Key management issues in PGP

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Using Public Key Cryptography Key management and public key infrastructures.
Digital Signatures and Digital Certificates Monil Adhikari.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
and File Security With GnuPG Matt Brodeur
Web Applications Security Cryptography 1
Public Key Infrastructure (PKI)
Basics of Cryptography
Security is one of the most widely used and regarded network services
Cryptography and Network Security
Computer Communication & Networks
Cryptography and Network Security
CS480 Cryptography and Information Security
Authentication Applications
Security Services for
Public Key Infrastructure (PKI)
Introduction to PKI Novell BrainShare 2002 Tammy Green
S/MIME T ANANDHAN.
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Cryptography and Network Security
Security in ebXML Messaging
Public Key Infrastructure
Security at the Application Layer: PGP and S/MIME
Chapt. 10 – Key Management Dr. Wayne Summers
Digital Certificates and X.509
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
CDK: Chapter 7 TvS: Chapter 9
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Public-Key, Digital Signatures, Management, Security
e-Security Solutions Penki Kontinentai Vladas Lapinskas
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Instructor Materials Chapter 5: Ensuring Integrity
Cryptography and Network Security
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Key management issues in PGP Logan Wang Key management issues in PGP

Public Key Cryptography Is an encryption scheme that uses two keys Can provide confidentiality, authentication, integrity and non- repudiation Allows for more than just encryption/decryption Digital signatures Message integrity Key exchange

Key management system Manages public keys that have been collected Verifies the private key is legitimate The way in which this is done is where PGP and PKI are different

PKI (Public Key Infrastructure) Usually Hierarchical model Certificates are public keys that have been signed by another entity CA (Certification Authority) issues certificates Root CA – self signed certificate CRL – Certificate revocation list X.509 certificate (not a complete list) Subject and subject key Issuer Validity period Certificate signature

PKI Hierarchical system, relies on trustworthy CA

PGP (Pretty Good Privacy) Created by Phil Zimmermann and released on the internet in 1991 Provides cryptographic protection of files and email PGP is now commercial, but there is free versions for non- commercial use OpenPGP is a set of standards which describes the formats for encrypted messages, keys, and digital signatures. GPG (GNU Privacy Guard) – open-source implementation of the standards set by OpenPGP, is the usual implementation found on Linux systems.

PGP – Key management Supports the Web Of Trust model PGP software will generate keys for the user and help user manage them A PGP Key consists of: Owner’s name the numerical value of the key what the key is to be used for (e.g., for signing; for encryption) the algorithm the key is to be used with, e.g. El Gamal; RSA; DSA an expiration date

PGP – Key management Need to store lots of keys Own private key (stored encrypted) Own public key and public keys of others (stored in the open) PGP software stores them in a file, called “keyring” Keyring also stores certificates of other people which have been signed by the user A public key stored in the user’s public keyring will have: PGP key information The trust, assigned by the user: Full trust Marginal trust Untrusted Unknown Zero or more signatures

PGP – Web of trust Community based trust model that entirely rely on its users Everybody is a CA, every user can sign certificates The idea of Web of trust is that you verify someone’s identity and decide to trust in them to trust people for you Public key sharing done: Physically Key servers Email or friends

Web of trust Sources for images: https://0x00sec.org/t/pgp-the-web-of-trust/1404 http://www.phillylinux.org/keys/historical.html – graphed with sig2dot

Web of trust William Stallings, Cryptography and Network Security, Principles and Practice,  Prentice Hall, 1999.

PGP - revocation To revoke a certificate: User needs to generate the revocation information when they create the key If key is lost, it’s impossible to generate the revocation information Only user can revoke certificate Telling everyone about the revocation: Need to publish at all locations where the public key was provided Hard to know who has it

PGP Key management issues Lack of standards for identification verification Allows each person control Revocation notification Need to maintain keys, web of trust, and to configure mail client Can be tricked into receiving illegitimate keys Quite complicated for the average user Can be difficult for a new certificate to get in

Key signing party

PGP VS PKI Quick, easy to set up Does not require entire infrastructure Good for informal groups Certificate has multiple levels of trust Revocation is harder Lack of standards Distribute to a large amount of users More control over subordinates Certificate is either trusted or not trusted Revocation is easier Clear standards

PGP – secrecy issues No forward secrecy Forward secrecy means that encrypted communications and sessions recorded in the past cannot be retrieved and decrypted, if the secret key or password is compromised in the future Example: Alice and Bob establish communication, Eve is listening and stores all encrypted messages. Sometime later, Eve is able to obtain Bob’s private key. Eve can now read all of Bob’s past emails. Additionally Eve has evidence in the form of a cryptographic digital signature that Alice was the one who sent the messages. Not very private

Alternatives Signal It uses the Internet to send one-to-one and group messages, which can include images and video messages, and make one-to-one voice and video calls. Signal uses standard cellular mobile numbers as identifiers, and uses end-to-end encryption to secure all communications to other Signal users. The applications include mechanisms by which users can independently verify the identity of their messaging correspondents and the integrity of the data channel. BUT it’s not email

Solution Is there a need for one? Secrecy is important but… PGP is reliable old technology that provides adequate encryption to those who need it No new technology for email has been developed and if that technology was to be developed can it be trusted and deployed

Questions?