Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Similar documents
Chapter 9. Public Key Cryptography, RSA And Key Management

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Public Key Cryptography

The evolving storage encryption market

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public Key Algorithms

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Learn PGP. SIPB Cluedump, 19 October Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22

Key Exchange. Secure Software Systems

Encryption. INST 346, Section 0201 April 3, 2018

Public Key Algorithms

Introduction and Overview. Why CSCI 454/554?

Public-Key Cryptography

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography. Cryptography is everywhere. German Lorenz cipher machine

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Ref:

Key Management and Distribution

Public Key Cryptography

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Overview. Public Key Algorithms I

Cryptography and Network Security. Sixth Edition by William Stallings

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Some Stuff About Crypto

Chapter 9 Public Key Cryptography. WANG YANG

Cryptography (Overview)

Lecture 6 - Cryptography

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Encryption 2. Tom Chothia Computer Security: Lecture 3

Cryptographic Systems

APNIC elearning: Cryptography Basics

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Diffie-Hellman. Part 1 Cryptography 136

Cryptography and Network Security

Public-key encipherment concept

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

PROTECTING CONVERSATIONS

Introduction to Cryptography. Vasil Slavov William Jewell College

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

CSC 474/574 Information Systems Security

Basics of Cryptography

Uzzah and the Ark of the Covenant

Chapter 3 Public Key Cryptography

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Number Theory and RSA Public-Key Encryption

Computer Security: Principles and Practice

ECE 646 Lecture 4. Pretty Good Privacy PGP

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

CS 332 Computer Networks Security

Lecture 2 Applied Cryptography (Part 2)

EEC-484/584 Computer Networks

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Making and Breaking Ciphers

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

1. Diffie-Hellman Key Exchange

Chapter 3. Principles of Public-Key Cryptosystems

CSC/ECE 774 Advanced Network Security

Using Cryptography CMSC 414. October 16, 2017

CCNA Security 1.1 Instructional Resource

Symmetric Cryptography. CS4264 Fall 2016

Cryptography and Network Security

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Crypto CS 485/ECE 440/CS 585 Fall 2017

1.264 Lecture 28. Cryptography: Asymmetric keys

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Garantía y Seguridad en Sistemas y Redes

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Channel Coding and Cryptography Part II: Introduction to Cryptography

Public Key (asymmetric) Cryptography

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

Cryptography MIS

6 Cryptographic Techniques A Brief Introduction

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

14. Internet Security (J. Kurose)

Chapter 8 Information Technology

CPSC 467: Cryptography and Computer Security

Public-key Cryptography: Theory and Practice

David Wetherall, with some slides from Radia Perlman s security lectures.

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

Public Key Infrastructures

EEC-682/782 Computer Networks I

Chapter 7 Public Key Cryptography and Digital Signatures

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Lecture 20 Public key Crypto. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides from Miller and Bailey s ECE 422

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

CT30A8800 Secured communications

Transcription:

Public Key Cryptography, OpenPGP, and Enigmail

Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it

Symmetric Cryptography shared secret key encrypt cipher plaintext decrypt ciphertext

Symmetric Cryptography Examples of symmetric ciphers: Caesar (I cent. BCE) substitution (IV cent.) Vigenère (XVI cent.) Beaufort (XIX cent.) DES (1975) 3DES (1998) AES (1998) etc.

Symmetric Cryptography Problem: deliver the key to the recipient!

Public Key Cryptography (Asymmetric Cryptography) SEC A PUB A SEC B PUB B Alice Bob First, each participant generates a key pair composed of a private key and a public key

Public Key Cryptography Encryption/Decryption (for confidentiality) Alice Bob PUB B SEC B

Public Key Cryptography Digital signature (for authentication & integrity) Alice Bob SEC A PUB A

Public Key Cryptography PKC is based on one-way functions Alice Bob DH-RSA: discrete logarithm problem e.g. 453 x (mod 21997) = 5787 x =? prime factorization e.g. prime factors of 7774733 =?

Public Key Cryptography Birth of Public Key Cryptography: 1976: Diffie-Hellman-Merkle key exchange 1977: Rivest-Shamir-Adleman, RSA cipher 1973: Ellis & Cocks (UK GCHQ) invent PKC, but discovery was classified until 1997!

