Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.

Slides:



Advertisements
Similar presentations
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
I-4 security.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Network Security David Lazăr.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
NETWORK SECURITY.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Basics of Cryptography
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Presentation transcript:

Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward

What is PGP? a non-proprietary protocol for the secure exchange of information between individuals a non-proprietary protocol for the secure exchange of information between individuals a free, open-source program implementing this protocol a free, open-source program implementing this protocol

Why do you need PGP? privacy: for protecting personal information privacy: for protecting personal information secrecy: for hiding illegal, unethical, or immoral activity secrecy: for hiding illegal, unethical, or immoral activity you don’t need it: you have nothing to protect or hide you don’t need it: you have nothing to protect or hide

Why should you know about PGP? It uses tools that are essential to all forms of secure communication. It uses tools that are essential to all forms of secure communication. public-key cryptography public-key cryptography private-key cryptography private-key cryptography message digests message digests digital signatures digital signatures

Why should you know about PGP? It uses tools to provide all aspects of secure communication. It uses tools to provide all aspects of secure communication. privacy (private-key cryptography) privacy (private-key cryptography) integrity (message digests) integrity (message digests) authentication (digital signature) authentication (digital signature) non-repudiation (digital signature + message digest) non-repudiation (digital signature + message digest)

In this presentation I will… introduce the tools used by PGP introduce the tools used by PGP describe how each tool can be used to provide some aspect(s) of secure communication describe how each tool can be used to provide some aspect(s) of secure communication show how PGP combines all of these tools to facilitate the secure exchange of information between individuals show how PGP combines all of these tools to facilitate the secure exchange of information between individuals

Tool # 1: Private-Key Cryptography two parties share a single secret key two parties share a single secret key an encryption scheme encrypts/decrypts information according to the value of the key an encryption scheme encrypts/decrypts information according to the value of the key good encryption algorithm: most efficient attack is not significantly better than brute force (guessing each possible key) good encryption algorithm: most efficient attack is not significantly better than brute force (guessing each possible key) Examples: DES, Triple DES, AES Examples: DES, Triple DES, AES

Privacy with Private-Key Cryptography Alice and Bob share a secret key K s Alice and Bob share a secret key K s Alice composes a message m in plaintext Alice composes a message m in plaintext She encrypts it with the secret key: K s {m} She encrypts it with the secret key: K s {m} She sends K s {m} to Bob She sends K s {m} to Bob How did Alice and Bob agree on K s ? How did Alice and Bob agree on K s ?

Tool # 2: Public-Key Cryptography Each party maintains a key pair (K public, K private ). Each party maintains a key pair (K public, K private ). If a message is encrypted with K public, it can only be decrypted with K private. If a message is encrypted with K public, it can only be decrypted with K private. If a message is encrypted with K private, it can only be decrypted with K public. If a message is encrypted with K private, it can only be decrypted with K public. good encryption algorithm: private key cannot be feasibly computed from its corresponding public key. good encryption algorithm: private key cannot be feasibly computed from its corresponding public key. Examples: RSA, ElGamal Examples: RSA, ElGamal

Convenient Key Agreement with Public-Key Cryptography provides one answer to “How did Alice and Bob agree on K s ?” provides one answer to “How did Alice and Bob agree on K s ?” Alice generates a random key and encrypts it using Bob’s public key: K BOB-PUBLIC {K s } Alice generates a random key and encrypts it using Bob’s public key: K BOB-PUBLIC {K s } Only Bob has K BOB-PRIVATE, so only Bob can decrypt the secret key. Only Bob has K BOB-PRIVATE, so only Bob can decrypt the secret key. Alice and Bob no share a secret. Or do they? Alice and Bob no share a secret. Or do they? “How does Bob know that the message really came from Alice?.” “How does Bob know that the message really came from Alice?.”

