GnuPG The GNU Privacy Guard

Slides:



Advertisements
Similar presentations
X Window. Module 3 X Window ♦ Introduction The X Window System (‘X’ or ‘X11’) is a graphical windowing system that was developed at MIT in ♦ The.
Advertisements

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Welcome to the January Hacks/Hacker meeting: Encrypted communications Keep up with upcoming events about the future of storytelling and data on the OpenDataSTL.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
DePaul Information Security
Crypto Party ATX Shameless self-promotion Visit us at Step-by-step guides on how to encrypt your s,
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Mozilla Thunderbird Roderick Bautista Cheryl Knott Gyeong Lee Lee Raynes Kelly Santos.
Security SIG August 19, 2010 Justin C. Klein Keane
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Windows XP 101: Using Windows XP Professional in the Classroom.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Masud Hasan Secue VS Hushmail Project 2.
How to use the right way ^ securely. Disclaimer  /me is not Mac literate Ask Ryan ;-)  Things may go wrong Grab the back of your pants and let’s.
Beginning PGP 2600 JAN09. What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
SUSE Linux Enterprise Desktop Administration Chapter 2 Use the Linux Desktop.
Network Security: Lab#4-1 Security J. H. Wang Dec. 3, 2013.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
This example is a step by step walkthrough for installing the SRH Front Desk printer in Windows 7 (64 Bit).
To access our web services, go to……. Click on Customer Login.
Distribution Development Security Jeremiah Yongue.
XP Browser and Basics COM111 Introduction to Computer Applications.
GNOME, KDE and X Windows. The GNOME Project was started in 1997 to produce a free (as in freedom) desktop environment. GNU Network Object Model Environment.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Understand Internet Security LESSON Security Fundamentals.
Security SIG August 19, 2010 Justin C. Klein Keane
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
Network Security: Security. Objectives To learn to use security tools –PGP To learn the availability of security libraries –S/MIME.
ORGANIzED AT WORK PLACE. FreeMind is a free mind mapping aplication written in java. FreeMind is licensed under the GNU General Public License.  It provides.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
2B Data Security of Workstations 1 March - May 2009 OpenPGP 2B6309 Data Security of Workstations Lars Noodén ( )
LOCAL ENCRYPTION Using GPG keys in conjunction with UNIX password manager “Pass”.
Encryption Encryption has been around a long time. From the simple Ceaser cipher thru the Enigma wheel.
PGP Introduction and Keysigning Joel Jaeggli For SSE AFNOG 2011.
and File Security With GnuPG Matt Brodeur
Secure .
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Chapter 5a - Pretty Good Privacy (PGP)
Key management issues in PGP
Security is one of the most widely used and regarded network services
PGP Key Management Basic Principals
PGP Key Management Basic Principals
CS 465 Secure Last Updated: Nov 30, 2017.
CIW Lesson 7 Part A Name: _______________________________________
Lecture 13 RPM and its advantages.
How to Fix 1460 Error in Mozilla Thunderbird?. Mozilla Thunderbird is an open-source cross-platform, released in The program works as a center where.
MBOX Converter Convert MBOX to EML, MSG, RTF & HTML
asymmetric cryptography
Install Ruby If you are running on Mac OS X, Ruby is preinstalled.
An Installation Guide of PGP on Windows 2000
Windows XP 101: Using Windows XP Professional in the Classroom
PGP Key Management Basic Principles
Exercise 8: Securing Pretty Good Privacy
Cryptography and Network Security
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

GnuPG The GNU Privacy Guard

Lecture Outline PGP and OpenPGP GnuPG Using GnuPG GnuPG GUI Frontends KGPG GnuPG MUA Frontends GnuPG RSS Feed - http://www.gnupg.org/news.en.rss

PGP and OpenPGP PGP was originally developed by Phil Zimmermann as an email encryption software package. It was originally made available for free, in 1991. In 1997, the IETF formed the OpenPGP working group, who developed OpenPGP as a standard, RFC 2440.

GnuPG “GnuPG is a complete and free replacement for PGP. Because it does not use the patented IDEA algorithm, it can be used without restrictions.” -- GnuPG website It is an OpenPGP (RFC 2440) compliant application.

Using GnuPG Creating a key pair (secret and public key) Open your favorite terminal emulator, and run gpg --gen-key and follow the prompts. Exporting your public key. Run gpg --list-keys Find the key you wish to export, then run gpg --export [key id] > somename.asc You can then share the .asc file, put it on your website, whatever. Exporting your key to a keyserver. gpg --send-keys [key id, ids] -- keyserver [keyserver] A good keyserver (or rather set of keyservers) to use is hkp://random.sks.keyserver.penguin.de

Using GnuPG Importing Keys gpg –import keyname.asc Importing Keys from a Keyserver gpg --search-keys 'myfriend@his.isp.com' --keyserver [keyserver] Follow the prompts

Using GnuPG Encrypting files. gpg --encrypt --recipient [recipient] foo.txt If you wish to encrypt the file for yourself, the recipient is 'your name/email.' If you wish to encrypt the file and send it to a friend, the recipient is 'name/email of friend.' When the process finishes encryption, you will have a file named foo.txt.gpg. Decrypting files. gpg --decrypt foo.txt.gpg --output foo.txt Not using the --output option causes the decrypted file to be printed to stdout.

GnuPG GUI Frontends GPA – Aims to be the standard frontend for GnuPG KGPG – KDE frontend for GnuPG Seahorse – Gnome frontend for GnuPG GPGee - GPGee (GNU Privacy Guard Explorer Extension) is a shell extension that adds Windows explorer right-click menu support for GnuPGIs a MS- Windows program to integrate GnuPG into the Desktop.

KGPG KGPG is a frontend to GnuPG for KDE. It simplifies many of the everyday tasks involved in managing your keychain.

Web of Trust A Web of Trust is a network of keys used to sign each other, used to make a key appear more trustworthy to others, and to set the trust level of a key in GPG.

GnuPG MUA Frontends Enigmail – for Mozilla Thunderbird http://enigmail.mozdev.org/ Makes using PGP a breeze. Will sign, encrypt, decrypt, check, and even download keys from the keyserver(s). Many other email clients have OpenPGP/GnuPG support, or can be extended to include it. See:http://www.gnupg.org/(en)/related_software/frontends.html#mua