Presentation is loading. Please wait.

Presentation is loading. Please wait.

Pretty Good Privacy “ To PGP or not to PGP? “ Phil Zimmermann.

Similar presentations


Presentation on theme: "Pretty Good Privacy “ To PGP or not to PGP? “ Phil Zimmermann."— Presentation transcript:

1 Pretty Good Privacy “ To PGP or not to PGP? “ Phil Zimmermann

2 What are we going to do ? Background & Concept Background & Concept –Why Is PGP Popular? –PGP ’ s algorithms Operational Description Operational Description –Inside look on operations Key Management Key Management –The problem & Solution Web Of Trust Web Of Trust

3 Pretty Good Privacy First released in 1991, developed by Phil Zimmerman, provoked export control and patent infringement controversy. First released in 1991, developed by Phil Zimmerman, provoked export control and patent infringement controversy. PGP provides a confidentiality and authentication service PGP provides a confidentiality and authentication service - can be used for electronic mail and file storage - can be used for electronic mail and file storage applications. applications. Available as plug-in for popular e-mail clients, can also be used as stand-alone software. Available as plug-in for popular e-mail clients, can also be used as stand-alone software. - microsoft exchange - microsoft exchange - outlook - outlook

4 Why Is PGP Popular? Based on well known algorithms - “ The main idea ” Based on well known algorithms - “ The main idea ” –These algorithm have survived extensive public review and are considered extremely secure. –Integrated these algorithms into a general-purpose application It is availiable free on a variety of platforms (Windows, UNIX, Macintosh, etc.) It is availiable free on a variety of platforms (Windows, UNIX, Macintosh, etc.) –Open and free code. Wide range of applicability from corporations that wish to select and enforce a standerized secure to individuals Wide range of applicability from corporations that wish to select and enforce a standerized secure to individuals Independent – meaning Not developed or controlled by governmental or standards organizations Independent – meaning Not developed or controlled by governmental or standards organizations - Based on mutual trust between clients - Based on mutual trust between clients

5 Operational Description Actual operations of PGP consist of five services: AuthenticationAuthentication – DSS/SHA or RSA/SHA ConfidentialityConfidentiality – CAST or IDEA or RSA or 3DES CompressionCompression – A message may be compressed, for storage or transmission using ZIP E-mail compatibilityE-mail compatibility –To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII using Radix-64 may be converted to an ASCII using Radix-64 SegmentationSegmentation – To accommodate maximum message size limitations.

6 Authentication/Digital Signature  Sender creates a message  Sender generates a hash code of the message - uses SHA-1 algorithm in order to generates 160-bit hash code - uses SHA-1 algorithm in order to generates 160-bit hash code  Hash code encrypted with RSA (sender ’ s private key) - the result is prepended to the message - the result is prepended to the message  Receiver recover the hash code - uses RSA with the sender ’ s public key - uses RSA with the sender ’ s public key  Receiver generates new hash code of the message and compares the two codes. If the two match, the message is accepted as authentic. Note: - PGP only encryptes the hash-code of the message: - PGP only encryptes the hash-code of the message: more efficient in running time and in transfer time more efficient in running time and in transfer time

7 Authentication/Digital signature Message M H EP| Private key KRa ZIP UNZIP DP Compare H Message M Source ADestination B Public key KRb

8 PGP Signed Message -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is simply the text of the message. It has not been encrypted, simply signed -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.3 for non-commercial use Version: PGPfreeware 6.5.3 for non-commercial use iEYEARECAAYFAj5Ha6AACgkQ99/KQPj2cRNHsQCffKf64L wWQMfRIiKUfs6QrokB7twAnR5gDobzGapPgyLKQ0gL klj1WIIp=gXad -----END PGP SIGNATURE-----

