PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.

Slides:



Advertisements
Similar presentations
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
Advertisements

1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Public Key Cryptography and GnuPG CPT 555 Network Security.
Apache Web Server Quick and Dirty Steve Gibbard for SANOG 16 (Originally by Joel Jaeggli for AfNOG 2007) ‏
Summer School Certificates Diego Romano & Gilda Team.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Pretty Good Privacy – How to do it. Tony Brett IT Systems Manager Corpus Christi College OxCERT Tel. (2)76695 OUCS ITSS lunchtime.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Security Jonathan Calazan December 12, 2005.
DePaul Information Security
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Public Key Encryption An example of how a bank might accomplish encryption.
Apache Security with SSL Using FreeBSD SANOG VI IP Services Workshop July 18, 2005 Hervey Allen Network Startup Resource Center.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Security & Cryptographic Methods Unix System Administration May 28, 2008 Rabat, Morocco Hervey Allen.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Masud Hasan Secue VS Hushmail Project 2.
How to use the right way ^ securely. Disclaimer  /me is not Mac literate Ask Ryan ;-)  Things may go wrong Grab the back of your pants and let’s.
Beginning PGP 2600 JAN09. What? OpenPGP is the proposed standard. – (RFC 2440, 3156, 4880, 5081, etc) OpenPGP is not a program. PGP and GnuPG are computer.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Security & Cryptographic Methods PacNOG 6 Hervey Allen PacNOG 6 Hervey Allen.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Security & Cryptographic Methods AfNOG 2007 April 25-26, 2007 Abuja, Nigeria Hervey Allen.
Cryptographic methods: Recommended reading: Applied Cryptography, Bruce Schneier PacNOG I Workshop Presented by Hervey Allen Materials originally by Brian.
Principle, utilization and limitations for secure electronic mail systems FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Segurança em Sistemas Informáticos.
12/01/1999Joe Lewis - Xcert International Inc. Who’s Peeking at Your Files? A Guide to Personal Data Security.
Using secure methods for sending and receiving files SPEEDE Server SPEEDE Users’ Group May 4, 2007 David Stallcup.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Data Encryption using SSL Topic 5, Chapter 15 Network Programming Kansas State University at Salina.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Apache Web Server Quick and Dirty Evelyn NAMARA for AfNOG 2014 (Originally by Joel Jaeggli for AfNOG 2007) ‏
Apache Web Server Quick and Dirty Ayitey Bulley for AfNOG 2011 (Originally by Joel Jaeggli for AfNOG 2007) ‏
Apache Web Server Quick and Dirty Kevin G. Chege for AfNOG 2013 (Originally by Joel Jaeggli for AfNOG 2007) ‏
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
AfNOG 2007 Abuja Secure Authentication A Brief Overview AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
KMIP v.Next PGP Support 1 Michael Allen Sr. Technical Director, Symantec.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
Digital Signatures with TheSign Digital Signatures for Newbies Digital Signatures are a clever approach of using complex mathematics in real life work.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Security with SSH Unix System Administration Workshop AfNOG 2007 Hervey Allen.
PGP Introduction and Keysigning Joel Jaeggli For SSE AFNOG 2011.
and File Security With GnuPG Matt Brodeur
` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary
Chapter 5a - Pretty Good Privacy (PGP)
Internet Business Associate v2.0
PGP Key Management Basic Principals
Tutorial on Creating Certificates SSH Kerberos
Apache Security with SSL Using FreeBSD
GnuPG The GNU Privacy Guard
(Originally by Joel Jaeggli for AfNOG 2007)‏
PGP Key Management Basic Principals
Tutorial on Creating Certificates SSH Kerberos
CIW Lesson 7 Part A Name: _______________________________________
asymmetric cryptography
Homework #05 SSL and TLS Announce: Due:
A Programmer’s Guide to Secure Connections
PGP Key Management Basic Principles
Presentation transcript:

PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen

AfNOG 2007 Abuja Core Concepts To encrypt data so that it can be read by one person, you need that person's public key. To decrypt data someone sent to you, you need your private key. To sign some data, you use your secret key. To check a signature on some data, you use the public key of the person who used it.

AfNOG 2007 Abuja How do you do all This? Using gpg commands at the command line and manipulating text files with them. Using built-in tools in your operating system, or your client.

AfNOG 2007 Abuja Practical Aspects As in what are the initial steps? Install GPG (as a port on FreeBSD). Create a public/private key pair. This is associated with your address. Extract your public key. Maybe post it somewhere like Create your key fingerprint. Sign someone's public key. Check out

AfNOG 2007 Abuja A Few Notes

AfNOG 2007 Abuja Install GPG We'll install via ports. If your ports tree is not up-to-date you might install an older version of GnuPG. You can always install like this: portupgrade -N gnupg

AfNOG 2007 Abuja Create Public/Private Key Pair Don't forget expiry date passphrase on private? What if none? What does this mean? How is this related to ssh?

AfNOG 2007 Abuja Extract your Public Key to Text Why? What do you do with this? Answers: Export to pgp key server Place in Have people sign it – why? Cool Effect – Still awake?

AfNOG 2007 Abuja Create a Key Fingerprint Why? What does this do? Where might you use it? Answers: Bottom of ? Pgp key server

AfNOG 2007 Abuja Sign Someone's Public Key What's the first step? This is the “web of trust” Where do the “signatures” go? - pgp key server

AfNOG 2007 Abuja What will you use this for? ?? Passwords in Financial information Contracts Other?

AfNOG 2007 Abuja Let's go do it!