Pretty Good Privacy (PGP

Similar documents
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Pretty Good Privacy (PGP)

Summary of PGP Services

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security

CS 356 Internet Security Protocols. Fall 2013

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 8 Network Security

Chapter 5 Electronic mail security

Lecture 4: Cryptography III; Security. Course Administration

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

14. Internet Security (J. Kurose)

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

ECE 646 Lecture 4. Pretty Good Privacy PGP

Network Encryption Methods

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Gestion et sécurité des réseaux informatiques. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Introduction and Overview. Why CSCI 454/554?

Electronic mail security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

APNIC elearning: Cryptography Basics

Chapter 8 Web Security

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Key management. Pretty Good Privacy

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Chapter 3: Securing applications

SRI VENKATESWARA COLLEGE OF ENGINEERING

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Overview. SSL Cryptography Overview CHAPTER 1

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

CS669 Network Security

Kurose & Ross, Chapters (5 th ed.)

Security. Communication security. System Security

(2½ hours) Total Marks: 75

CSC 6575: Internet Security Fall 2017

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

The Research on PGP Private Key Ring Cracking and Its Application

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols. Lecture Notes on Computer and Network Security. by Avi Kak

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

Cryptography and Network Security

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

Transport Level Security

CYBER SECURITY MADE SIMPLE

Internet and Intranet Protocols and Applications

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

FTP. FTP offers many facilities :

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

1.264 Lecture 28. Cryptography: Asymmetric keys

Delineation of Trivial PGP Security

SECURITY IN NETWORKS 1

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Introduction to information Security

IP Security. Have a range of application specific security mechanisms

Security in ECE Systems

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Network Security Chapter 8

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

WHITE PAPER. Authentication and Encryption Design

Digital Certificates Demystified

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:

Securing Communications

Cryptography (Overview)

Using digital certificates in Microsoft Outlook

Applications FTP. FTP offers many facilities :

Digital it Signatures. Message Authentication Codes. Message Hash. Security. COMP755 Advanced OS 1

HP Instant Support Enterprise Edition (ISEE) Security overview

E-commerce security: SSL/TLS, SET and others. 4.2

Cryptography and Network Security Chapter 13. Digital Signatures & Authentication Protocols

EEC-682/782 Computer Networks I

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Network Security. Chapter 8. MYcsvtu Notes.

Virtual Private Network

Computer Security: Principles and Practice

Chapter 6/8. IP Security

BS801E-BSCS. Cryptography

Lesson 13 Securing Web Services (WS-Security, SAML)

10EC832: NETWORK SECURITY

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Using PGP Encryption with Cornerstone MFT Server

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Transcription:

PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP

CS6004 CYBER FORENSICS NETWORK LAYER SECURITY TRANSPORT LAYER SECURITY IPSec Protocol IP Authentication Header SSL protocol Cryptographic Computations IP ESP TLS Protocol. Key Management Protocol for IPSec. 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 2/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 3/22

Stands for Pretty Good Privacy Developed by Phil Zimmerman in 1995 Documentation and source code is freely available. The package is independent of operating system and processor 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 4/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 5/22

PGP offers 5 services Authentication Confidentiality Compression E-mail compatibility Segmentation 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 6/22

Sender creates a message SHA-1 used to generate 160-bit hash code of message Hash code is encrypted with RSA using the sender's private key, and result is attached to message Receiver uses RSA or DSS with sender's public key to decrypt and recover hash code Receiver generates new hash code for message and compares with decrypted hash code, if match, message is accepted as authentic 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 7/22

Sender generates message and random 128-bit number to be used as session key for this message only Message is encrypted, using CAST-128 / IDEA/3DES with session key Session key is encrypted using RSA with recipient's public key, then attached to message Receiver uses RSA with its private key to decrypt and recover session key Session key is used to decrypt message 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 8/22

uses both services on same message Create signature & attach to message Encrypt both message & signature Attach RSA encrypted session key 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 9/22

PGP compresses message after signing but before encrypting so can store uncompressed message & signature for later verification & because compression is non deterministic uses ZIP compression algorithm 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 10/22

when using PGP will have binary data to send (encrypted message etc) however email was designed only for text hence PGP must encode raw binary data into printable ASCII characters uses radix-64 algorithm maps 3 bytes to 4 printable chars also appends a CRC PGP also segments messages if too big 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 11/22

Consider the mapping of a 24-bit input (a block of three octets) into a four-character output consisting of the 8- bit set in the 32-bit block. Suppose the 24-bit raw text is: 10110010 01100011 00101001 The hexadecimal representation of this text sequence is b2 63 29 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 12/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 13/22

Arranging this input sequence in blocks of 6 bits yields 101100 100110 001100 101001 Extracted 6-bit decimal values 44, 38, 12, 41 Referring to Table, the radix-64 encoding of these decimal values produces the following characters smmp 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 14/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 15/22

http://www.binaryhexconverter.com/hex-to-binary-converter Consider the encoding process from 8-bit input groups to the output character string in the radix-64 alphabet. Input raw text: 0x 15 d0 2f 9e b7 4c 8-bit octets 00010101 11010000 00101111 10011110 10110111 01001100 6-bit index 000101 011101 000000 101111 100111 101011 011101 001100 Decimal 5 29 0 47 39 43 29 12 Output character R64 ASCII format (0x) F d A v n r d M 46 64 41 76 6e 72 64 4d Binary 01000110 01100100 01000001 01110110 01101110 01110010 01100100 01001101 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 16/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 17/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 18/22

Public-Key Algorithms Symmetric-Key Algorithms Compression Algorithm Hash Algorithms 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 19/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 20/22

Consider the encoding process from 8-bit input groups to the output character string in the radix-64 alphabet. Input raw text: 0x 15 d0 2f 9e b7 Input raw text: 0x 15 d0 2f 9e 1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 21/22

1/27/2017 A.Aruna / CS6303 / Arithmetic Logical Unit 22/22