9 Confidentiality/Encryption  Sender generates message and also a session key - The session key is a random 128-bit number to be used as a session - The session key is a random 128-bit number to be used as a session key for this message only key for this message only  Sender encryptes the message - Uses CAST-128 (IDEA or 3DES) algorithm with the session key - Uses CAST-128 (IDEA or 3DES) algorithm with the session key  Sender encryptes the Session key with RSA and prepended to the message  Receiver decrypt the session key - uses RSA with its private key - uses RSA with its private key  Receiver decrypt the message with the Session key Note: - PGP does not simply using RSA to encrypt the message directly. - PGP does not simply using RSA to encrypt the message directly. - Using CAST128 force us to share a key - using public-key algorithm solves the session key - Using CAST128 force us to share a key - using public-key algorithm solves the session key distrinution problem. distrinution problem. - Given “ Store-and-forward ” nature of e-mail, the use of handshaking to assure that both - Given “ Store-and-forward ” nature of e-mail, the use of handshaking to assure that both sides have the same session key is not practical. sides have the same session key is not practical. - The use of on-time conventional keys strengthens what is already a strong conventional - The use of on-time conventional keys strengthens what is already a strong conventional encryption approach. only a small amount of plaintext is encrypted with each key and encryption approach. only a small amount of plaintext is encrypted with each key and there is no relationship among keys. there is no relationship among keys.

10 Confidentiality/Encryption Public key KUb Message M Session key Ks EC EP | ZIP Message M DC Session key Ks DP Private key KRb Message M UNZIP Source ADestination B

11 Confidentiality & Authentication M H EP | Private key KRa ZIP Public key KUb EC EP | DC Session key Ks DP Private key KRb M UNZIP Session key Ks DP Compare H M Public key KRb Source ADestination B PGP first signs the message and then encrypts it:PGP first signs the message and then encrypts it: - more convenient to store a signature with a plaintext version of a - more convenient to store a signature with a plaintext version of a message message - for purposes of third party verification - for purposes of third party verification

12 Compression Saving space both for e-mail transmission and for file storage Saving space both for e-mail transmission and for file storage PGP uses ZIP to compress the message PGP uses ZIP to compress the message PGP compress the message after applying the signature but before message encryption: PGP compress the message after applying the signature but before message encryption: Signature Zip Encryption Signature Zip Encryption One can store only the uncompressed message with the signature for future verification. In case the order was opposite:One can store only the uncompressed message with the signature for future verification. In case the order was opposite: - it would be necessary either to store a compressed version of the message or to - it would be necessary either to store a compressed version of the message or to recompress the message each time when verification is required recompress the message each time when verification is required Compression algorithms are different – the algorithm is not deterministic.Compression algorithms are different – the algorithm is not deterministic. - sign after compress will would constrain all PGP implementations to the same - sign after compress will would constrain all PGP implementations to the same compression algorithm compression algorithm Encryption is applied after compression to strengthen cryptographic securityEncryption is applied after compression to strengthen cryptographic security - compressed message has less redundancy than original plaintext - compressed message has less redundancy than original plaintext

13 Example of ZIP (LZ77) Scheme The brown fox jumped over the brown foxy jumping frog The brown fox jumped over 0 b 26 d 13 d y 0 b 27 d 5 d ing frog 13 5 26 27 The main assumption is that words and phrases within a textThe main assumption is that words and phrases within a text stream (image patterns I the case of GIF) are likely to be repeated stream (image patterns I the case of GIF) are likely to be repeated When a repetition occurs, the repeated sequence can be replaced by a short one When a repetition occurs, the repeated sequence can be replaced by a short one Over time, codes are reused to capture new sequences Over time, codes are reused to capture new sequences

14 E-mail Compatibility When PGP is used, At least part of the block to be transmitted is encrypted When PGP is used, At least part of the block to be transmitted is encrypted –The resulting block will consist of a stream of arbitraty 8-bit octets –Many electronic mail systems only permit the use of blocks consisting of ASCII text To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII string using radix 64 conversion To provide transparency for e-mail applications, an encrypted message may be converted to an ASCII string using radix 64 conversion The use of Radix-64 expands a message The use of Radix-64 expands a message by 33% by 33% - In fact, the compression should be more than enough to compensate - In fact, the compression should be more than enough to compensate for the radix-64 expansion for the radix-64 expansion

