and File Security With GnuPG Matt Brodeur

Slides:



Advertisements
Similar presentations
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Advertisements

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Public Key Cryptography and GnuPG CPT 555 Network Security.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
CS470, A.Selcuk Security1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Digital Signatures and Digital Certificates Monil Adhikari.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Pertemuan #12 Pretty Good Privacy (Pretty Good Privacy) Kuliah Pengaman Jaringan.
TAG Presentation 18th May 2004 Paul Butler
Chapter 5a - Pretty Good Privacy (PGP)
Key management issues in PGP
Web Applications Security Cryptography 1
Electronic mail security
Internet Business Associate v2.0
Security is one of the most widely used and regarded network services
Information Security message M one-way hash fingerprint f = H(M)
TAG Presentation 18th May 2004 Paul Butler
Security Services for
Misc. Security Items.
CS 465 Secure Last Updated: Nov 30, 2017.
MAIL AND SECURITY PERTEMUAN 13
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
asymmetric cryptography
Public Key Infrastructure
Security at the Application Layer: PGP and S/MIME
Pooja programmer,cse department
ELECTRONIC MAIL SECURITY
Information Security message M one-way hash fingerprint f = H(M)
ELECTRONIC MAIL SECURITY
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Electronic Payment Security Technologies
….for authentication and confidentiality PGP
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

and File Security With GnuPG Matt Brodeur

Introduction – What is GnuPG? ● Pretty Good Privacy (PGP) ● Created by Philip Zimmerman in 1991 ● Now sold by PGP Corporation ● GNU Privacy Guard ● "GnuPG is a complete and free replacement for PGP." (FSF) ● GnuPG implements the OpenPGP (RFC2440) standard

Introduction – What is OpenPGP? ● OpenPGP is part of a protocol that provides cryptographic security for electronic communication ● OpenPGP provides the four essential components of secure communication ● Authentication ● Integrity ● Nonrepudiation ● Confidentiality

Why use PGP? ● OpenPGP can protect ● Financial information ● Business plans ● Sensitive data ● Software distribution ● Public announcements

How? - Install Software ● ● Latest versions are and ● Available precompiled for most systems, source for others. ● Windows - ● Check your distribution, you might already have it.

Public Key Cryptography ● Symmetric Encryption ● Split Key Encryption – Public Key – Private Key ● Digital Signatures / Hybrid Encryption

Web of Trust ● How can you trust someone you've never met? ● Verify the Validity of the keys for people you know, and Trust them to verify others.

How? - Create Keys ● gpg –gen-key ● Key Length ● DSA (Signing Key) will be 1024 bits ● ElGamal (Encryption Key) can be between 1024 and 4096 bits ● "The longer the key the more secure it is against brute-force attacks, but for almost all purposes the default keysize is adequate since it would be cheaper to circumvent the encryption than try to break it." (GPH) ● USE A GOOD PASSPHRASE

Keys – Expiration and Revocation ● Suggested method (GPH) ● No expiration on main (signing) key ● Expire encryption keys regularly ● USE A GOOD PASSPHRASE ● Generate a revocation certificate (--gen-revoke) immediately ● Store in a safe place ● AWAY from secret key

Certificate Structure ● Keys, User IDs and Fingerprints are contained in a Certificate ● Certificates are identified by their primary Signing Key ID

Keys – Multiple Identities ● You may have multiple IDs on one certificate ● --edit-key, adduid ● IDs may be added but never removed ● One can revoke a UID's self-signature ● Multiple keys can be used instead

Keys - Verification ● Key ID vs Fingerprint ● A Fingerprint is a hash of the key data ● A (DSA) Key ID is a subset of the Fingerprint ● One must check owner's identity, Key ID, and fingerprint ● Take note of how certain you are of someone's identity...and how well others are checking, too.

Keys - Signing ● gpg --edit-key ● "sign" command ● gpg --sign-key ● Indicate how closely you have verified the owner's identity (Validity) ● Validity is stored with the signed key and shared with the world ● Indicate how much you trust the owner to verify the identity of others (Ownertrust) ● Ownertrust is a personal assessment and is stored locally ● Local signatures (lsign)

Useful Commands / Options ● --keyserver [keyserver name] ● --send-keys [UID/KeyID/etc] ● --recv-keys [KeyID only] ● --search-keys [string] ● Searches server for matching keys ● --refresh-keys ● Retrieves latest version of all keys on your public ring ● Keyserver name and options can be set in ~/.gnupg/gpg.conf

Useful Commands / Options ● --policy-url ● Link a signing policy page to a signature ● addphoto, showphoto (--edit-key commands) --photo-viewer option ● Attach a photograph to a key ● Common Problem: "WARNING: using insecure memory!" ● GPG needs to lock memory to prevent paging sensitive data

CAFF – Signing the easier way ● Certificate Authority Fire and Forget (CAFF) ● ● Feed it a list of Key IDs and follow the prompts ● Retrieves ● Signs ● Splits ● Encrypts ● Mails

Advanced Topics / Issues ● headers are unencrypted ● Including Subject ● PGP/GPG interoperability ● ● PGP-MIME vs Traditional PGP ● Capability vs Compatibility ● Good mailers should support both

Conclusion - Links ● This Presentation ● ● GnuPG Home Page (Downloads, Frontends, FAQ, GPH) ● ● RFC 2440 (OpenPGP Message Format) ● ftp://ftp.rfc-editor.org/in-notes/rfc2440.txt ftp://ftp.rfc-editor.org/in-notes/rfc2440.txt ● OpenPGP vs S/MIME ●