard to tell what's real
PGP freeware is available for older versions of Windows, Mac, DOS, Unix and other operating systems. In 2010, Symantec Corp. acquired PGP Corp., which held the rights to the PGP code, and soon stopped offering a freeware version of the technology. The vendor currently offers PGP technology in a variety of its encryption products, such as Symantec Encryption Desktop, Symantec Desktop Email Encryption and Symantec Encryption Desktop Storage. Symantec also makes the Symantec Encryption Desktop source code available for peer review.
Though Symantec ended PGP freeware, there are other non-proprietary versions of the technology that are available. OpenPGP is an open source version of PGP that's supported by the Internet Engineering Task Force (IETF). OpenPGP is used by several software vendors, including as Coviant Software, which offers a free tool for OpenPGP encryption, and HushMail, which offers a Web-based encrypted email service powered by OpenPGP. In addition, the Free Software Foundation developed GNU Privacy Guard (GPG), an OpenPGG-compliant encryption software.
Where can you use PGP?
Pretty Good Privacy can be used to authenticate digital certificates and encrypt/decrypt texts, emails, files, directories and whole disk partitions. Symantec, for example, offers PGP-based products such as Symantec File Share Encryption for encrypting files shared across a network and Symantec Endpoint Encryption for full disk encryption on desktops, mobile devices and removable storage. In the case of using PGP technology for files and drives instead of messages, the Symantec products allows users to decrypt and re-encrypt data via a single sign-on.
Margaret Rouse asks:
Do open source versions of PGP still serve a useful purpose, or have other encryption methods superseded it?
Join the Discussion
Originally, the U.S. government restricted the exportation of PGP technology and even launched a criminal investigation against Zimmermann for putting the technology in the public domain (the investigation was later dropped). Network Associates Inc. (NAI) acquired Zimmermann's company, PGP Inc., in 1997 and was able to legally publish the source code (NAI later sold the PGP assets and IP to ex-PGP developers that joined together to form PGP Corp. in 2002, which was acquired by Symantec in 2010).
Today, PGP encrypted email can be exchanged with users outside the U.S if you have the correct versions of PGP at both ends.
There are several versions of PGP in use. Add-ons can be purchased that allow backwards compatibility for newer RSA versions with older versions. However, the Diffie-Hellman and RSA versions of PGP do not work with each other since they use different algorithms. There are also a number of technology companies that have released tools or services supporting PGP. Google this year introduced an OpenPGP email encryption plug-in for Chrome, while Yahoo also began offering PGP encryption for its email service.
This was last updated in November 2014
Next Steps
Expert Karen Scarfone provides an in-depth explanation of why enterprises need email encryption technology and reviews the different business cases for protecting emails in transit and storage.
With so many email encryption products available on the market, selecting the right one is a challenge. Read our expert advice on what to look for when evaluating email encryption software and find advice on determining which product is the right fit for your organization.
Continue Reading About Pretty Good Privacy (PGP)
Learn more about encrypting email
Is messaging in symmetric encryption better than PGP email security?
Find out where to get PGP
Discover the difference between PGP and SSL
Get more info on PGP and its history
Related Terms
Advanced Encryption Standard (AES)
The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ... See complete definition
email spam
Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent. See complete definition
private key (secret key)
A private (secret) key is an encryption key whose value should never be made public. The term may refer to the private key of an ... See complete definition
Dig Deeper on Email Security Guidelines, Encryption and Appliances
ALL
NEWS
GET STARTED
MANAGE
Advanced Encryption Standard (AES)
Internet Key Exchange (IKE)
Cisco brings email security appliances closer to SaaS
Diffie-Hellman key exchange (exponential key exchange)
Load More
Join the conversation 8 comments
Send me notifications when other members comment.
Add My Comment
Oldest
[-] jonla56 - 2 Mar 2014 2:07 PM
If your using PGP can the NSA (Feds) get into your computer and
monitor your emails?
