Pretty Good Privacy (PGP)

Similar documents
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Pretty Good Privacy (PGP

Summary of PGP Services

Cryptography and Network Security. Sixth Edition by William Stallings

Chapter 5 Electronic mail security

Cryptography and Network Security

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

ECE 646 Lecture 4. Pretty Good Privacy PGP

Lecture 4: Cryptography III; Security. Course Administration

Key management. Pretty Good Privacy

Message authentication

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

(2½ hours) Total Marks: 75

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

Electronic mail security

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Summary on Crypto Primitives and Protocols

Introduction and Overview. Why CSCI 454/554?

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Appendix A: Introduction to cryptographic algorithms and protocols

Overview. SSL Cryptography Overview CHAPTER 1

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Encryption and Forensics/Data Hiding

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

CSC 474/574 Information Systems Security

UNIT - IV Cryptographic Hash Function 31.1

CSE 565 Computer Security Fall 2018

Encrypted Data Deduplication in Cloud Storage

Public-key Cryptography: Theory and Practice

Public-Key Infrastructure NETS E2008

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

CS 356 Internet Security Protocols. Fall 2013

Chapter 9: Key Management

Security and Anonymity

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

APNIC elearning: Cryptography Basics

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Outline Key Management CS 239 Computer Security February 9, 2004

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

BS801E-BSCS. Cryptography

T Cryptography and Data Security

Gestion et sécurité des réseaux informatiques. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

T Cryptography and Data Security

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

CS 425 / ECE 428 Distributed Systems Fall 2017

CSC 774 Network Security

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:

Using Cryptography CMSC 414. October 16, 2017

Remote E-Voting System

Network Security Chapter 8

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Security. Communication security. System Security

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Cryptography (Overview)

Digital Certificates Demystified

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

The Research on PGP Private Key Ring Cracking and Its Application

Understanding HTTPS CRL and OCSP

Alice in Cyber world

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Cryptographic Concepts

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols. Lecture Notes on Computer and Network Security. by Avi Kak

FTP. FTP offers many facilities :

L8: Public Key Infrastructure. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

CT30A8800 Secured communications

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

CS Computer Networks 1: Authentication

Chapter 3: Securing applications

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography and Network Security Chapter 14

Diffie-Hellman. Part 1 Cryptography 136

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

CSC/ECE 774 Advanced Network Security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

INF3510 Information Security University of Oslo Spring Lecture 3 Key Management and PKI. Audun Jøsang

WHITE PAPER. Authentication and Encryption Design

Overview of Authentication Systems

EEC-682/782 Computer Networks I

Lesson 13 Securing Web Services (WS-Security, SAML)

CS669 Network Security

Introduction to Cryptography in Blockchain Technology. December 23, 2018

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

CSE 127: Computer Security Cryptography. Kirill Levchenko

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Signature Validity States

1.264 Lecture 28. Cryptography: Asymmetric keys

CYBER SECURITY MADE SIMPLE

PROTECTING CONVERSATIONS

SECURITY IN NETWORKS 1

Cryptographic Systems

Transcription:

Pretty Good Privacy (PGP) -- PGP services -- PGP key management (c) Levente Buttyán (buttyan@crysys.hu) What is PGP? general purpose application to protect (encrypt and/or sign) files can be used to protect e-mail messages can be used by corporations as well as individuals based on strong cryptographic algorithms first version developed by Phil Zimmermann international version available free of charge at http://www.pgpi.org Pretty Good Privacy (PGP) 2

PGP services messages authentication confidentiality compression e-mail compatibility segmentation and reassembly key management generation, distribution, and revocation of public/private keys generation and transport of session keys and IVs Pretty Good Privacy (PGP) 3 Message authentication based on digital signatures supported algorithms: RSA/SHA and DSS/SHA K snd -1 sender m h σ hash hash enc enc receiver m h h σ hash hash compare compare dec dec K snd accept / reject Pretty Good Privacy (PGP) 4

