Pretty Good Privacy (PGP) Security for Electronic Email.

Slides:



Advertisements
Similar presentations
1 Pretty Good Privacy (PGP) Security for Electronic .
Advertisements

Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptographic Technologies
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Electronic mail security -- Pretty Good Privacy.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Encryption Methods By: Michael A. Scott
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Firewalls. 2 What is a firewall? Device that provides secure connectivity between networks (internal/external; varying levels of trust) Used to implement.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
1 Electronic Mail Security Behzad Akbari Fall 2009 In the Name of the Most High.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Electronic mail security
K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College
Security is one of the most widely used and regarded network services
Chapter 15 – Electronic Mail Security
Security Pretty Good Privacy (PGP)
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
NET 536 Network Security Networks and Communication Department
Security at the Application Layer: PGP and S/MIME
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Electronic Mail Security
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Electronic Mail Security
Cryptography and Network Security
….for authentication and confidentiality PGP
Presentation transcript:

Pretty Good Privacy (PGP) Security for Electronic

Most popular network-based application Sending an between two distant sites means that the has to transit dozens of machines on the way Those machines may read and record the message Privacy is thus non-existent by default There are systems for secure s –PGP (Pretty Good Privacy) -S/MIME Secure/Multipurpose Internet Mail Extension

PGP Developed by Phil Zimmerman in Documentation and source code is freely available. The package is independent of operating system and processor. PGP does not rely on the “establishment” and it’s popularity and use have grown extensively since 1995.

PGP Features It is based on the best available crypto algorithms –Considered very strong and secure Mainly used for and file storage applications Independent of governmental organizations Messages are automatically compressed

PGP Components There are five important services in PGP –Authentication (Sign/Verify) –Confidentiality (Encryption/Decryption) –Compression – compatibility –Segmentation and Reassembly The last three are transparent to the user

PGP: Authentication steps Sender: 1.Creates a message 2.Hashes it to 160-bits using SHA1 3.Encrypts the hash code using her private key, forming a signature 4.Attaches the signature to message Receiver: 1.Decrypts attached signature using sender’s public key and recovers hash code 2.Re computes hash code using message and compares with the received hash code’ 3.If they match, accepts the message

M= original message H= hash function | | = concatenation (join) Z= compression Z -1 = decompression EP= public key encryption DP= public key decryption KR a = A’s private key KU a = A’s public key Stallings, Fig 5.1a Encryption on hash code to get signature Sig + M

PGP: Confidentiality Sender: 1. Generates message and a random number (session key) only for this message 2. Encrypts message with the session key using AES, 3DES, 3. Encrypts session key itself with recipient’s public key using RSA 4.Attaches it to message Receiver: 1.Recovers session key by decrypting using his private key 2.Decrypts message using the session key.

PGP Confidentiality 1.Alice wishes to send Bob a confidential message m. 2.Alice generates a random session key k for a symmetric cryptosystem. 4.Alice encrypts the message m with the session key k to get ciphertext c c=sk.encrypt k (m)

4. Alice encrypts k using Bob’s public key B e to get k’ = pk.encrypt Be (k) 5.Alice sends Bob the values (k’,c) 6.Bob receives the values (k’,c) and decrypts k’ using his private key B d to obtain k k=pk.decrypt Bd (k’)

7.Bob uses the session key k to decrypt the ciphertext c and recover the message m m=sk.decrypt k (c) Public and symmetric key cryptosystems are combined in this way to provide security for key exchange and then efficiency for encryption. The session key k is used only to encrypt message m and is not stored for any length of time.

EC= symmetric encryption DC= symmetric decryption K s = session key EP= Public key encryption Stallings, 5.1b

Confidentiality pitfall Note that confidentiality service provides no assurance to the receiver as to the identity of sender (i.e. no authentication) Only provides confidentiality for sender that only the recipient can read the message (and no one else)

Combining authentication and confidentiality in PGP Authentication and confidentiality can be combined –A message can be both signed and encrypted That is called authenticated confidentiality Encryption/Decryption process is “nested” within the process shown for authentication alone See next slide

Format of a classic PGP message Key part contains the key and a key identifier Signature part contains a header, followed by a timestamp, the ID of the sender’s public key that should be used for decrypting the signature hash, some type information to identify the algorithms used (for more flexibility), and the encrypted hash Message part contains a header, the default name of the file if the receiver is saving it on the disk, a message creation timestamp, and the message

PGP Compression Compression is done after signing the hash –Why? –Saves having to compress document every time you wish to verify its signature It is also done before encryption –Why? –To speed up the process (less data to encrypt) –Also improves security Compressed messages are more difficult to cryptanalyze as they have less redundancy

PGP compatibility PGP is designed to be compatible with all systems Makes no assumptions regarding ability to handle attachments etc. –Handles both the simplest system and the most complex system –Output of encryption and compression functions is divided into 6-bit blocks Each block is mapped onto an ASCII Character This is called RADIX-64 encoding Has the side-effect of increasing the size of the data by about 33%

PGP Compatibility Many electronic mail systems can only transmit blocks of ASCII text. This can cause a problem when sending encrypted data since ciphertext blocks might not correspond to ASCII characters which can be transmitted. PGP overcomes this problem by using radix-64 conversion.

Radix-64 conversion 1.The binary input is split into blocks of 24 bits 2.Each 24 is then split into four sets each of 6-bits. 3.Each 6-bit set will then have a value between 0 and (=63). 4.This value is encoded into a printable character.

RADIX-64 encoding

An example Radix-64' is a method of converting binary files into text format. First, it breaks the bit stream of the binary file into bit groups of six. Next, it looks at each group of six as an individual character. It then converts each group of six bits into a text character. For example, `010111' would correspond to a decimal 23 which becomes (by Radix-64 definition) an upper case `X'. Other bit groups would be converted by this chart as well. Once we have converted all six bit characters into a text format, it is ready for transmission via conventional text modes

PGP Segmentation/Reassembly protocols have a maximum allowed size for messages –Like 100 KB –PGP divides messages that are too large into smaller ones –Divide and conquer Reassembly at the receiving end is required before verifying signature or decryption