Reply
[-] Margaret Rouse - 24 Nov 2014 10:37 AM
Do open source versions of PGP still serve a useful purpose, or have other encryption methods superseded it?
Reply
[-] Ken Harthun - 11 Dec 2014 12:49 PM
I have always been an advocate of Open Source software; it's the first place I look for solutions. The open source versions of PGP are as valid as they ever were especially as now embraced by Google in their End-to-End email encryption plugin for the Chrome browser, and I see quite a few third-part developers working with it.
Like anything else, open source PGP will evolve and possibly eventually become obsolete; for now, it's alive and well.
Reply
[-] Carlindo - 10 Mar 2016 5:29 PM
Other encryption methods haven't superseded it. However there is a basic fallacy in PGP. By using long key pairs, typically 2048+ bits and passphrases, typically 100+ characters, it gives the user a false sense of protection. The truth is that the key length used to encrypt messages is 256 bits which is NO protection to government agencies sponsored attacks. Such agencies, like NSA, have annual budgets around $10 Billion, enough money to buy enough processing power to break 256 bit keys on a brute force attack.
Reply
[-] abuell - 11 Mar 2016 2:18 PM
Sure, we still use it. It works for our purposes.
Reply
[-] Carlindo - 10 Mar 2016 5:19 PM
Absolutely YES. Although PGP uses 2048+ bit key pairs and 100+ character passphrases, it uses 256 bit keys in the encryption of the message. 256 bit keys are no hurdle to brute force attacks sponsored by NSA. Think about something better if you want to preserve your Constitutional right to privacy.
Reply
[-] Genderhayes - 22 Dec 2016 8:36 PM
You want to send a secret message to Aarav which has a private key put connected public key on web page download public key encrypt the message using it send it that person will decode it cause that person has the corresponding private key
Reply
[-] ajjmatt - 3 Apr 2017 10:51 PM
You must be asymmetrical eleptical cylindrical encrypted to have any hope not having you data opened. It is less complicated if you have end to end hardware or you can do this with the highest level intel processors and time via software. Good luck....
Reply
-ADS BY GOOGLE
Dateiendungen und Dateiformate
ABCDEFGHIJKLMNOPQRSTUVWXYZ#
Gesponsert von:
Latest TechTarget resources
CLOUD SECURITY
NETWORKING
CIO
CONSUMERIZATION
ENTERPRISE DESKTOP
CLOUD COMPUTING
COMPUTER WEEKLY
SearchCloudSecurity
What a CPU cache exploit means for multi-tenant cloud security
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works...
How to ensure a secure data transport of information in the cloud
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options ...
Is a malicious hypervisor a real security threat to enterprises?
It's possible for hackers to use a malicious hypervisor to access data on virtual machines. Expert Ed Moyle discusses how this ...
About UsMeet The EditorsContact UsPrivacy PolicyVideosPhoto StoriesGuidesAdvertisersBusiness PartnersMedia KitCorporate SiteContributorsCPE and CISSP TrainingReprintsArchiveSite MapEventsE-Products
All Rights Reserved, Copyright 2000 - 2017, TechTarget





Download this free guide
5 Ways to Prevent Ransomware: Download Now
Ransomware attacks are not only becoming more common, they're becoming more creative. In this guide, industry expert Kevin Beaver uncovers 5 ways to prevent a ransomware infection through network security.
Start Download
Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security.
How PGP works
Pretty Good Privacy uses a variation of the public key system. In this system, each user has an encryption key that is publicly known and a private key that is known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, PGP uses a faster encryption algorithm to encrypt the message and then uses the public key to encrypt the shorter key that was used to encrypt the entire message. Both the encrypted message and the short key are sent to the receiver who first uses the receiver's private key to decrypt the short key and then uses that key to decrypt the message.
PGP comes in two public key versions -- Rivest-Shamir-Adleman (RSA) and Diffie-Hellman. The RSA version, for which PGP must pay a license fee to RSA, uses the IDEA algorithm to generate a short key for the entire message and RSA to encrypt the short key. The Diffie-Hellman version uses the CAST algorithm for the short key to encrypt the message and the Diffie-Hellman algorithm to encrypt the short key.
