html5-img
1 / 21

Electronic mail security -- Pretty Good Privacy

Electronic mail security -- Pretty Good Privacy. Pretty Good Privacy. Philip R. Zimmerman is the creator of PGP. PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications. Why Is PGP Popular?.

clara
Télécharger la présentation

Electronic mail security -- Pretty Good Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Electronic mail security -- Pretty Good Privacy CS@UTC

  2. Pretty Good Privacy • Philip R. Zimmerman is the creator of PGP. • PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications. CS@UTC

  3. Why Is PGP Popular? • It is availiable free on a variety of platforms. • Based on well known algorithms. • Wide range of applicability • Not developed or controlled by governmental or standards organizations CS@UTC

  4. Operational Description • Consist of five services: • Authentication • Confidentiality • Compression • E-mail compatibility • Segmentation CS@UTC

  5. PGP Operation – Authentication 1. Sender creates a message 2. SHA1 used to create 160-bit hash of message 3. Hash code is encrypted using the sender's private key, and resulting signature is attached to message 4. Receiver uses sender's public key to decrypt attached signature and recover hash code 5. Receiver generates hash code of message and compares with decrypted hash code.If match, message is accepted as authentic CS@UTC

  6. PGP Operation – Authentication M = original message H = hash function | | = concatenation (join) Z = compression Z-1 = decompression EP = public key encryption DP = public key decryption KRa = A’s private key KUa = A’s public key CS@UTC

  7. PGP Operation – Confidentiality 1. Sender generates message and random number to be used as session key for this message only 2. Message is encrypted, using AES, 3DES, IDEA or CAST-128, with session key 3. Session key is encrypted using RSA with recipient's public key, then attached to msg 4. Receiver uses RSA with its private key to decrypt and recover session key 5. Session key is used to decrypt message CS@UTC

  8. PGP Operation – Confidentiality (book, fig 5.1b) EC = symmetric encryption DC = symmetric decryption Ks = session key CS@UTC

  9. CS@UTC

  10. PGP Operation – Compression • PGP compresses the message: • after signing the hash • to save having to compress document every time you wish to verify its signature • before encryption • to speed up the process (less data to encrypt) • for greater security; compressed messages are more difficult to cryptanalyse as they have less redundancy) CS@UTC

  11. E-mail Compatibility • The scheme used is radix-64 conversion. • The use of radix-64 expands the message by 33%. CS@UTC

  12. PGP Operation – RADIX-64 encoding CS@UTC

  13. PGP Operation – Segmentation/Reassembly • Email protocols often restrict a message to a certain maximum size (e.g. 50KB) • Thus PGP divides messages that are too large into smaller ones • Reassembly at the other end is required before decryption or signature verification CS@UTC

  14. Summary of PGP Services CS@UTC

  15. CS@UTC

  16. Format of PGP Message CS@UTC

  17. CS@UTC

  18. CS@UTC

  19. CS@UTC

  20. The Use of Trust • Key legitimacy field • Signature trust field • Owner trust field CS@UTC

  21. CS@UTC

More Related