asymmetric cryptography

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Public Key Cryptography and GnuPG CPT 555 Network Security.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
Principles of Information Security, 2nd edition1 Cryptography.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Cryptographic Technologies
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
David L. Wasley Office of the President University of California Maybe it’s not PKI … Musings on the business case for PKI EDUCAUSEEDUCAUSE PKI Summit.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Tanner Lovelace – Slide 1 RshqSJS/JqxSJ Hqfubswlrq Wdqqhu Oryhodfh Wuldqjoh Olqxa Xvhuv Jurxs 11-Dsulo-2002.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
X.509 Certificate management in.Net By, Vishnu Kamisetty
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Digital Signatures and Digital Certificates Monil Adhikari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Digital Signatures with TheSign Digital Signatures for Newbies Digital Signatures are a clever approach of using complex mathematics in real life work.
PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
2B Data Security of Workstations 1 March - May 2009 OpenPGP 2B6309 Data Security of Workstations Lars Noodén ( )
PGP Introduction and Keysigning Joel Jaeggli For SSE AFNOG 2011.
and File Security With GnuPG Matt Brodeur
Secure .
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Chapter 5a - Pretty Good Privacy (PGP)
Key management issues in PGP
RSA Laboratories’ PKCS Series - a Tutorial
Digital Signatures.
Electronic mail security
Public Key Infrastructure (PKI)
Basics of Cryptography
PGP Key Management Basic Principals
Public-Key Cryptography and Message Authentication
DTTF/NB479: Dszquphsbqiz Day 26
Cryptography Why Cryptography Symmetric Encryption
GnuPG The GNU Privacy Guard
Public-Key Cryptography and RSA
Chapter 8 Network Security.
PGP Key Management Basic Principals
MAIL AND SECURITY PERTEMUAN 13
IS3230 Access Security Unit 9 PKI and Encryption
DIGITAL SIGNATURE CERTIFICATE SERVICE PROVIDER IN NOIDA DIGITAL CERTIFICATE.
Public Key Infrastructure
Digital Signatures Campbell R. Harvey Duke University, NBER and
Chapt. 10 – Key Management Dr. Wayne Summers
Lecture 4 - Cryptography
Electronic Mail Security
DTTF/NB479: Dszquphsbqiz Day 27
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
PGP Key Management Basic Principles
PKI (Public Key Infrastructure)
Fluency with Information Technology Lawrence Snyder
Electronic Mail Security
….for authentication and confidentiality PGP
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

asymmetric cryptography by David Kumar

Content What is a asymmetric Cryptosystem? How Public Keys can be trusted GnuPG Creating Key pair Handle the keys Thunderbird Questions?

Review: asymmetric cryptography Public Key Secret Key Review

How Public Keys can be trusted Authority Infrastructures Public Key Infrastructure (PKI) Financial transaction Cross certification Company's Web of Trust GnuPG Review How Public Keys can be trusted

Public Key Infrastructure Often used in combination with Hardware Review How Public Keys can be trusted

Cross certification Review How Public Keys can be trusted

Web of Trust allows anyone to sign anyone else's public key Review How Public Keys can be trusted

GnuPG Under GNU General Public License Web of Trust Command line Tool But there are some GUI’s for: Instant messaging Email Etc. http://www.gnupg.org/ Review How Public Keys can be trusted  GnuPG

Creating Key pair gpg --gen-key (generates the sec. and pub. key) Algorithm: DSA/ ElGamal Key length 1024 – 4096 bits duration of validity Valid for ever Valid for specific time: days, weeks, month, years Personal Information Name, Email address Passphrase Review How Public Keys can be trusted  GnuPG

Creating Key pair Digital Signature Algorithm ElGamal (al-Dschamal) Based on Diffie-Hellman: Review How Public Keys can be trusted  GnuPG

