Email Security Using PGP - Prajakta Bahekar. Importance of Email Security Email is one of the most widely used network service on Computer Currently email.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptographic Technologies
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Electronic mail security -- Pretty Good Privacy.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Firewalls. 2 What is a firewall? Device that provides secure connectivity between networks (internal/external; varying levels of trust) Used to implement.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Pretty Good Privacy (PGP) Security for Electronic .
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
NSP 02 - Electronic Mail Security1 Electronic Mail Security Ch 15 of Cryptography and Network Security - Third Edition by William Stallings Modified from.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Security is one of the most widely used and regarded network services
Chapter 15 – Electronic Mail Security
CSE565: Computer Security Lectures 19, 20 Electronic Mail Security
Selected Research Topics Electronic Mail Security
Electronic Mail Security
Security in Network Communications
Electronic Mail Security
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Electronic Mail Security
Cryptography and Network Security
Presentation transcript:

Security Using PGP - Prajakta Bahekar

Importance of Security is one of the most widely used network service on Computer Currently message contents are not secure. s without encryption is similar to send mail by postcard.

Goal of Security Confidentiality  A message is concealed by encoding it. Authentication  Ensuring that information is accessible only to authorized person. Message integrity  Ensures that the message received is the same as the message that was sent

One possible solution : PGP Pretty Good Privacy developed by Phil Zimmermann PGP is a key encryption program mainly intended for privacy and authentication. PGP encryption uses asymmetric key encryption algorithms. A PGP key is a piece of data used to crypt and/or sign the message ; it has a keyid and contains the name and address of the owner.

Why PGP ? Its building blocks are made of the best available cryptographic algorithms: RSA, DSS, Diffie- Hellman. [2] It is independent of operating system and processor. A Web of Trust - A web of trust is a bunch of PGP keys plus the connections between them, formed by key signings.

PGP a Trust Model

PGP Operation – Authentication 1. Sender creates a message 2. SHA-1 used to generate 160-bit hash code 3. The hash code is encrypted with RSA using the sender’s private key, and result is attached to message 4. Receiver uses RSA or DSS with sender’s public key to decrypt and recover hash code 5. Receiver generates new hash code for message and compares with decrypted hash code, if match, message is accepted as authentic

PGP Operation – Confidentiality 1. Sender generates message and random 128-bit number to be used as session key for this message only 2. Message is encrypted, using CAST-128 / IDEA/3DES with session key 3. Session key is encrypted using RSA with recipient's public key, then attached to message 4. Receiver uses RSA with its private key to decrypt and recover the session key 5. Session key is used to decrypt message

PGP Operation Summary

Conclusion PGP is a remarkable phenomenon that provides confidentiality, authentication, and compression for . [1] It is platform independent. Web of Trust makes it really easy to use. It is not controlled by any government.

References 1. Zimmerman P. Pretty Good Privacy: a digital data encryption program. Available from : Garfinkel S. PGP: Pretty Good Privacy OReilly; p.