Public Key Cryptography and GnuPG CPT 555 Network Security.

Slides:



Advertisements
Similar presentations
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
1 Digital certificates One concern with the public key approach: must ensure that you are encrypting to the correct person’s public key  Otherwise, you.
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
By Xiaoheng Wu1 Cryptography Tool PGP. 2 Introduction Why PGP? History of PGP –First version released by Philip Zimmermann in 1991 Politics issue (Senate.
APACHE SERVER By Innovationframes.com »
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Tanner Lovelace – Slide 1 RshqSJS/JqxSJ Hqfubswlrq Wdqqhu Oryhodfh Wuldqjoh Olqxa Xvhuv Jurxs 11-Dsulo-2002.
Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Beginning PGP 2600 JAN09. What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Digital Signatures with TheSign Digital Signatures for Newbies Digital Signatures are a clever approach of using complex mathematics in real life work.
PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
and File Security With GnuPG Matt Brodeur
Key management issues in PGP
PGP Key Management Basic Principals
PGP Key Management Basic Principals
IS3230 Access Security Unit 9 PKI and Encryption
asymmetric cryptography
An Installation Guide of PGP on Windows 2000
Lecture 4 - Cryptography
PGP Key Management Basic Principles
Electronic Mail Security
Presentation transcript:

Public Key Cryptography and GnuPG CPT 555 Network Security

Class Objectives Students will be able to understand the importance of Public Key Cryptography. Students will implement GPG Students will be able to: –Create keypair –Import and export public keys –Revoke keys –Encrypt keys –Decrypt keys –Sign keys –Encrypt keys

Using GnuPG (gpg) Objectives: Key management –Create a keypair –Import and export public keys –Revoke a keypair Encryption and decryption Signing and authentication

Preparing to Create a Keypair Choose a good passphrase –long –hard to guess –contains special characters Choose an algorithm –DSA/ElGamal (recommended) –RSA Choose a key length –use the largest practical length –I recommend 2048 bytes

Creating the Keypair Create the keypair gpg --gen-key Create the revocation certificate gpg --gen-revoke Store hard copies of the keypair and certificate in a safe place

Exporting Your Public Key Export the key gpg --export uid > pubkey.gpg Creates a binary file Use --armor to create a text-encoded file gpg --armor --export uid > pubkey.asc Note: uid is any part of user name or keyID (last 4B of fingerprint). See below.

Publishing Your Key Reminder: Never publish your secret key Be sure your exported public key is correct and you have a revocation certificate! Put it on your web site, a floppy disk, a USB memory key, etc. Put the fingerprint in your signature, on your business cards, etc. Send your public key to a public key server gpg --send-key uid

Getting Public Keys Through a secure, out-of-band channel, get your correspondent’s fingerprint Usually, the last four bytes of the fingerprint are the key ID Get the key from your correspondent’s web site, floppy disk, key server

Importing Public Keys Check the fingerprint (use check command) 1F13 06BC EDB1 4BD BC F203 3CF8 CAF9 A5E1 Import the key –from a key server gpg --recv-keys 0xCAF9A5E1 –from a file ( puts the key on your keyring? ) gpg --import pubkey.asc Confirm the fingerprint ( that key is correct ) gpg --fingerprint username

Your Keyring Holds your public keys and imported public keys List all keys in your keyring gpg --list-keys With signatures gpg --list-sigs Delete a key ( on your key ring? ) gpg --delete-key uid

Signing Keys Only sign a key if you know it’s authentic –received through a secure channel –checked credentials of sender –checked fingerprint To sign a key, you must edit it gpg --edit-key uid Interactive mode Use the sign command Export the key so its owner can re-import it, complete with signature

Assigning Ownertrust How well do you trust the key’s owner to correctly verify keys? Assign ownertrust with the trust command 1.Don’t know 2.Do not trust 3.Trust marginally 4.Trust fully 5.Trust ultimately

Encrypting Messages Make sure you have all recipients’ keys gpg --recipient user1 --recipient user encrypt filename Creates a binary file, filename.gpg Use --armor to produce a text-encoded file, filename.asc Include yourself as a recipient with - -encrypt-to-self uid

Signing Messages Sign with your private key: gpg --sign filename Creates a binary file, filename.gpg Use --clearsign instead of --sign to leave the message in plain text, surrounding it by a text-encoded signature (filename.asc) Will prompt for passphrase (enter it securely!)

Signing and Encrypting Always do both (sign first, then encrypt) Just combine the commands to sign and encrypt in one step gpg --armor --recipient user1 --recipient user encrypt --sign filename Will prompt for passphrase (enter it securely!)

Decrypting and Authenticating Decrypting is GnuPG’s default behavior: gpg filename.gpg gpg filename.asc Either will produce filename Use --verify to verify the signature, thus authenticating the sender

References and Good Sites GPG Home Mini How-to The Diceware Passphrase Home Page Modular Arithmetic