Chapter 5a - Pretty Good Privacy (PGP)

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
CS470, A.Selcuk Security1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Security Jonathan Calazan December 12, 2005.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
ECE Prof. John A. Copeland fax Office: GCATT.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
1 Lesson Internet Organization network Fire wall.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
ACM 511 Introduction to Computer Networks. Computer Networks.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
ECE Prof. John A. Copeland fax Office: Klaus.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
and File Security With GnuPG Matt Brodeur
Key management issues in PGP
Chapter 7 - Secure Socket Layer (SSL)
Chapter 4 a - X.509 Authentication
Internet Business Associate v2.0
Security is one of the most widely used and regarded network services
Unit 3 Section 6.4: Internet Security
Office: Centergy 5138 (VL W315 MWF a.m.)
CSCE 715: Network Systems Security
K E Y Plain text Cipher text Encryption Decryption
Security Services for
Selected Research Topics Electronic Mail Security
Electronic Mail Security
S/MIME T ANANDHAN.
IS3230 Access Security Unit 9 PKI and Encryption
Public Key Infrastructure
Security at the Application Layer: PGP and S/MIME
Pooja programmer,cse department
Security in Network Communications
Cryptography: an overview
Electronic Mail Security
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Chapter 3 - Public-Key Cryptography & Authentication
Electronic Payment Security Technologies
Electronic Mail Security
Presentation transcript:

Chapter 5a - Pretty Good Privacy (PGP) Email Network Security Spring 2017 Chapter 5a - Pretty Good Privacy (PGP) Email (aka GPG or GnuPG - Gnu Privacy Guard) http://www.faisalakhan.info/Classes/ faisal.khan@buitms.edu.pk Office: SS Block, BUITEMS

Proof of delivery - was received (and read) by addressee Security Services for Email Privacy - only read by intended recipient (confidentiality, access, authorization) Authentication - confidence in ID of sender Non-repudiation - proof that sender sent it (attribution) Integrity - assurance of no data alteration Less Common: Proof of submission - was sent to email server Proof of delivery - was received (and read) by addressee 2

Message Integrity Non-repudiation Proof of Delivery The source authentication methods that include a hash of the message provide MIC Non-repudiation Private-key signing provides non-repudiation. Secret-key method requires a "Notary" to "Sign" a time-stamp + hash of the message Proof of Delivery Acknowledge 3

Sign (optional) PGP Email: before Encryption (also optional) 4 From "PGP Freeware for MacOS, User's Guide" Version 6.5, Network Associates, Inc., www.pgp.com 4

How PGP Encryption Works with signature attached if there is one How PGP Encryption Works From "PGP Freeware for MacOS, User's Guide" Version 6.5, Network Associates, Inc., www.pgp.com 5