15 Encoding Binary Data into Radix-64 Format The scheme used is radix-64 conversion, which expands the message by 33%. The scheme used is radix-64 conversion, which expands the message by 33%. Radix-64 blindly converts the input stream to radix-64 format regardless of content, even if the input happens to be ASCII text. Radix-64 blindly converts the input stream to radix-64 format regardless of content, even if the input happens to be ASCII text. - certain level of confidentiality - if the message is signed but not encrypted, the output will be unreadable to the casual observer - certain level of confidentiality - if the message is signed but not encrypted, the output will be unreadable to the casual observer

16 Segmentation and Reassembly E-mail facilities are often restricted to a maximum message length E-mail facilities are often restricted to a maximum message length - for example 50,000 octets. - for example 50,000 octets. Longer messages must be broken up into segments, which will be mailed separately. Longer messages must be broken up into segments, which will be mailed separately. PGP automatically subdivides a message that is too large into segments that are small enough to send via e-mail. PGP automatically subdivides a message that is too large into segments that are small enough to send via e-mail. The segmentation is done after all of the other processing, including the Raidx-64 conversion. The segmentation is done after all of the other processing, including the Raidx-64 conversion. - thus, the session key component and signature component appear only once - thus, the session key component and signature component appear only once The receiver strips off all e-mail headers and reassemble the block. The receiver strips off all e-mail headers and reassemble the block.

17 Key Requirements PGP makes use of four types of keys: PGP makes use of four types of keys: - one-time session conventional keys, public keys, private keys, - one-time session conventional keys, public keys, private keys, passphrase-based conventional keys passphrase-based conventional keys Three seperate requirements: Three seperate requirements:  A means of generating unpredictable session keys is needed  Any user may have multiple public-key/private-key pairs - may wish to change his key pair from time to time - may wish to change his key pair from time to time - in order to interact with different groups - in order to interact with different groups - simply to enhance security by limiting tha anount material encrypted with any one key - simply to enhance security by limiting tha anount material encrypted with any one key some means is needed for identifying particular keys some means is needed for identifying particular keys  Each PGP entity must maintain data base of: - a file of its own key pairs - a file of its own key pairs - a file of public keys of correspondents - a file of public keys of correspondents

18 Session Key Generation The Problem : generating unpredictable session keys The Problem : generating unpredictable session keys Session keys are generated using CAST-128 itself: Session keys are generated using CAST-128 itself: –This is a PGP specific random number generation technique –getting as input: two 64-bit blocks that are treated as plaintext to be encrypted. two 64-bit blocks that are treated as plaintext to be encrypted. - based on keystroke stream generated by the user - based on keystroke stream generated by the user 128-bit key 128-bit key - random input that also combined with previous session key - random input that also combined with previous session key output from CAST-128. output from CAST-128. The result, scrambling of CAST-128, is to produce a sequence of session keys that is effectively unpredictable a sequence of session keys that is effectively unpredictable

19 Key Identifiers The Problem: user may have multiple public-key/private- key pairs The Problem: user may have multiple public-key/private- key pairs One simple solution would be to transmit the public key with the message. One simple solution would be to transmit the public key with the message. -Would work but an RSA key may be three hundreds of decimal digits in length (1024 bits) decimal digits in length (1024 bits) PGP solution associate a short identifier with each public key that is unique. PGP solution associate a short identifier with each public key that is unique. then only the much shorter key ID would need to be then only the much shorter key ID would need to be transmitted. transmitted. The key ID associated with each public key consists of its least significant 64 bits The key ID associated with each public key consists of its least significant 64 bits That is the ID of KU is (KU mod 2 64 ) That is the ID of KU is (KU mod 2 64 )

20 Format of PGP Message Session Key Component Signature Message E KUb E KRa ZIP E ks R64 Timestamp Key Id of Senders Public Key Leading Two Octets of Message Digest Message Digest Filename Time Stamp Data Session Key Key Id of Recipients Public Key

21 PGP Key Rings The problem: must maintain a database in order to supports multiple public/private keys. The problem: must maintain a database in order to supports multiple public/private keys. The Solution : Keys stored locally in a PGP Key The Solution : Keys stored locally in a PGP Key Ring – essentially a database of keys. Ring – essentially a database of keys. Two rings: Two rings: - Private-key ring: stores the public/private key pairs owned - Private-key ring: stores the public/private key pairs owned by that node by that node - Public-key ring: stores the public keys of other users known - Public-key ring: stores the public keys of other users known at this node at this node Private keys stored in encrypted form; decryption key determined by user-entered passphrase. Private keys stored in encrypted form; decryption key determined by user-entered passphrase.

