1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy.

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

International Data Encryption Algorithm
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Public Key Encryption Algorithm
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
Electronic mail security -- Pretty Good Privacy.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Electronic Mail Security
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 15: Electronic Mail Security
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Public Key Encryption.
Pretty Good Privacy (PGP) Security for Electronic .
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
PGP Stephen Smith – December 11, Outline - Pretty Good Privacy  History  How It Works  How To Use It  Questions  I Get Taken Away In Handcuffs.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public-key Cryptography
Security through Encryption
PART VII Security.
Security in Network Communications
Rivest, Shamir and Adleman
International Data Encryption Algorithm
Presentation transcript:

1 SC700 A2 Internet Information Protocols 4/17/2001 Application Presentation by J. Chu Pretty Good Privacy

2 SC700 A2 Internet Information Protocols 4/17/2001 Pretty Good Privacy (PGP) The first version of PGP was programmed in 1991 by Phil R. Zimmerman, who later founded PGP Security Consulting. PGP is one of the most popular encryption and authentication algorithm world-wide. PGP is more widely used in electronic mail security than any other areas. Pretty Good Privacy – J. Chu Phil R. Zimmerman Background

3 SC700 A2 Internet Information Protocols 4/17/2001 Pretty Good Privacy (PGP) PGP is a hybrid cryptosystem; it is a combination of some of the best known encryption algorithms in existence. While PGP has the speediness of a symmetric-key encryption algorithm, it maintains the high level of security of a public-key encryption algorithm. Pretty Good Privacy – J. Chu Background (continues)

4 SC700 A2 Internet Information Protocols 4/17/2001 Pretty Good Privacy (PGP) "If all the personal computers in the world million - were put to work on a single PGP-encrypted message, it would still take an estimated 12 million times the age of the universe, on average, to break a single message.” - Deputy Director William Crowell National Security Agency 3/20/1997 Pretty Good Privacy – J. Chu Background (continues)

5 SC700 A2 Internet Information Protocols 4/17/2001 Why choose PGP over RSA? RSA is very secured given a large enough key. However, it is definitely no fun having to compute 567^2 128 for every single letter in order to encrypt or decrypt a message. During the 80’s and early 90’s, not too many computer in the world can handle such complex computations in a short period of time. This is when PGP comes in…It is fast, secured, and best of all, everyone** can use! (**note: by publishing the source code of PGP on the Internet, Phil Zimmerman actually got prosecuted by the United States Government for exporting a weapon.) Pretty Good Privacy – J. Chu Introduction

6 SC700 A2 Internet Information Protocols 4/17/2001 The following algorithms are employed by PGP: 1.IDEA Cipher - developed by James Massey & Xuejia Lai in RSA Public Key Encryption - developed by Rivest, Shamir, and Adelman in GZIP - A combination of Lempel-Ziv and Huffman Encoding Pretty Good Privacy – J. Chu Introduction (continues)

7 SC700 A2 Internet Information Protocols 4/17/2001 About the IDEA cipher: 1.IDEA: International Data Encryption Algorithm 2.Message is encrypted with a 128-bit IDEA key via different combinations of operations: a. Additions (mod 2 16 ) b. Multiplication (mod ) c. Additions (mod 2) (i.e. XOR) 3.There are currently no known effective attacks against the IDEA cipher. Pretty Good Privacy – J. Chu Algorithm

8 SC700 A2 Internet Information Protocols 4/17/2001 The IDEA cipher algorithm: 1.Original text is divided into 64-bit blocks. 2.Each 64-bit block is further divided into four 16-bit sub- blocks: X 1, X 2, X 3, X 4. 3.The 128-bit IDEA session key is divided into eight 16-bit key-blocks: K i,1, K i,2, K i,3, K i,4, K i,5, K i,6, K i,7, K i,8. 4.Addition and Multiplication are perform on each block of X n and K i,j. 5.The combination of operations are performed eight times to get the final encryption. Pretty Good Privacy – J. Chu Algorithm (continues)

9 SC700 A2 Internet Information Protocols 4/17/2001 IDEA Algorithm: Pretty Good Privacy – J. Chu Algorithm (continues)

10 SC700 A2 Internet Information Protocols 4/17/2001 Problems with IDEA cipher: 1.IDEA is a symmetric-key cryptosystem. In order to decrypt a cipher, one must know the very same key that is used to encrypt the message. 2.Since the IDEA key is 128-bit long, it is not easy to memorize and therefore it must be recorded. Pretty Good Privacy – J. Chu Algorithm (continues)

11 SC700 A2 Internet Information Protocols 4/17/2001 PGP Improvements: 1.Instead of using the the same key each time, PGP randomly generated a new IDEA key for every session. The same message sent at different times will be totally different and remembering the key will be useless and unnecessary. 2.The IDEA key is encrypted via RSA public key encryption algorithm. Decryption can be achieved only by those who knows the complementary key. 3.PGP compresses packages with GZIP. Pretty Good Privacy – J. Chu Algorithm (continues)

12 SC700 A2 Internet Information Protocols 4/17/2001 How PGP Encrypts: 1.Original text is encrypted into IDEA cipher text with a 128-bit random key via IDEA encryption. 2.The IDEA session key is encrypted with a large public key via RSA encryption. 3.The encrypted IDEA session key is appended to the IDEA cipher text. 4.GZIP is used to compress the data into a PGP package. Pretty Good Privacy – J. Chu Algorithm (continues)

13 SC700 A2 Internet Information Protocols 4/17/2001 How PGP Encrypts: Pretty Good Privacy – J. Chu Algorithm (continues)

14 SC700 A2 Internet Information Protocols 4/17/2001 How PGP Decrypts: 1.PGP package is decompressed and is separated into the encrypted IDEA session key and the encrypted IDEA cipher text. 2.IDEA session key is decrypted with RSA private key. 3.IDEA session key decrypts the IDEA cipher text into the original plain text. Pretty Good Privacy – J. Chu Algorithm (continues)

15 SC700 A2 Internet Information Protocols 4/17/2001 How PGP Decrypts: Pretty Good Privacy – J. Chu Algorithm (continues)

16 SC700 A2 Internet Information Protocols 4/17/2001 PGP over IDEA & RSA: Although IDEA and RSA are very strong encrypting algorithms, they do have their weaknesses: IDEA uses a single and lengthy key while RSA employs complex and lengthy computations. By combining both IDEA and RSA, PGP uses the strengths of one algorithm to compensate for the weaknesses of the other. As the result, PGP is one of the strongest and fastest encrypting algorithm in existence. Pretty Good Privacy – J. Chu Conclusion

17 SC700 A2 Internet Information Protocols 4/17/2001 Back, Adam, “PGP Timeline.” “ Brown, Lawrie, “Cryptography and Computer Security.” “ Davie and Peterson, Larry L., Computer Networks. 2 nd ed. Boston: Morgan Kaufmann, Page Feisthammel, Patrick, “PGP – Pretty Good Privacy.” “ Gimon, Charles A., “The Phil Zimmerman Case.” “ “PGP International Homepage.” “ “PGP Security BIND vulnerability COVERT CyberCop Gauntlet.” “ Pretty Good Privacy – J. Chu References