Pretty Good Privacy (PGP)

Slides:



Advertisements
Similar presentations
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Prepared by: Nahed Al-Salah
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Computer Security and Penetration Testing
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Masud Hasan Secue VS Hushmail Project 2.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic mail security. Outline Pretty good privacy S/MIME.
Area Of Study 2 Information And Communications Technology(ICT)
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Pretty Good Privacy (PGP) Security for Electronic .
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Digital Signatures and Digital Certificates Monil Adhikari.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Security is one of the most widely used and regarded network services
Meganet Corporation VME Mail 2004
Topic 1: Data, information, knowledge and processing
An Installation Guide of PGP on Windows 2000
Exercise 8: Securing Pretty Good Privacy
Presentation transcript:

Pretty Good Privacy (PGP) By: Melissa Hudkins

Outline History of the software How does it work How safe is it Who is using PGP Availability of software Alternatives

Who Created PGP? Philip Zimmermann wrote the initial program. He worked as a computer security consultant in Boulder, Colorado during the original days of PGP. Other programmers around the world have created subsequent versions of PGP. The newest versions of PGP are created by a California based corporation called Network Associates, which bought a previous company, co-founded by Zimmermann, called PGP, Inc.

What Is PGP? PGP is a type of Public Key cryptography. It is a computer program that encrypts (scrambles) and decrypts (unscrambles) data. When you begin using PGP , it generates two keys that belong uniquely to you. One PGP key is Private and stays in your computer, while the other key is Public. You give this second key to your correspondents For example, PGP can encrypt the word “Andre” so that is reads, “457mrt%$354.” It can also decrypt this back into “Andre” if you have PGP.

How Does PGP Work? You take a message and encrypt it, then you send it out and the message is decrypted to the reader. When a message is sent out, it also must have a digital signature.This allows persons who have PGP and my public key to verify that I wrote the document, and that nobody has altered the text since I signed it. Here is an example, Suppose Jane wants to correspond with Fred. If Jane prepares a message and encrypts it with Fred’s Public Key, only Fred can decrypt the message using his Private Key. If Jane prepares a message and encrypts it with her Private Key, then anyone, including Fred can decrypt the message. But only Jane could have encrypted the message, therefore the encrypted message is, in effect,signed by Jane. PGP is similar to your telephone number. You can advertise your Public Key the same way as you do your telephone number. If I have your telephone number, I can call you, however I cannot answer your telephone. Similarly, if I have your Public Key, I can send you mail, however I cannot read your mail.

How Safe Is PGP? Will it protect my privacy? Top-rate cryptographers and computer experts have tried unsuccessfully to break PGP PGP’s most knowledgeable users around the world would broadcast the news at once if it happens To date, nobody has publicly demonstrated the skill to outsmart PGP. (September 1999)

Aren’t Computers and E-mail Already Safe? Your computer files unless encrypted can be read by anyone with access to your machine. Typical E-mail travels through many computers, the individuals who run these computers can read, copy and store your mail. Many competitors are highly motivated to intercept your E-mail. Sending your business, legal, and personal mail through computers is even less confidential then sending the same material on a postcard. PGP is one secure envelope that keeps busybodies, competitors, and criminals from victimizing you.

Who Uses PGP Encryption? Individuals who are valuing privacy are the ones using PGP. Taxpayers storing IRS records, politicians running election campaigns and journalists protecting their sources are just a few examples of individuals using PGP to keep their computer files and their E-mail confidential. Businesses also use PGP to protect their customers, their employees and themselves.

Availability of PGP There are many versions of PGP available for use. DOS, Windows, and various Unixes, Macintosh, Amiga, Atari ST, and OS/2 systems. The versions of PGP are mutually compatible. Many versions of PGP are free. Individuals from New Zealand to Mexico use these versions every day. They are free from the Massachusetts Institute of Technology web site. The corporate-produced versions of PGP are normally priced software.

McAfee PGP Version McAfee created it’s own version of PGP that adds some extra tools for encrypting just about anything. McAfee created a new version, 6.5.1 for customers to purchase now. It is also available in retail outlets for $19.95 and costs $14.95 for current customers to upgrade. It has a base level of encryption at 4906 bits, PGP goes far beyond the security levels in most encryption software. Browsers often come with low-level 40-bit encryption keys, which a hacker can break relatively easily. The more bits in the key, the more secure your data will be. The White House has now approved export of encryption products of any length, except to a handful of countries.

Added Features McAfee added automated electronic data shredding, intended to keep hackers from recovering files that you have deleted or files in the free space area of your hard drive Usually the recipient of an encrypted file needs a copy of the encrypting software to open it. McAfee’s program provides self-decrypting archives, so you can exchange information with people who do not have PGP It also creates an invisible password-protected drive on your computer to protect information