22 Key Rings Timestamp Key ID* Public Key Encrypted Private Key User ID* TiTiTiTi KU i mod 2 64 KU i E H(P i ) [KR i ] User i Private-Key Ring

23 Key Rings Timestamp Key ID* Public Key Owner Trust User ID* Key Legitimacy Signature(s) Signature Trust(s) Ti KU i mod 2 64 KU i User i Public-Key Ring

24 Message Generation Public key KR b IDb Select Public-Key ring Message M H EP | Message digest Message RNG Session key K s EC Signature + message EP Encrypted Signature + message | IDa Select Private-Key ring DC H Passphase Encrypted Private key Output Key ID Private key KR a

25 Reception Receiver's key ID Encrypted Session key Encrypted Message + Signature Public key KR b Select Public-Key ring DP Select Private-Key ring DC H Passphase Encrypted Private key Session key K s DP Private key KR b DC Sender ’ s Key ID Encrypte d Digest Message Compare H

26 Public Key Management Problem The Problem: A ’ s key ring contains a public key attributed to B but that the key is, in fact, owned by C The Problem: A ’ s key ring contains a public key attributed to B but that the key is, in fact, owned by C Two threats now exist: Two threats now exist: C can send messages to A and fake B ’ s signature, so that A will accept the message as coming from B ! C can send messages to A and fake B ’ s signature, so that A will accept the message as coming from B ! Any encrypted message from A to B can be read by C ! Any encrypted message from A to B can be read by C !

27 Public Key Management Problem (cont.) Possible solutions: Possible solutions: Physically get the key from B Physically get the key from B Verify a key by telephone Verify a key by telephone Obtain B ’ s public key from a mutual trusted individual Obtain B ’ s public key from a mutual trusted individual Obtains B ’ s public key from a trusted certifying authority Obtains B ’ s public key from a trusted certifying authority That would violate PGP ’ s spirit as an E- mail security scheme for the masses: That would violate PGP ’ s spirit as an E- mail security scheme for the masses: It should be possible for people to exchange keys electronically with others whom they have never met and may not even know It should be possible for people to exchange keys electronically with others whom they have never met and may not even know Every one who uses this scheme trusts the central authority Every one who uses this scheme trusts the central authority

28 PGP Key Management PGP Solution: adopts a different trust model – the “ web of trust ” PGP Solution: adopts a different trust model – the “ web of trust ” No centralised authority like a root of trust ! No centralised authority like a root of trust ! The concept of the web of trust: The concept of the web of trust: The concept: Individuals sign one another ’ s public keys and create an interconnected community of public-key users. The concept: Individuals sign one another ’ s public keys and create an interconnected community of public-key users. These “ certificates ” are stored along with keys in key rings These “ certificates ” are stored along with keys in key rings - A signature testifies that the User ID associated with this public key is - A signature testifies that the User ID associated with this public key is valid valid - A signature is formed using the private key of the signer - A signature is formed using the private key of the signer PGP computes a trust level for each public key in key ring. PGP computes a trust level for each public key in key ring. Users take part in the assignment of the trust level Users take part in the assignment of the trust level