When sending digital signatures, PGP uses an efficient algorithm that generates a hash (a mathematical summary) from the user's name and other signature information. This hash code is then encrypted with the sender's private key. The receiver uses the sender's public key to decrypt the hash code. If it matches the hash code sent as the digital signature for the message, the receiver is sure that the message has arrived securely from the stated sender. PGP's RSA version uses the MD5 algorithm to generate the hash code. PGP's Diffie-Hellman version uses the SHA-1 algorithm to generate the hash code.
Getting PGP
To use Pretty Good Privacy, download or purchase it and install it on your computer system. It typically contains a user interface that works with your customary email program. You may also need to register the public key that your PGP program gives you with a PGP public-key server so that people you exchange messages with will be able to find your public key.
PRO+
Content
Find more PRO+ content and other member only offers, here.
E-Handbook
Get the details on Office 365 advanced security management
E-Handbook
Recent ransomware attacks got you? Don't cry; fight back!
E-Zine
Cloud access security brokers: Hard to tell what's real
PGP freeware is available for older versions of Windows, Mac, DOS, Unix and other operating systems. In 2010, Symantec Corp. acquired PGP Corp., which held the rights to the PGP code, and soon stopped offering a freeware version of the technology. The vendor currently offers PGP technology in a variety of its encryption products, such as Symantec Encryption Desktop, Symantec Desktop Email Encryption and Symantec Encryption Desktop Storage. Symantec also makes the Symantec Encryption Desktop source code available for peer review.
Though Symantec ended PGP freeware, there are other non-proprietary versions of the technology that are available. OpenPGP is an open source version of PGP that's supported by the Internet Engineering Task Force (IETF). OpenPGP is used by several software vendors, including as Coviant Software, which offers a free tool for OpenPGP encryption, and HushMail, which offers a Web-based encrypted email service powered by OpenPGP. In addition, the Free Software Foundation developed GNU Privacy Guard (GPG), an OpenPGG-compliant encryption software.
Where can you use PGP?
Pretty Good Privacy can be used to authenticate digital certificates and encrypt/decrypt texts, emails, files, directories and whole disk partitions. Symantec, for example, offers PGP-based products such as Symantec File Share Encryption for encrypting files shared across a network and Symantec Endpoint Encryption for full disk encryption on desktops, mobile devices and removable storage. In the case of using PGP technology for files and drives instead of messages, the Symantec products allows users to decrypt and re-encrypt data via a single sign-on.
Margaret Rouse asks:
Do open source versions of PGP still serve a useful purpose, or have other encryption methods superseded it?
Join the Discussion
Originally, the U.S. government restricted the exportation of PGP technology and even launched a criminal investigation against Zimmermann for putting the technology in the public domain (the investigation was later dropped). Network Associates Inc. (NAI) acquired Zimmermann's company, PGP Inc., in 1997 and was able to legally publish the source code (NAI later sold the PGP assets and IP to ex-PGP developers that joined together to form PGP Corp. in 2002, which was acquired by Symantec in 2010).
Today, PGP encrypted email can be exchanged with users outside the U.S if you have the correct versions of PGP at both ends.
There are several versions of PGP in use. Add-ons can be purchased that allow backwards compatibility for newer RSA versions with older versions. However, the Diffie-Hellman and RSA versions of PGP do not work with each other since they use different algorithms. There are also a number of technology companies that have released tools or services supporting PGP. Google this year introduced an OpenPGP email encryption plug-in for Chrome, while Yahoo also began offering PGP encryption for its email service.
This was last updated in November 2014
Next Steps
Expert Karen Scarfone provides an in-depth explanation of why enterprises need email encryption technology and reviews the different business cases for protecting emails in transit and storage.
With so many email encryption products available on the market, selecting the right one is a challenge. Read our expert advice on what to look for when evaluating email encryption software and find advice on determining which product is the right fit for your organization.
