Beginning PGP 2600 JAN09. What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Outline Project 1 Hash functions and its application on security Modern cryptographic hash functions and message digest –MD5 –SHA.
Behavior Report Setting Up Your Account. Logging in to the Software URL makingitbettercms.intercedeservices.com.
Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 8, 2012.
Public Key Cryptography and GnuPG CPT 555 Network Security.
Login to University Web Site Enter in to login in which click Institution login.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Using GPG - the GNU Privacy Guard Why does a security professional need this skill ? 3 GPG HOWTO's Use by checking Correspondents' Keys Directly Using.
Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Electronic mail security -- Pretty Good Privacy.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
DePaul Information Security
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Crypto Party ATX Shameless self-promotion Visit us at Step-by-step guides on how to encrypt your s,
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Tanner Lovelace – Slide 1 RshqSJS/JqxSJ Hqfubswlrq Wdqqhu Oryhodfh Wuldqjoh Olqxa Xvhuv Jurxs 11-Dsulo-2002.
Security SIG August 19, 2010 Justin C. Klein Keane
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Electronic Mail Security
Unit 19 INTERNET SECURITY
How to use the right way ^ securely. Disclaimer  /me is not Mac literate Ask Ryan ;-)  Things may go wrong Grab the back of your pants and let’s.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
By: Surapheal Belay ITEC ABSTRACT According to NIST SP : “ Mail servers are often the most targeted and attacked servers on an organization’s.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Network Security: Lab#4-1 Security J. H. Wang Dec. 3, 2013.
Principle, utilization and limitations for secure electronic mail systems FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Segurança em Sistemas Informáticos.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Distribution Development Security Jeremiah Yongue.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Security SIG August 19, 2010 Justin C. Klein Keane
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
Network Security: Security. Objectives To learn to use security tools –PGP To learn the availability of security libraries –S/MIME.
An electronic phytosanitary certificate. Is NOT a copy of a printed phytosanitary certificate that is ed. Is a secured data set using XML for transmission.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
PGP Stephen Smith – December 11, Outline - Pretty Good Privacy  History  How It Works  How To Use It  Questions  I Get Taken Away In Handcuffs.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Total Encryption. Encryption? Encryption? Cryptography.
LOCAL ENCRYPTION Using GPG keys in conjunction with UNIX password manager “Pass”.
Encryption Encryption has been around a long time. From the simple Ceaser cipher thru the Enigma wheel.
PGP Introduction and Keysigning Joel Jaeggli For SSE AFNOG 2011.
and File Security With GnuPG Matt Brodeur
Secure .
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Key management issues in PGP
Internet Business Associate v2.0
PGP Key Management Basic Principals
GnuPG The GNU Privacy Guard
Protecting Client Confidentiality for Volunteers and Agency Staff
PGP Key Management Basic Principals
CS 465 Secure Last Updated: Nov 30, 2017.
Gmail Technical Support Number Toll Free Number Visit:
asymmetric cryptography
PGP Key Management Basic Principles
Exercise 8: Securing Pretty Good Privacy
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Beginning PGP 2600 JAN09

What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer programs that implement the OpenPGP standard.

Who? - Phil Zimmerman Created PGP in 1991 Arms Trafficker? Given Book Cred in the Da Vinci Code

Who? - Werner Koch Initially Developed GnuPG in 1999 Head of Office and German Vice- Chancellor of the Free Software Foundation Europe.

Why? – All your crap is cleartext Data – See above

How? Create your keys – gpg --gen-key Follow prompts – gpg --list-keys To Confirm Create your revocation key – gpg --output revoke.asc --gen-revoke $KEYID

How? Exporting keys – gpg --armor --output jberg.asc --export – Put jberg.asc whereever you want

How? Importing keys – gpg --import jberg.asc – gpg --list-keys – gpg --edit-key Command> fpr Command> sign (follow prompts) Command> check

Now What? Send signed and/or encrypted – Thunderbird /w Enigmail (32-bit only currently) – Mutt – Kmail

Now What? Encrypt your crap – To create an encrypted file gpg -c test.txt (then enter your password) – To decrypt an encrypted file gpg test.txt.gpg – Useful if you don't trust where your files are stored.

Now What? Encrypt your crap to send to people with keys – gpg --armor --encrypt file.tar.gz ensure you've imported the key of who you're sending to Decrypt his/her crap – gpg --decrypt file.tar.gz.asc

References GnuPrivacyGuardHowtohttps://help.ubuntu.co m/community/GnuPrivacyGuardHowtohttps://help.ubuntu.co m/community/GnuPrivacyGuardHowto Linux HOWTO: Secure Your Data with PGP, Part 1 aA Linux HOWTO: Secure Your Data with PGP, Part 2 Wyo