Authentication and Integrity with Public-Key Cryptography Before, Alice sent K BOB-PUBLIC {K s } Before, Alice sent K BOB-PUBLIC {K s } She could send K BOB-PUBLIC {K s, K ALICE-PRIVATE {K s }} She could send K BOB-PUBLIC {K s, K ALICE-PRIVATE {K s }} As before, only Bob can decrypt the information As before, only Bob can decrypt the information Now, Bob can use K ALICE-PUBLIC to decrypt K ALICE-PRIVATE {K s } Now, Bob can use K ALICE-PUBLIC to decrypt K ALICE-PRIVATE {K s } If the result is K s then Bob knows that the key was sent by Alice and that the key has not been altered in transmission. If the result is K s then Bob knows that the key was sent by Alice and that the key has not been altered in transmission. This is just an example to illustrate a digital signature. This is just an example to illustrate a digital signature. “Is there a more efficient way to prove message integrity than by copying the whole thing?” “Is there a more efficient way to prove message integrity than by copying the whole thing?”

Tool # 3: Message Digests For a message m, apply a hash function H which yields a fixed-length message digest H(m) (also called a “digital fingerprint”). For a message m, apply a hash function H which yields a fixed-length message digest H(m) (also called a “digital fingerprint”). good hash function: easy to compute and infeasible to compute m given H(m) good hash function: easy to compute and infeasible to compute m given H(m) Examples: SHA-1, MD5 Examples: SHA-1, MD5

Tool # 4: Digital Signature (using message digest) Alice composes a message m to Bob. Alice composes a message m to Bob. She computes H(m) and encrypts it with her private key. She computes H(m) and encrypts it with her private key. She sends (m, K ALICE-PRIVATE {H(m)}) to Bob. She sends (m, K ALICE-PRIVATE {H(m)}) to Bob. Bob, or anyone, computes H(m), and compares it to the result of decrypting K ALICE-PRIVATE {H(m)} with Alice’s public key. Bob, or anyone, computes H(m), and compares it to the result of decrypting K ALICE-PRIVATE {H(m)} with Alice’s public key. If they are the same, authentication and integrity have been proven. If they are the same, authentication and integrity have been proven.

Sending secure information with PGP Alice: composes message m for Bob Alice: composes message m for Bob generates a random session key K s generates a random session key K s encrypts m: K s {m} ( = AES ENCRYPT (K s, m)) encrypts m: K s {m} ( = AES ENCRYPT (K s, m)) encrypts K s with Bob’s public key: K BOB-PUBLIC {K s } encrypts K s with Bob’s public key: K BOB-PUBLIC {K s } computes the message digest H(m) computes the message digest H(m) encrypts H(m) with her private key: K ALICE-PRIVATE {H(m)} encrypts H(m) with her private key: K ALICE-PRIVATE {H(m)} sends this: (K s {m}, K BOB-PUBLIC {K s }, K ALICE-PRIVATE {H(m)}) sends this: (K s {m}, K BOB-PUBLIC {K s }, K ALICE-PRIVATE {H(m)})

Receiving Secure Information with PGP Bob receives this: (K s {m}, K BOB-PUBLIC {K s }, K ALICE-PRIVATE {H(m)}) Bob receives this: (K s {m}, K BOB-PUBLIC {K s }, K ALICE-PRIVATE {H(m)}) decrypts K BOB-PUBLIC {K s } using his private key, yielding K s decrypts K BOB-PUBLIC {K s } using his private key, yielding K s decrypts K s {m} using K s, yielding m decrypts K s {m} using K s, yielding m computes H(m)’ using message digest algorithm H computes H(m)’ using message digest algorithm H decrypts K ALICE-PRIVATE {H(m)} using K ALICE-PUBLIC yielding H(m) decrypts K ALICE-PRIVATE {H(m)} using K ALICE-PUBLIC yielding H(m) compares H(m)’ to H(m) compares H(m)’ to H(m)

Summary PGP combines the use of several tools PGP combines the use of several tools public-key cryptography, private-key cryptography, public-key cryptography, private-key cryptography, message digests to provide all of the elements necessary for secure communication to provide all of the elements necessary for secure communication privacy, integrity, authentication, non-repudiation privacy, integrity, authentication, non-repudiation

Other Stuff Can you trust that the public key you are using really belongs to the intended recipient? Can you trust that the public key you are using really belongs to the intended recipient? Fake public keys Fake public keys Authentication by trusted third party Authentication by trusted third party