Continue Reading About Pretty Good Privacy (PGP)
Learn more about encrypting email
Is messaging in symmetric encryption better than PGP email security?
Find out where to get PGP
Discover the difference between PGP and SSL
Get more info on PGP and its history
Related Terms
Advanced Encryption Standard (AES)
The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ... See complete definition
email spam
Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent. See complete definition
private key (secret key)
A private (secret) key is an encryption key whose value should never be made public. The term may refer to the private key of an ... See complete definition
Dig Deeper on Email Security Guidelines, Encryption and Appliances
ALL
NEWS
GET STARTED
MANAGE
Advanced Encryption Standard (AES)
Internet Key Exchange (IKE)
Cisco brings email security appliances closer to SaaS
Diffie-Hellman key exchange (exponential key exchange)
Load More
Join the conversation 8 comments
Send me notifications when other members comment.
Add My Comment
Oldest
[-] jonla56 - 2 Mar 2014 2:07 PM
If your using PGP can the NSA (Feds) get into your computer and
monitor your emails?
Reply
[-] Margaret Rouse - 24 Nov 2014 10:37 AM
Do open source versions of PGP still serve a useful purpose, or have other encryption methods superseded it?
Reply
[-] Ken Harthun - 11 Dec 2014 12:49 PM
I have always been an advocate of Open Source software; it's the first place I look for solutions. The open source versions of PGP are as valid as they ever were especially as now embraced by Google in their End-to-End email encryption plugin for the Chrome browser, and I see quite a few third-part developers working with it.
Like anything else, open source PGP will evolve and possibly eventually become obsolete; for now, it's alive and well.
Reply
[-] Carlindo - 10 Mar 2016 5:29 PM
Other encryption methods haven't superseded it. However there is a basic fallacy in PGP. By using long key pairs, typically 2048+ bits and passphrases, typically 100+ characters, it gives the user a false sense of protection. The truth is that the key length used to encrypt messages is 256 bits which is NO protection to government agencies sponsored attacks. Such agencies, like NSA, have annual budgets around $10 Billion, enough money to buy enough processing power to break 256 bit keys on a brute force attack.
Reply
[-] abuell - 11 Mar 2016 2:18 PM
Sure, we still use it. It works for our purposes.
Reply
[-] Carlindo - 10 Mar 2016 5:19 PM
Absolutely YES. Although PGP uses 2048+ bit key pairs and 100+ character passphrases, it uses 256 bit keys in the encryption of the message. 256 bit keys are no hurdle to brute force attacks sponsored by NSA. Think about something better if you want to preserve your Constitutional right to privacy.
Reply
[-] Genderhayes - 22 Dec 2016 8:36 PM
You want to send a secret message to Aarav which has a private key put connected public key on web page download public key encrypt the message using it send it that person will decode it cause that person has the corresponding private key
Reply
[-] ajjmatt - 3 Apr 2017 10:51 PM
You must be asymmetrical eleptical cylindrical encrypted to have any hope not having you data opened. It is less complicated if you have end to end hardware or you can do this with the highest level intel processors and time via software. Good luck....
Reply
-ADS BY GOOGLE
Dateiendungen und Dateiformate
ABCDEFGHIJKLMNOPQRSTUVWXYZ#
Gesponsert von:
Latest TechTarget resources
CLOUD SECURITY
NETWORKING
CIO
CONSUMERIZATION
ENTERPRISE DESKTOP
CLOUD COMPUTING
COMPUTER WEEKLY
SearchCloudSecurity
What a CPU cache exploit means for multi-tenant cloud security
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works...
How to ensure a secure data transport of information in the cloud
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options ...
Is a malicious hypervisor a real security threat to enterprises?
It's possible for hackers to use a malicious hypervisor to access data on virtual machines. Expert Ed Moyle discusses how this ...
