PGP An example of Public Key Encryption software.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Security Jonathan Calazan December 12, 2005.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Week #7 Objectives: Secure Windows 7 Desktop
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Chapter 15: Electronic Mail Security
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Digital Signatures and Digital Certificates Monil Adhikari.
Private key
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Fall 2006CS 395: Computer Security1 Key Management.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Information Systems Design and Development Security Precautions Computing Science.
Pertemuan #12 Pretty Good Privacy (Pretty Good Privacy) Kuliah Pengaman Jaringan.
8 – Protecting Data and Security
Key management issues in PGP
Security Outline Encryption Algorithms Authentication Protocols
S/MIME T ANANDHAN.
Message Digest Cryptographic checksum One-way function Relevance
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Device Screen at Power Up.
CDK: Chapter 7 TvS: Chapter 9
Presentation transcript:

PGP An example of Public Key Encryption software

Company Was a personal project of Phil Zimmerman Then purchased by McAfee Software (maker of anti- virus software) The repurchased with a leveraged buyout It is now private

Published As a matter of policy, PGP makes their source code available for download at The software supplied here is the source code for the PGP Desktop product and includes the sources for the PGP Software Development Kit (SDK)

PGP (Pretty Good Privacy) What is PGP? Pretty Good Privacy (PGP) is strong encryption software that enables you to protect your and files by scrambling them so others cannot read them. It also allows you to digitally "sign" your messages in a way that allows others to verify that a message was actually sent by you. PGP is available in freeware and commercial versions all over the world. PGP was first released in 1991 as a DOS program that earned a reputation for being difficult. Current version is 9.5 and is idiot proof Available at

How Does PGP Work? When you install PGP, you will generate a pair of keys for yourself; a "paublic key" and a "private key". The private key is like a regular key. You will use it to unlock your messages. The public key is like a set of keyed-alike locks. You publish your public key (your lock) by sending it to a PGP key server on the Internet (PGP does this automatically) People who wish to send you private use a copy of your lock to lock the message. You keep the (private) key to yourself, so that only you can open and read the messages.

Applying the Keys

Digital Signatures PGP also allows you to sign a message or a file, with or without locking (encrypting) it. Each digital signature is uniquely generated by PGP based on the contents of the message and the signer's private key. The signature can be checked by anyone using the signer's public key. Since the signature is based partly on the contents of the message, if even one character of the message is changed, PGP will report that the signature is invalid. The signature is also based on the signer's private key, and the private key is held only by the signer, so recipients can be sure of exactly who signed the message.  while handwritten signatures are supposedly unique per signer, digital signatures are unique per document and signer. Written signatures can be photocopied from document to document and still appear valid. Digital signatures fail verification when applied to another document.

PGP Flowchart

Various flavors of PGP Determined by the particular communication path secured  PGP sent from client to client  PGP Disk Encryption: Screen to Disk  PGP Shredder: File to Delete  PGP Zip: Readable to compressed files  Etc.

Key Rings Just as you would carry a set of keys to various assets (safe, car, house, etc.) You carry keys to various data assets on your PGP Key ring PGP manages pairs, so that the private is kept secret, and the public is widely circulated

Key Generation and Passphrase You enter a long Passphrase that you can remember Which creates your unique keys  The longer the more secure You passphrase is required for all public key server updates  This way your public key is always under your control  Since people can find your private key on your key ring,  but they can never see your passphrase

Key Services Fingerprint When you get a public key from another source, you compare it to the fingerprint that they send you in the message The fingerprint may either be a Hexadecimal sequence, or a ‘biometric’ sequence of recognizable words

Key Services Subkeys You can have systems in PGP Keys  Similar to Master and individual keys for manual locks in an organization Normally master keys are for signatures  And subkeys are for encryption  Legally binding documents will demand this arrangement in some regions You also have an organization-wide Additional Decryption Key (ADK)  Where the security administrator gives you a particular additional set of keys (like classes of master keys in the real world)

Key Services Revocation You can grant various other people the right to revoke your key E.g., your employer’s PGP administrator This is used in conjunction with the larger Key and Security administration policy

Who can revoke a key? Obviously, a malicious (or erroneously) revocation of some (or all!) of the keys in the system will most likely be a system-wide failure It is impossible to arrange things so that this can not happen (if keys can be revoked at all) Because the principal having authority to revoke keys is very powerful,  the mechanisms used to control it should involve as many participants as possible to guard against malicious attacks,  while at the same time as few as possible to ensure that a key can be revoked without delay

How to distribute a new key After a key has been revoked, a new key must be distributed in some pre-determined manner. Assume that Carol's key has been revoked.  Until a new key has been disseminated, Carol is effectively silenced.  No one will be able to send her data without violating system security, and data coming from her will be discarded for the same reason. Or, in other words, the part of the system controlled by Carol is disconnected and so unavailable. The need for security was deemed higher than the need for availability in this design. One could lump together the authority to create new keys (and certify them) with the authority to revoke keys,  but there is no need to do so.  In fact, for reasons of security, this likely a bad idea.

How to spread the revocation The notification that a key has been revoked and should not be used again must be spread to all those that potentially hold the key, and as rapidly as possible. There are two means of spreading information (e.g., a key revocation here) in a distributed system:  either the information is pushed to users from a central point(s),  or it is pulled from a central point(s) to end users. Pushing the information is the simplest solution in that a message is sent to all participants. However, there is no way of knowing that all participants actually receive the message, and, pushing is not very securable nor very reliable. The alternative to pushing is pulling. In this setup, all keys are included within a certificate that requires the one using them to verify that the key is valid.

Recovery from a leaked key If loss of secrecy and/or authenticity is a system-wide failure, a strategy for recovery must be in place. This strategy will determine who has authority to revoke the key,  how to spread the revocation,  also how to deal with all messages encrypted with the key since the leak is recognized This recovery procedure can be extremely complicated, and while it is in progress the system might be very vulnerable to Denial of Service attacks