PGP Stephen Smith – December 11, 2013. Outline - Pretty Good Privacy  History  How It Works  How To Use It  Questions  I Get Taken Away In Handcuffs.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Review For Exam 3 (April 15, 2010) © Abdou Illia – Spring 2010.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 3 Encryption Algorithms & Systems (Part C)
Electronic mail security -- Pretty Good Privacy.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS526Topic 5: Hash Functions and Message Authentication 1 Computer Security CS 526 Topic 5 Cryptography: Cryptographic Hash Functions And Message Authentication.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Lecture 3: Cryptographic Tools
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Encryption Coursepak little bit in chap 10 of reed.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Pretty Good Privacy (PGP) Security for Electronic .
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Week 4 - Friday.  What did we talk about last time?  Snow day  But you should have read about  Key management.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Intro to Cryptography Lesson Introduction
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
IT443 – Network Security Administration Instructor: Bo Sheng
Privacy & Security.
Public Key Encryption Systems
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and Digital Signatures
Security through Encryption
The Application of Elliptic Curves Cryptography in Embedded Systems
The Elements of Cryptography
Electronic Mail Security
Public Key Encryption Systems
Presentation transcript:

PGP Stephen Smith – December 11, 2013

Outline - Pretty Good Privacy  History  How It Works  How To Use It  Questions  I Get Taken Away In Handcuffs

History of PGP

Separated At Birth?

History of PGP  Uploaded to Peacenet  Message board for activists  Encryption viewed as “munitions”  NSA banned >40-bit ciphers from export  Zimmerman charged as arms dealer  Charges dropped after several years

History of PGP  How they got around it  Sold books containing entire source code  Cut binding off, scan with OCR, presto!  Export of books protected under 1 st Amendment  Crypto now free speech too  Bernstein v. United States  Junger v. Daley

History of PGP  PGP Corporation founded in 2001  Sold to Symantec in 2010  Open source version also available GnuPG (GNU Privacy Guard)

How Does It Work?

Step One: Text Compression  Smaller size  Faster transmission  Improved resistance to frequency analysis  Incomplete message = harder to break

Step Two: Encryption  Session key is randomly generated  “Random” = very strict meaning in cryptography  Session key used to encrypt message  Cipher used = AES

AES  Advanced Encryption Standard  Rijndael Joan Daemen and Vincent Rijmen  Block cipher  As opposed to stream cipher  Chunks data up, shuffles it in predictable fashion  …predictable to anyone with the key, that is

AES  Attacked via side channels  Weaknesses in implementation, not math  Math-only attacks getting progressively better

Step 3: Authentication  Session key encrypted with sender’s public key  Cipher used = RSA

RSA  Ron Rivest, Adi Shamir, Leonard Adleman  Developed 3 years earlier at GCHQ  British NSA  Not declassified until 1997  Explaining it would be a bit mathy for ten minutes  It’s not THAT hard, just a little complex  Involves prime numbers and modular arithmetic You already know one, you’ll know the other in a minute

RSA  Attacked by prime factoring  Getting better every year  Shor’s algorithm + quantum computer  Next step = Elliptic Curve Cryptography (ECC)  ECDSA = Elliptic Curve Digital Signature Algorithm  Ars Technica posted a good summary last week

Step 4: Hash Production  Message in, hashtext out  Hashtext encrypted with sender’s private key Ensures message can’t be modified and rehashed  Cipher used = SHA

SHA  Secure Hashing Algorithm (SHA-3)  Keccak Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche  Hash function  Modular arithmetic  One-way function

SHA  Attacked by collisions  Predictable output  Identical output for different input The birthday paradox

Step 4.5: Why Three Ciphers?  Message encrypted with AES session key  AES is way faster than RSA  Session key encrypted with RSA public key  RSA has public/private keypairs  Message hashed with SHA  SHA ensures consistent output  Coordinating all this is why PGP is awesome.

Step 5: Message Sent & Received  Both aspects of secure are now present  Encryption  Authentication  Message is sent, entire process is reversed  Session key decrypted by receiver’s private key  Message decrypted with session key  Original hash decrypted with sender’s public key  Received message hashed and compared  Text decompressed

Summary  Message is encrypted and signed  Message is transmitted  Message is checked for integrity and decrypted

How To Use It  Outlook  PGP For Outlook  Thunderbird  Enigmail  Gmail, Hotmail, etc.  Say hi to the NSA for me!

Questions?

Sources Cited Singh, S. (2000). The code book: The science of secrecy from ancient egypt to quantum cryptography. New York City: Anchor. Ferguson, N., Schneier, B., & Tadayoshi, K (2010). Cryptography engineering: Design principles and practical applications. New York City: Wiley. PGP International. (1999). How pgp works. Retrieved from