About UsMeet The EditorsContact UsPrivacy PolicyVideosPhoto StoriesGuidesAdvertisersBusiness PartnersMedia KitCorporate SiteContributorsCPE and CISSP TrainingReprintsArchiveSite MapEventsE-Products
All Rights Reserved, Copyright 2000 - 2017, TechTarget
Saturday, June 24, 2017
Isaiah 57:20
The Kingdom of Heaven
A vigintillion reasons of men/women circumstances that motivated me to pursue the blog and through seekers of truth and cooperation participation we will build the Kingdom https://www.facebook.com/lovelikerealthing email me sunislandsicf@gmail.com... https://www.facebook.com/photo.php?fbid=1740715142609718&set=pcb.1740719415942624&type=3&theater http://atomintheuicf.blogspot.com/2017/06/an-enrichment-of-common-benefit-and.html




Friday, June 23, 2017
Wednesday, June 21, 2017
cognitive
ABOUT NEUROSCIENCE NEWS
In 2001, there was a need for a science website that was dedicated strictly to neuroscience research news, so NeuroscienceNews.com was started. To this day, the site is an independent science news website focusing mainly on neuroscience and other cognitive sciences.
No funds have been taken from governments, grants, pharmaceutical companies, big businesses, banks, schools, or others with possibly conflicting interests, to help with this site at any time.
We scour news sources from universities, labs, news agencies, scientists, science publishers, and other science departments. We post full articles, releases, abstracts, and sometimes full research journal papers on our site. We also take submissions from nearly anyone.
We attempt to link to the original news releases in our posts. We try to include a link to the research papers discussed in the press release, or article, as well as other information that may be important to our readers. We try to include the full list of authors, journal names, research title and identifiers (doi) under the content of each post.
In a few cases, the original neuroscience research article is not available without registration from a research journal, or isn’t available online yet. In these cases, we link to a secondary source, such as a publishing organization news page, or a university press feed. In these cases, we usually update our posts later, when we do find access to the research.
We try to use as many Open Access research articles as we can that seem relevant to our readers. We feel this is much more fair for people of varying incomes, education backgrounds and physical access.
We post up any conflicts of interests we notice in the notes under the post’s content. We welcome comments from readers that notice any conflicts, or errors in the research, press releases, articles, posts, or journal research papers. We make mistakes. We can really use everyone’s help to keep this site promoting truthful, honest, fact-based research news.
We don’t agree with everything we post. We don’t like everything we post. None of us are experts in every science sub-genre, language usage, or topic discussed. Sometimes, we post items to draw them to the attention of more qualified readers.
We hope others will always feel comfortable discussing the articles and tell us what is wrong if they notice a problem. Crowdsourcing the news is a longtime goal of this site, so please help if you can. If there is an error, we want it fixed.
We are always accepting work from writers, bloggers and science journalists.
Neuroscience News encourages writers, scientists, and bloggers to submit their work for inclusion on the site. We are always in need of original research articles, reviews, brain research posts, news tips, original blog posts, and opinion pieces. We support open science and citizen scientists in addition to professional scientists.
Please submit your work to be reviewed for publication on Neuroscience News by emailing us at submit (at) neurosciencenews.com.
CONNECT WITH NEUROSCIENCE NEWS IN SOCIAL NETWORKS:
Twitter: NeuroscienceNew
Google Plus: Neuroscience page on Google+
Facebook: Neuroscience News Page on Facebook and our Neuroscience News Group on Facebook
Tumblr: Neuroscience News on Tumblr
Neuroscience News: Neuroscience News
Email Neuroscience News
To submit news: submit @ neurosciencenews.com
Other inquiries: contact @ neurosciencenews.com
Founder, editor-in-chief, curator and website wrangler: Erik Driscoll
Managing editor, curator and author: Victoria Driscoll
You can also contact us here:
Neuroscience News
4747 Research Forest Drive STE 180
The Woodlands, Texas 77381
Drynaria Rhizome Plant Reveals Anti-Alzheimer’s Compounds Neuroscience NewsNEUROSCIENCE NEWSJUNE 20, 2017
Chinese Herbs Healing
Art of Herbal Remedies Revealed
Skip to content
HOMEABOUT US CHINESE HERBAL FORMULAS CONTACT US HERBS FROM A TO Z LIST OF CHINESE HERBS PRIVACY POLICY
Drynaria (Gu Sui Bu)
Rhizoma DrynariaeDrynaria, just as its mandarin name Gu Sui Bu implied, is an herb that is commonly utilized for shattered bones. That is to say, its Chinese name, translated literally as “broken bone repairing” in English, says it all. However, as one of common Chinese herbs, it is more than just a broken-bone herb and it has what it takes to be more versatile medicinally.