29 Trust in Public Key Ring Each user collects signed keys and stores these in the public- key ring. Each user collects signed keys and stores these in the public- key ring. Each entry in the ring has: Each entry in the ring has: - Key legitimacy field Measures the degree to which this PGP user trusts that the key is valid for its user. The Measures the degree to which this PGP user trusts that the key is valid for its user. The higher the level of trust, the stronger is the binding of this user ID to this key higher the level of trust, the stronger is the binding of this user ID to this key - Signature trust field Measures how far the PGP user trusts the signer to certify public keys. (The key Measures how far the PGP user trusts the signer to certify public keys. (The key legitimacy field for an entry derives from the signature trust fields.) legitimacy field for an entry derives from the signature trust fields.) - Owner trust field - Owner trust field Indicates the degree to which this PGP user trusts the key's owner to sign other public- Indicates the degree to which this PGP user trusts the key's owner to sign other public- key certificates. PGP doesn't compute this level of trust; the PGP user assigns it. You key certificates. PGP doesn't compute this level of trust; the PGP user assigns it. You can think of a signature trust field as a cached copy of the owner trust field from can think of a signature trust field as a cached copy of the owner trust field from another entry. another entry.

30 Trust in Public Key Ring Key Legitimacy Field (computed by PGP) Key Legitimacy Field (computed by PGP) Signature Trust Field (copies of OTF) Signature Trust Field (copies of OTF) Owner Trust Field (assigned by the user) Owner Trust Field (assigned by the user)Timestamp Key ID* Public Key Owner Trust User ID* Key Legitimacy Signature(s) Signature Trust(s) TiTiTiTi KUi mod 2 64 KU i Trust flag i User i Trust flag i Public-Key Ring

31 Adding a new public key to your public-key ring: Owner trust field: (signed other keys) Owner trust field: (signed other keys) - If you own the key - ultimate trust is automatically assigned. - If you own the key - ultimate trust is automatically assigned. - If you don ’ t own the key - PGP asks the user: - If you don ’ t own the key - PGP asks the user: unknown, untrusted, marginally trusted, or completely trusted unknown, untrusted, marginally trusted, or completely trusted Signature trust field: (trusts the signer) Signature trust field: (trusts the signer) PGP searches the public-key ring to see if the author of this signature is among the known public-key owners. PGP searches the public-key ring to see if the author of this signature is among the known public-key owners. - If so, the owner trust value for this owner is assigned to the signature trust - If so, the owner trust value for this owner is assigned to the signature trust field for this signature. field for this signature. OWNERTRUST SIGTRUST OWNERTRUST SIGTRUST - If not, an unknown-user value is assigned. - If not, an unknown-user value is assigned. key-legitimacy: (the key is valid for its user) key-legitimacy: (the key is valid for its user) On the basis of the signature trust fields present in this entry. On the basis of the signature trust fields present in this entry. - If at least one signature has a value of ultimate trust, then the key legitimacy value is set to complete - Otherwise, PGP computes a weighted sum of the trust values. 1/X is given to signatures that are always trusted 1/X is given to signatures that are always trusted 1/Y is given to signatures that are usually trusted 1/Y is given to signatures that are usually trusted X and Y are user-configurable parameters. X and Y are user-configurable parameters.

32 PGP Trust Model Example

33 Revoking Public Keys When exposure suspects or simply avoiding the use of the same key for an extended period When exposure suspects or simply avoiding the use of the same key for an extended period The owner issue a key revocation certificate The owner issue a key revocation certificate –Signed by the owner, with the corresponding private key –Same form of normal signature certificate but includes an indicator that the purpose of this certificate is to revoke the use of this public key The owner should disseminate this certificate as widely and as quickly as possible opponent The owner should disseminate this certificate as widely and as quickly as possible opponentNOTE: An opponent who has compromised the private-key of an owner can also issue such a certificate. However, this would deny the opponent as well as the legitimate owner the use of the public Key – seems much less likely threat.

34 Next: S/MIME…

35 Radix-64 Conversion Table 6-bit Value CharacterEncoding CharacterEncoding CharacterEncoding Characterencoding 0123456789101112131415ABCDEFGHIJKLMNOP16171819202122232425262728293031QRSTUVWXYZabcdef32333435363738394041424344454647ghijklmnopqrstuv48495051525354555657585960616263(pad)wxyz0123456789+/= Radix-64 Encoding


Download ppt "Pretty Good Privacy “ To PGP or not to PGP? “ Phil Zimmermann."

Similar presentations


Ads by Google