PGP Key Management Basic Principles

Slides:



Advertisements
Similar presentations
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
Advertisements

1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Public Key Cryptography and GnuPG CPT 555 Network Security.
Summer School Certificates Diego Romano & Gilda Team.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Pretty Good Privacy – How to do it. Tony Brett IT Systems Manager Corpus Christi College OxCERT Tel. (2)76695 OUCS ITSS lunchtime.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
DePaul Information Security
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Apache Security with SSL Using FreeBSD SANOG VI IP Services Workshop July 18, 2005 Hervey Allen Network Startup Resource Center.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Masud Hasan Secue VS Hushmail Project 2.
How to use the right way ^ securely. Disclaimer  /me is not Mac literate Ask Ryan ;-)  Things may go wrong Grab the back of your pants and let’s.
Beginning PGP 2600 JAN09. What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Principle, utilization and limitations for secure electronic mail systems FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Segurança em Sistemas Informáticos.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Apache Web Server Quick and Dirty Ayitey Bulley for AfNOG 2011 (Originally by Joel Jaeggli for AfNOG 2007) ‏
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Digital Signatures and Digital Certificates Monil Adhikari.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Security & Cryptographic Methods
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Security with SSH Unix System Administration Workshop AfNOG 2007 Hervey Allen.
Security with SSH ISP Services Workshop SANOG 9 Hervey Allen.
Pertemuan #12 Pretty Good Privacy (Pretty Good Privacy) Kuliah Pengaman Jaringan.
PGP Introduction and Keysigning Joel Jaeggli For SSE AFNOG 2011.
and File Security With GnuPG Matt Brodeur
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Chapter 5a - Pretty Good Privacy (PGP)
Key management issues in PGP
Holland Computing Center STAT802 Create and access Anvil Windows 10 SAS instance 01/23/2017.
Internet Business Associate v2.0
Public Key Infrastructure (PKI)
PGP Key Management Basic Principals
Tutorial on Creating Certificates SSH Kerberos
Apache Security with SSL Using FreeBSD
cctld Workshop Georgetown, Guyana Hervey Allen
Unix System Administration
GnuPG The GNU Privacy Guard
(Originally by Joel Jaeggli for AfNOG 2007)‏
Fundamental Concepts in Security and its Application Cloud Computing
PGP Key Management Basic Principals
Tutorial on Creating Certificates SSH Kerberos
CS 465 Secure Last Updated: Nov 30, 2017.
CIW Lesson 7 Part A Name: _______________________________________
Keep it private.
Using SSL – Secure Socket Layer
Encryption The Good kind of obscurity
asymmetric cryptography
Homework #05 SSL and TLS Announce: Due:
An Installation Guide of PGP on Windows 2000
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
A Programmer’s Guide to Secure Connections
Security Risanuri Hidayat 21 February 2019 security.
Post Install Configuration FreeBSD
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

PGP Key Management Basic Principles cctld Workshop February 14, 2007 Georgetown, Guyana Hervey Allen

Core Concepts To encrypt data so that it can be read by one person, you need that person's public key. To decrypt data someone sent to you, you need your private key. To sign some data, you use your secret key. To check a signature on some data, you use the public key of the person who used it.

How do you do all This? Using gpg commands at the command line and manipulating text files with them. Using built-in tools in your operating system, or your email client.

Practical Aspects As in what are the initial steps? Install GPG (as a port on FreeBSD). Create a public/private key pair. This is associated with your email address. Extract your public key. Maybe post it somewhere like http://pgp.mit.edu/ Create your key fingerprint. Sign someone's public key. Check out http://www.gnupg.org/

A Few Notes

Install GPG We'll install via ports. If your ports tree is not up-to-date you might install an older version of GnuPG. You can always install like this: pkg_add -r gnupg

Create Public/Private Key Pair Don't forget expiry date passphrase on private? What if none? What does this mean? How is this related to ssh?

Extract your Public Key to Text Why? What do you do with this? Answers: Export to pgp key server Place in email Have people sign it – why? Cool Effect – Still awake?

Create a Key Fingerprint Why? What does this do? Where might you use it? Answers: Bottom of email? Pgp key server

Sign Someone's Public Key What's the first step? This is the “web of trust” Where do the “signatures” go? - pgp key server

What will you use this for? ?? Passwords in email Financial information Contracts Other?

Let's go do it!