What is Drynaria?
Medicinally it mainly refers to the roots of Drynaria fortunei (Kunze) J. Sm., Drynaria baronii (Christ) Diels, Drynaria propinqua (Wall.)J. Smith, or Pseudodrynaria coronans (Wall.) Ching. And other common names include Drynaria roosii, Drynaria Rhizome, and Rhizoma Drynariae. Among them Drynaria fortunei is a species of basket fern in the family Polypodiaceae. And the first one is mainly produced in Zhejiang, Hubei, Guangdong, Guangxi, and Sichuan; the second one is mainly produced in Shaanxi, Gansu, Qinghai and Sichuan. This herb can be harvested all year round but winter and spring are preferable. After the harvest, remove leaves and scales, wash clean, moisturize thoroughly, slice, and dry. It is used raw or sand-scorched.
Drynaria fortunei plant is an epiphytic herb, 20 to 40cm high. Fleshy, stout, and long rhizome grows horizontally and is covered densely with brown, linear chisel-shaped scales. Leaves come with two shapes. Foliage leaf is thick and leathery, reddish-brown or grayish brown, ovate, sessile, 5 to 6.5 cm long and 4 to 5.5 cm wide, and with pinnate lobed edges that looks like oak leaves. Sporophyll is green and with a short winged handle. Blade is oblong or oblong, 20 to 37cm long, 8 to 18.5cm wide, and pinnatipartite. 6 to 15 pairs of accessory pinna are broadly lanceolate or oblong, 4 ~ 10 cm long, and 1.5 to 2.5cm wide. Sori are round, brown, arranged with 2 to 4 lines on both sides of the middle vein. Each rectangular mesh harbors one 1 without indusia.
Drynaria benefits
Root of Drynaria fortunei contains naringin, hop-21-ene, fern-9 (11) ene, ern-7-ene, filic-3-ene, Ξ²-sitosterol, stigmasterol, campesterol, and tetracyclic triterpenoids, such as cycloardenyl acetate, cyclomargenyl acetate, cyclolaudenyl acetate, 9, 10-cycloanost-25-en-3Ξ²-yl acetate, and so on. However, as far as the chemical constituents are concerned, it provides with no health benefits information, which instead can be revealed by its pharmacology.
Modern pharmacological actions of Drynaria
1. Its water decoction and Drynaria extract by alcohol can prevent the rising of serum cholesterol and triglycerides. In addition, they can prevent the formation of atherosclerotic plaques;
2. Its polysaccharides and flavanone glycosides can lower blood lipid and resist arteriosclerosis;
3. It can promote bone’s absorption of calcium, increase calcium and phosphorus levels, which is conducive to fracture healing;
4. It can improve cartilage cells and postpone degenerative lesions of bone cells;
5. The flavanone glycosides contained have significant sedative and analgesic effects.
Proven Drynaria herbal remedies
On the basis of related description on Chinese Materia Medica, this herb is considered bitter in flavor and warm in properties. And it goes to meridians of liver and kidney. Its fundamental functions are tonifying kidney to reinforce bones and promoting blood circulation to arrest pain. Basic medicinal uses and indications are lumbago due to the kidney deficiency, flaccid feet and knee, deafness, toothache, chronic diarrhea, enuresis, bone fractures, alopecia areata, and so on. Recommended dosage is from 10 to 20 grams in decoction, tea pills, or powder.
