Presentation is loading. Please wait.

Presentation is loading. Please wait.

PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.

Similar presentations


Presentation on theme: "PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik."— Presentation transcript:

1 PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik

2 What does PGP stand for? Prenhall, Goodman, & Paul
Public Generating Polynomial Pfleeger, Golomb, & Pfleeger Pretty Good Privacy

3 Topics History of PGP Applications of PGP How PGP Works Encryption
Decryption Digital Signatures & Data Integrity Web of Trust Certificates

4 History of PGP Phil Zimmerman created PGP in 1991
encryption software package, uses public key encryption system In response to U.S. Senate Bill 266 for "back-door" for the U.S. government Initially used for securing messages and files in BBS’s of anti-nuclear activist groups

5 PGP Applications High Cost of Customer Data Loss
Lost or stolen customer information cost companies as much as $22 million Average cost per lost customer record was $186 PGP solutions are used by more than 80,000 enterprises, businesses, and governments worldwide. 95% of the Fortune® 100

6 How PGP Works Request public key Public key
Encrypt random key with receiver's public key, append to message Generate hash of message and encrypt hash with sender's private key Sender Receiver Encrypt remainder of message with random key

7 How PGP Works Send message Decrypt key in message with private key
Decrypt message Request public key Sender Receiver Public key Generate hash of message and decrypt hash value

8 Encryption Methods PGP allows you to use any number of encryption methods for the symmetric, asymmetric, and hash algorithms RSA, DSA, Elgamal, Elliptic curves Triple-DES, IDEA, Blowfish, CAST5, AES, plaintext or make up your own! No need to re-encrypt the message for different receivers – only the key Permanent storage of messages and files

9 Digital Signatures and Data Integrity
Adding a hash value of the message ensures that the message was not garbled in transmission Encrypting the hash with the sender's private key validates the sender's identity and message content

10 Digital Signatures and Data Integrity
Theresa Swinehart -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP Personal Privacy 6.5.1 mQGiBDyY+88RBAD0TJYTvYo+Mw2YCKIulU+EhR5eAnTaJ/sJuoSn05PsKCB+/XSK hsph9A3jGaS/gmOKRbDa1q6jZTgx9huSZyq0oPTJYeBu5K7j55uve3NF9H/UhTej DaNHfA7Ll4LKv5tTXNts410kpkMA/1p1AcHsaA897OXV6UXw0e+tJzdE0QCg/0HE 8ZD4ur75jlkF1Dqn4r1kU/sEAPRC7vVtrWDVj+MRUd4G5Krst1zegTq4JeYgO0ei vn18MoVA+GM+wRUE7niIgipxuFFKV3FUkPFTcoavivuUplLiJqMPEm1rSEWImQ9N -----END PGP PUBLIC KEY BLOCK-----

11 Web of Trust Concept used in PGP and other OpenPGP-compatible systems
To establish the authenticity of the binding between a public key and a user. Each user has a certificate, trust is certified to various degrees by other users Decentralized system - many independent webs of trust Alternative to centralized public key infrastructure (PKI)

12 Web of Trust Problem - No central controller, depends on other users for trust. Those with new certificates will not readily be trusted by other users Alice knows Bob and signs Bob’s certificate with her public key Charles knows Alice and has her public key. Charles can check Alice’s signature on Bob’s certificate. Charles then trusts Bob’s certificate.

13 Certificates Binds a public key to an entity Set up of PGP Certificate
Random input from keystrokes, timing, mouse movements to get primes p & q, then compute n, d, and e n and e - public key User selects a passphrase. User enters the passphrase, when private key (decryption) is needed

14 References OpenPGP Proposed Standard RFC 2440
Internet Engineering Task Force Introduction to Cryptography Wade Trappe, Lawrence C. Washington Second Edition PGP Corporation PGP documentation. Copyright © Network Associates, Inc. its \ The Early Roots of PGP

15 What does PGP stand for? PRETTY GREAT PRESENTATION


Download ppt "PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik."

Similar presentations


Ads by Google