Pretty Good Privacy: PGP An Encryption System by Philip R. Zimmermann -Mark, Dave, Bobby-

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
CRYPTOGRAPHY Modern techniques. Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster.
Cryptographic Technologies
PGP An example of Public Key Encryption software.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Security Jonathan Calazan December 12, 2005.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Pretty Good Privacy (PGP)
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Selected problems of the e-signature law and of its implementation Doc. RNDr. Daniel Olejár, CSc. Department of computer science Comenius University, Bratislava.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
The Web Wizard’s Guide to Freeware/Shareware Chapter One Software on the Internet.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Jeopardy CH4CH5CH6CH7 CH8 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.
Encryption.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Chapter 7: Cryptographic Systems
Public Key Encryption.
NETWORK SECURITY.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Lecture 2: Introduction to Cryptography
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Digital Signatures and Digital Certificates Monil Adhikari.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
DES: Data Encryption Standard
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
PGP Stephen Smith – December 11, Outline - Pretty Good Privacy  History  How It Works  How To Use It  Questions  I Get Taken Away In Handcuffs.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Key management issues in PGP
e-Health Platform End 2 End encryption
COEN 350 Network Security Introduction.
Security in Network Communications
Electronic Mail Security
Chapter 15: Making Decisions about Computers, Information, and Society
Presentation transcript:

Pretty Good Privacy: PGP An Encryption System by Philip R. Zimmermann -Mark, Dave, Bobby-

Childhood Born February 12 th, 1954 in Camden, New Jersey Born February 12 th, 1954 in Camden, New Jersey Independent Independent Dreamt of becoming an astronomer Dreamt of becoming an astronomer Became interested in codes while watching M.T. Graves and the Dungeon Became interested in codes while watching M.T. Graves and the Dungeon

Education Attended Florida Atlantic University in Boca Raton Attended Florida Atlantic University in Boca Raton Originally wanted to major in Physics Originally wanted to major in Physics Ended up majoring in Computer Science Ended up majoring in Computer Science Created his own code as his final project Created his own code as his final project Graduated University in 1978 Graduated University in 1978

Early Adulthood Got Married in 1977 to Kacie Cavenaugh (switchboard operator) Got Married in 1977 to Kacie Cavenaugh (switchboard operator) Worked for Harris Computer Systems Worked for Harris Computer Systems Moved to Boulder, Colorado and became a freelance computer consultant Moved to Boulder, Colorado and became a freelance computer consultant Founded Metamorphic Systems Founded Metamorphic Systems

PGP  Zimmermann released his first version of PGP in 1991  Designed to give the common user a means of totally secure communication  Originally distributed as freeware on the internet

What is PGP?  Hybrid of symmetric and asymmetric encryption systems Message encrypted with symmetric cipher (IDEA)Message encrypted with symmetric cipher (IDEA) Key encrypted with asymmetric cipher (RSA)Key encrypted with asymmetric cipher (RSA)  Message and key were then bundled and sent  Resulted in a secure and resource efficient cipher

The Release of PGP  PGP was publicly released onto the internet This meant that anyone internationally could see itThis meant that anyone internationally could see it

The Case U.S. Customs officials looked into ViaCrypt and Austin Code Works U.S. Customs officials looked into ViaCrypt and Austin Code Works The National Security Agency argued that it would difficult to keep tabs on hostile governments and foreign terrorists The National Security Agency argued that it would difficult to keep tabs on hostile governments and foreign terrorists Since WWII the US has regarded cryptographic software as a weapon of war Since WWII the US has regarded cryptographic software as a weapon of war

The Case Continued Because PGP had such a high strength, it was deemed impermissible to export Because PGP had such a high strength, it was deemed impermissible to export The PGP fell under the Arms Export Control Act The PGP fell under the Arms Export Control Act The main problem with the PGP was that it was simply too hard to decipher. The main problem with the PGP was that it was simply too hard to decipher. The PGP compromised National Security The PGP compromised National Security

The Defense Zimmermann along with ViaCrypt felt as though their rights were being infringed Zimmermann along with ViaCrypt felt as though their rights were being infringed Right to Privacy Right to Privacy Public access to secure cryptography Public access to secure cryptography Right to publish digital writings Right to publish digital writings Right to equal protection under the law Right to equal protection under the law Zimmermann was unable to pay for legal defenses to fight the government Zimmermann was unable to pay for legal defenses to fight the government

The Electronic Frontier Foundation The EFF responded to Zimmerman’s case through three separate actions The EFF responded to Zimmerman’s case through three separate actions Raised and contributed a great deal of funds to support Zimmermann legally Raised and contributed a great deal of funds to support Zimmermann legally Researched the facts of PGP and other related cases to prepare themselves for future cases Researched the facts of PGP and other related cases to prepare themselves for future cases Launched a First Amendment campaign in order to raise money and educate policy makers along with the general public Launched a First Amendment campaign in order to raise money and educate policy makers along with the general public

Case Conclusion Three years after the case began, all the charges were dropped in early 1996 Three years after the case began, all the charges were dropped in early 1996 Zimmerman was then free from any more governmental scrutiny Zimmerman was then free from any more governmental scrutiny

Conclusion After the case was dropped, Zimmermann founded his own company and continued to refine his product releasing an updated version of PGP along with other related products PGP has had a large effect in many important communications Questions?