Message confidentiality symmetric key encryption in CFB mode with a random key and IV session key and IV is encrypted with the public key of the receiver supported algorithms: symmetric: CAST, IDEA, 3DES asymmetric: RSA, ElGamal m prng prng K rcv {k, iv} Krcv sender s.enc s.enc k, iv a.enc a.enc {m} k Pretty Good Privacy (PGP) 5 Compression applied after the signature enough to store clear message and signature for later verification it would be possible to dynamically compress messages before signature verification, but then all PGP implementations should use the same compression algorithm however, different PGP versions use slightly different compression algorithms applied before encryption would be useless after encryption compression reduces redundancy makes cryptanalysis harder supported algorithm: ZIP Pretty Good Privacy (PGP) 6

E-mail compatibility encrypted messages and signatures may contain arbitrary octets most e-mail systems support only ASCII characters PGP converts an arbitrary binary stream into a stream of printable ASCII characters radix 64 conversion: 3 8-bit blocks 4 6-bit blocks 0 7 0 7 0 7 0 5 0 5 0 5 0 5 Pretty Good Privacy (PGP) 7 Radix 64 conversion table 6-bit character 6-bit character 6-bit character 6-bit character value encoding value encoding value encoding value encoding 0 A 16 Q 32 g 48 w 1 B 17 R 33 h 49 x 2 C 18 S 34 i 50 y 3 D 19 T 35 j 51 z 4 E 20 U 36 k 52 0 5 F 21 V 37 l 53 1 6 G 22 W 38 m 54 2 7 H 23 X 39 n 55 3 8 I 24 Y 40 o 56 4 9 J 25 Z 41 p 57 5 10 K 26 a 42 q 58 6 11 L 27 b 43 r 59 7 12 M 28 c 44 s 60 8 13 N 29 d 45 t 61 9 14 O 30 e 46 u 62 + 15 P 31 f 47 v 63 / (pad) = Pretty Good Privacy (PGP) 8

General PGP message format session key component signature key ID of K rcv session key k and iv timestamp key ID of K snd leading two octets of hash { } Krcv hash(timestamp, data) { } Ksnd -1 filename time of creation ZIP { } k R64 message data Pretty Good Privacy (PGP) 9 Key IDs a user may have several public key private key pairs which private key to use to decrypt the session key? which public key to use to verify a signature? transmitting the whole public key would be wasteful associating a random ID to a public key would result in management burden PGP key ID: least significant 64 bits of the public key unique within a user with very high probability Pretty Good Privacy (PGP) 10

Private-key ring used to store the public key private key pairs owned by a given user essentially a table, where each row contains the following entries: timestamp key ID (indexed) public key encrypted private key user ID (indexed) private key passphrase hash hash enc enc encrypted private key Pretty Good Privacy (PGP) 11 Public-key ring used to store public keys of other users a table, where each row contains the following entries: timestamp key ID (indexed) public key user ID (indexed) owner trust signature(s) signature trust(s) key legitimacy Pretty Good Privacy (PGP) 12

Trust management owner trust assigned by the user possible values: unknown user usually not trusted to sign usually trusted to sign always trusted to sign ultimately trusted (own key, present in private key ring) signature trust assigned by the PGP system if the corresponding public key is already in the public-key ring and its legitimacy is verified, then its owner trust entry is copied into signature trust otherwise, signature trust is set to unknown user Pretty Good Privacy (PGP) 13 Trust management key legitimacy computed by the PGP system if at least one signature trust is ultimate, then the key legitimacy is 1 (complete) otherwise, a weighted sum of the signature trust values is computed always trusted signatures has a weight of 1/X usually trusted signatures has a weight of 1/Y X, Y are user-configurable parameters example: X=2, Y=4 1 ultimately trusted, or 2 always trusted, or 1 always trusted and 2 usually trusted, or 4 usually trusted signatures are needed to obtain full legitimacy Pretty Good Privacy (PGP) 14

Example key legitimacy X = 1, Y = 2 G B C D H user K F untrusted / usually untrusted usually trusted always trusted ultimately trusted (you) A E 1 L 1 J I M signature legitimate Pretty Good Privacy (PGP) 15 Public-key revocation why to revoke a public key? suspected to be compromised (private key got known by someone) re-keying the owner issues a revocation certificate has a similar format to normal public-key certificates contains the public key to be revoked signed with the corresponding private key and disseminates it as widely and quickly as possible if a key is compromised: e.g., Bob knows the private key of Alice Bob can issue a revocation certificate to revoke the public key of Alice even better for Alice Pretty Good Privacy (PGP) 16