PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing software on personal computer
Pretty Good Privacy (PGP)
DePaul Information Security
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
1 Lecture 5 George Koutsogiannakis/ Summer 2011 CS441 CURRENT TOPICS IN PROGRAMMING LANGUAGES.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Types of Electronic Infection
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Understand Internet Security LESSON Security Fundamentals.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
2: Operating Systems Networking for Home & Small Business.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Key management issues in PGP
Web Applications Security Cryptography 1
An Installation Guide of PGP on Windows 2000
Presentation transcript:

PGP ENCRYPTION Prepared by Noel Kigaraba

Introduction This presentation explains the basic information about PGP encryption software. It discusses the practical use and installation of PGP in UNIX system. User requires spending an addition time to learn and become familiar with other PGP features and installation process.

What is PGP? PGP describes as “PRETTY GOOD PRIVACY” is an encryption computer program. In the early 1990s, software engineer Philip Zimmermann initially developed PGP program. The PGP is based on technology called RSA public key encryption. The RSA is a name derived from the initials of the developers of the encryption technology: Rivest, Shamir, and Adelmen.

PGP supports the following computer systems UNIX/Linux, Windows, DOS, and Macintosh. In UNIX/Linux systems PGP can be executed either using the command line interface or the graphical interface (GUI).

PGP Distribution There are wide range of PGP distribution web sites and subsequent versions available. Most of PGP versions are located at this web site User can download a free copy of PGP (freeware) for personal use only. In contrast, PGP freeware is not permitted for commercial use. Accordingly, PGP commercial version is distributed and supported addition features; which are designed for commercial uses and not available in freeware version. For instance, PGP Personal Security and PGP Desktop Security are commercial versions.

PGP uses Using Internet, it is entirely possible that information can be compromised. After all, by default is not secure at all. Therefore, PGP has become as effective method for encrypting compute files and data communication. The primary use of PGP is to encrypt computer files and data communication such as and network connection i.e. some PGP versions support secure channels connection for remote systems access. Protecting transmit data across insecure networks system such as Internet. For example, PGP VPN gateway is used for establishing secure connection to remote network systems. Data encrypts to ensure that sensitive information protects from unauthorized access.

How PGP Work The PGP works as follow: According to PGP International Organization, PGP uses a public-key encryption system. PGP includes the best features of public key cryptography (PKC). Public key encryption means one key uses (private key) to decrypt information is different from other key uses (public key) to encrypt the information. Public key encryption system is an asymmetric scheme that uses cryptographic mathematic algorithms (very complex scientific math processes) to encrypt data. These algorithm processes generate public/private keys for encrypting and decrypting computer files/data: a public key uses to encrypt information and private key (secret key) uses to decrypt information. User makes a copy of public key available to other users such friends or co- workers to encrypt information intend to send to her or him. Therefore, recipient/owner/holder of the associated public key can decrypt information uses a corresponding private key ( see diagram on next slide).

How PGP encryption and decryption works Source: PGP International Organization,

What bad about PGP? The main problems associate with PGP program are; PGP is used system resources intensive because of complex mathematic algorithm processes which cause a great amount of process overheads on computer system. PGP uses a file called a key ring “keys.asc to store public/private keys. The key ring file is resided usually in computer hard disk. Therefore, b ecause the key ring file is stored in local hard disk it is more susceptible to be compromised. For example, a lthough the key.asc file is stored in encryption form but someone with sufficient privileges i.e. system administrator would have access to user key ring file. Indeed, it is essential to make sure the key ring file is well secured. There is a slight chance that MD5 algorithm can be fooled; some of the newer algorithms, such as SHA1, are used now as being strongly secure from tampering.

PGP installation in UNIX System PGP install in UNIX system requires compiling the source code into directory and unpacks the file i.e. the.tar file. After PGP install, the first task is to create a public and private key pair. In addition, it requires that pgp directory (.pgp) to locate in user home directory. For example, directory path /user/[username]”kigara01”/.pgp The command #pgp –kg is used to create private/public keys. The PGP runs several prompts to set up the information such as key size, key user id, and pass phrase. For addition information about PGP installation in UNIX system visits the following website:

Conclusion The practical consideration in computer field is; nothing appears to keep data safe from compromising but using encryption in everyday operations reduce the possibility of data for being compromise. Also notice the problems associated with PGP, therefore, it is essential to make sure that sensitive information on computer files are well secured.

References The International PGP. (2007). How PGP Works. Retrieved from April 1, 2007, from Northern Illinois University Department of Mathematic Sciences. (2006) Overview PGP. Retrieved from April 1, 2007, from Hackerthreads Organization Security Forum. (2007). what is PGP. Retrieved from March 29, 2007, from Willan, P. (Monday, May 26, 2003). PC World. PGP Encryption Proves Powerful. Retrieved March 29, 2007, from

The End Thank you! Cheers!