Example GnuPG Key Review How Public Keys can be trusted  GnuPG -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.7 (MingW32) mQGiBEdXIhgRBADTv+EasL+ZVWbkb42eq37vNNmXD8JoNFCCaDrCdZmLrFc2S4Pq Wb63jmtlaZ0QG9BG8RcMxo7fPeoUZu1W6abHm29b+E1cDqBp8RdTrcRcbMnW9A5w Yrfga5Rc5f3eL9rRGcddq2zoSf86jNjoJoAuJWP20dPTTG7RtaqSazH12wCg1A8I MOrirxgsl/rxaNr+UoAUOykD/iOXD3jVIiLgGQi2pAgJlHANrtOj13FoUWLVYbuR QT+Sy6FI5uHxopYaj7B2FydWFeBZh16dtaFT0v5zR8auEDA7EIG0WldkmdRBo115 IS7MpSX6WGqoaRCH9sW/UO1Qz+ZEjSZ8T7nQTGvsa/pNmQQyIArTpf04gAfl+W2C kQ0lBADTuw90GAyNZBkgmYrJNFLjbMX/ogsmscuymHeTBMVTcN56EIQ4B09D6aq2 wQHDjBeEdSOUxnxGyq9yPiNjjzsZ/D3o51VFpITy57xvkWCmlflU9OJ/AF3mgYz+ rXxkHeuRzNR2oOfyDTGxD8hF5qXNsXxRuJzANgDqz9aflzBW07QkRGF2aWQgUy4g S3VtYXIgPGRza3VtYXJAY2xlbXNvbi5lZHU+iGAEExECACAFAkdXIhgCGwMGCwkI BwMCBBUCCAMEFgIDAQIeAQIXgAAKCRAwvq2f1WC3UrIpAJ4z4cO46tiq7U+wQQ1U JVeJWIMxBQCfRy9W+q/RNIIaOLFK7h+Lh/hGXle5Ag0ER1ciGBAIAMkRCgBtzkvM 3TQ/Boxwgzoy6w6gxOJQAArKKww+cI3FPEAp5LaZ3xlCgGIPTetJrIk07hBkdrxn MECTaQSTzsnwrBmkmwqJ+QCRZ7VNEwTHg2l5P5ag3fsVZUde77lcw9YXQ/U06aQy KHLw3urdy9tZNAf8lTneV1ySRug7EXhceJvGKOQGbpd/y8nxkSoiccGqtJixcDf+ 0T+UZ+AvG2nt62sDpknj06xP5L/IaFiordD4xse3dHfLkwCl6MT9FIy1i+GSTHTh Mji3/m+UMOzO3iPgDdiwXEG9NcCYN5ZdWauOmxzXi4963FFu8tTS9lrEJoBWnUvz V7VqQAqe1gcAAwUIAJG4J8VW8gNNMgLTRu8UliZptaPXVibqz7FvPNI1BcvxjUUg XjVLsuo1BtBgzt+CIDVbheIZdwJyEADoWW/szBbusWANVtH/oGrZHA7afJz4IfAq OBzk1Alo26LrPL2sqP4iaOvzQxO6PF4m4gGmzgkV+IKfG80fpUwiKGD1W9pLrvY9 h2+9h5bxqld+ojU3qa+E1GwYSNlyb8s/4t2u7V83+UaUXXiAq+YLABWGnVvkq8oZ juYiAm6W8pqt+6bF96szWx8L7Yr/72GFfFFX4ME9Q8IY8StLtttlUKb8dom2R5sI 4O5G5Lv9rd0qYL0r55ScXvR2r2kesVfpYhp+8AKISQQYEQIACQUCR1ciGAIbDAAK CRAwvq2f1WC3UudMAJ43HZzBbzMPSGXTkpvxnzRu3hl5jACdF3yjHtcvi6AUVD43 njN97QZLRu8= =6ABD -----END PGP PUBLIC KEY BLOCK----- Review How Public Keys can be trusted  GnuPG

Key Export / Import Export: Import Show all keys: gpg --export [UID] –o filename Why export? Import gpg --import [Datei] Why import? Show all keys: gpg --fingerprint Review How Public Keys can be trusted  GnuPG

Signing a Key gpg --edit-key UID Be careful to sign Keys! sign Review How Public Keys can be trusted  GnuPG

Thunderbird Enigmail Thunderbird Add-on: for GnuPG Review How Public Keys can be trusted  GnuPG

Enigmail Review How Public Keys can be trusted  GnuPG

Thunderbird Review How Public Keys can be trusted  GnuPG

Thunderbird Review How Public Keys can be trusted  GnuPG

Questions? Review How Public Keys can be trusted  GnuPG THE END