1. Gu Sui Bu San. This formula comes from Tai Ping Sheng Hui Fang (Taiping Holy Prescriptions for Universal Relief). It is basically used for incised wound and injury of the soft tissues and broken bones. Other major herbal ingredients are Zi Ran Tong (native copper), Hu Jing Gu (Tiger Shin), Bai Gui (Tortoise Plastron), Mo Yao (Myrrh), and more.
2. Shen Xiao Fang. This prescription is from Taiping Holy Prescriptions for Universal Relief too. It is mainly formulated for kidney deficiency induced low back pain, flaccidity of lower limbs, tinnitus and deafness, toothache, chronic diarrhea, and so on. Other primary herbs include Bu Gu Zhi (Psoralea Fruit), Niu Xi (Achyranthes Root), and so on.
Drynaria side effects and contraindications
It was reported that overdose of Drynaria herb might result in adverse reactions such as poisoning and stomachache. But so far no recognized drug interactions found clinically. TCM wise Gu Sui Bu herb should be used with cautions in cases of fire excess from yin deficiency and blood deficiency and wind-dry.
Post navigation← Eriocaulon (Pipewort, Gu Jing Cao)Sprouted Rice (Gu Ya) →
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment
Name *
Email *
Website
Post Comment
Drynaria Rhizome http://neurosciencenews.com/plant-alzheimers-compound-6938/ Drynaria Rhizome http://neurosciencenews.com/plant-alzheimers-compound-6938/ HomeFeatured
Plant Reveals Anti-Alzheimer’s Compounds
Neuroscience NewsNEUROSCIENCE NEWSJUNE 20, 2017
FEATUREDNEUROLOGYOPEN NEUROSCIENCE ARTICLES5 MIN READ
Summary: Researchers have identified several active compounds from Drynaria Rhizome that appear to be able to improve memory and reduce disease characteristics in mouse models of Alzheimer’s disease.
Source: Frontiers.
Japanese scientists develop a new technique to isolate active therapeutic compounds for Alzheimer’s disease from plants.
Japanese scientists have developed a method to isolate and identify active compounds in plant medicines, which accurately accounts for drug behavior in the body. Using the technique, they have identified several active compounds from Drynaria Rhizome, a traditional plant medicine, which improve memory and reduce disease characteristics in a mouse model of Alzheimer’s disease.
Traditional plant medicines have been used by humans for a long time, and these therapies are still popular in many countries. Plants typically contain a huge variety of compounds, many of which have no effect in the body, and some which can have significant effects. If a plant medicine shows a therapeutic effect, scientists are interested in isolating and identifying the compounds that cause the effect to see if they can be used as new drugs.
In many cases, scientists repeatedly screen crude plant medicines in lab experiments to see if any compounds show a particular effect in cells grown in a dish or in cell-free assays. If a compound shows a positive effect in cells or test tubes, it could potentially be used as a drug, and the scientists go on to test it in animals. However, this process is a lot of work and doesn’t account for changes that can happen to drugs when they enter the body – enzymes in the blood and liver can metabolize drugs into various forms called metabolites. In addition, some areas of the body, such as the brain, are difficult to access for many drugs, and only certain drugs or their metabolites will enter these tissues.
“The candidate compounds identified in traditional benchtop drug screens of plant medicines are not always true active compounds, because these assays ignore bio-metabolism and tissue distribution,” explains Chihiro Tohda, senior author on the recent study published in Frontiers in Pharmacology. “So, we aimed to develop more efficient methods to identify authentic active compounds that take these factors into account.”
The scientists were interested in finding active compounds for Alzheimer’s disease in Drynaria Rhizome, a traditional plant medicine. They used mice with a genetic mutation as a model for Alzheimer’s disease. This mutation gives the mice some characteristics of Alzheimer’s disease, including reduced memory and a buildup of specific proteins in the brain, called amyloid and tau proteins. This means that the mice are a useful tool to test potential Alzheimer’s disease treatments.
Initially, the researchers mashed the plant up and treated the mice orally using this crude plant extract. They found that the plant treatment reduced memory impairments and levels of amyloid and tau proteins in their brains. In a key step, the team then examined the mouse brain tissue, where the treatment is needed, 5 hours after they treated the mice with the extract. They found that three compounds from the plant had made it into the brain – these were a compound called naringenin and two naringenin metabolites.
Image shows a brain.
The scientists were interested in finding active compounds for Alzheimer’s disease in Drynaria Rhizome, a traditional plant medicine. NeuroscienceNews.com image is in the public domain.
The researchers then treated the mice with pure naringenin and noticed the same improvements in memory deficits and reductions in amyloid and tau proteins, meaning that naringenin and its metabolites were likely the active compounds in the plant. They found a protein called CRMP2 that naringenin binds to in neurons, which causes them to grow, suggesting that this could be the mechanism by which naringenin can improve Alzheimer’s disease symptoms.
The team hope that the technique can be used to identify other treatments. “We are applying this method to discover new drugs for other diseases such as spinal cord injury, depression and sarcopenia,” explains Tohda.
ABOUT THIS NEUROSCIENCE RESEARCH ARTICLE
Funding: Funding provided by Institute of Natural Medicine at the University of Toyama.
Source: Melissa Cochrane – Frontiers
Image Source: NeuroscienceNews.com image is in the public domain.
Original Research: Full open access research for “A Systematic Strategy for Discovering a Therapeutic Drug for Alzheimer’s Disease and Its Target Molecule” by Zhiyou Yang, Tomoharu Kuboyama and Chihiro Tohda in Frontiers in Pharmacology. Published online June 19 2017 doi:10.3389/fphar.2017.00340
CITE THIS NEUROSCIENCENEWS.COM ARTICLE
MLAAPACHICAGO
Frontiers “Plant Reveals Anti-Alzheimer’s Compounds.” NeuroscienceNews. NeuroscienceNews, 20 June 2017.
.
Abstract
A Systematic Strategy for Discovering a Therapeutic Drug for Alzheimer’s Disease and Its Target Molecule
Natural medicines are attractive sources of leading compounds that can be used as interventions for neurodegenerative disorders. The complexity of their chemical components and undetermined bio-metabolism have greatly hindered both the use of natural medicines and the identification of their active constituents. Here, we report a systematic strategy for evaluating the bioactive candidates in natural medicines used for Alzheimer’s disease (AD). We found that Drynaria Rhizome could enhance memory function and ameliorate AD pathologies in 5XFAD mice. Biochemical analysis led to the identification of the bio-effective metabolites that are transferred to the brain, namely, naringenin and its glucuronides. To explore the mechanism of action, we combined the drug affinity responsive target stability with immunoprecipitation-liquid chromatography/mass spectrometry analysis, identifying the collapsin response mediator protein 2 protein as a target of naringenin. Our study indicates that biochemical analysis coupled with pharmacological methods can be used in the search for new targets for AD intervention.
“A Systematic Strategy for Discovering a Therapeutic Drug for Alzheimer’s Disease and Its Target Molecule” by Zhiyou Yang, Tomoharu Kuboyama and Chihiro Tohda in Frontiers in Pharmacology. Published online June 19 2017 doi:10.3389/fphar.2017.00340
FEEL FREE TO SHARE THIS NEUROSCIENCE NEWS.
Share on Tumblr
inShare
21More
ALZHEIMER'S DISEASECRMP2DRYNARIA RHIZOMEFRONTIERSMEMORYNARINGENINNEURODEGNERATIVE DISEASESNEUROLOGYNEUROPHARMACOLOGYOPEN ACCESSOPEN SCIENCEPHARMACOLOGYTAU



Subscribe to:
Comments (Atom)



