Public Key Cryptography 1991: PGP (Pretty Good Privacy) 1998: OpenPGP standard 1999: GnuPG / GPG (GNU Privacy Guard) 2001: Enigmail, a plugin for Thunderbird 2014: ProtonMail

Enigmail

Enigmail First operation: create a key pair

Enigmail Public key file -----BEGIN PGP PUBLIC KEY BLOCK----- mqenbffxc8kbcac/oryc2v7uucy0q7bjtm9omzssvk0unl9hh3med3z8jevlrdz9 S4c9Z6SwK+BGL84rG9k2EkY/nYDI/+koBF43QT8LWHHUI1M+wFZ4myquNtUsPsq2 HT32YhoGLfSpKOIxxbniodsDzljR5tzO8Z3oYzNIHj5XKTmVBRDkwgQqODVcvxq8 RlNGR4Z+l1/7NFCRFUQ7fFLO3zSef1shqs5i95Q+QxySfIiGyrw0F59WOC4nrFFL Kt8EhMAs8/c9WGQyWHQubX5PfxKrA+vYhXAtlFwDHQHbZ5VerIhCa15LNkH+WB1A 9DWF/6ocOF1ABMumiXriFdwPLTyLujumtV47ABEBAAG0IERhbmllbGUgUmFmZm8g PGRhbkBlbmlnbWFpbC5uZXQ+iQE+BBMBAgAoBQJRcQvJAhsjBQkJZgGABgsJCAcD AgYVCAIJCgsEFgIDAQIeAQIXgAAKCRCJ1WTtptUNvF0kB/9+fd6v7ExWmq5qx/B1 Iq/NIxgI+dwORBBy89VGV3NexxANOYKQti2y631YVv8s7qWjHzuIlPZ5pKq7OcHd xy8fnttqe92+eyxifmjj7urqilofdomihpzaha4kzsbyzl8ynps1b16lqdhcejf5 7QMXrk2hnVOPIqz/sxt++auTnTlAo/Z6bTkIrour68DCvS4YebIDjyzX2hObFE2T 17PPjuIYrRCyIlAB6U2kxypcRiC3IOLWfDXZrn8Qf/eQ6yt6zpWbc4DC6rZU9HmW IrldsMcCeQsjJVpbzvfWthfQvMwjnXjIcaLLw7obcUOMSIBFhecozRFZCNknU8Hp N/TMuQENBFFxC8kBCACzjNGMEUu5/hX/kRy9cETfmHvy3ntvb0Yq5p317A5poahZ ZFuTGKA3ANy4syAxiYsA+jWk9xB0C8t6sqXtQUP6TjY63p3aKeJcq4SYEMfgKRq6 BZUj56rAkY87yX16PhkByEVK5pthCgfv8nbpCW7sczu0MG2o+mKTgpeuByhLzzS4 xf+wnehi0r5wwx2+aj2bhzt56yf5zocu6twnwipmxpc5bnr9okczgwcke/cqsm9c 7klDQZ2yV4Lbgokik9oU0sWeFr+UDLQxaSClv/l12tJJYyXHDOXlMPeBGkPu6TOC KCjbr1FtKYx/Dc81SL4zoylMLmboGJTljAW2vkD/ABEBAAGJASUEGAECAA8FAlFx C8kCGwwFCQlmAYAACgkQidVk7abVDbxgtwf+Jt7d1YDpcq3Pg/E2l2yCmAttPQbS MIAv0agJax2hSukPWV3zlT8BTE5nXFICxmy6H8mNo2arQMtploC6cr3Brccvyzeq 1JvNmWvVUMeo2pEjJDEFfIqy44vKKVZjoDQfH4ZT3XaXmZu2t3TYpBJjzGCDUFLb thsypu/1xvte+catnlzjbzwldcl7ion6fivxqkjxmyakfbpooe1prixmchbzuxj6 EuDVjy4fZ4U8EScHcj/BKyBO2hwqPbo+iNlhuaZ6JWvWv5T6q8cjTxwK7VZ/ndrm Dk407BwUvG3eWS/kamvmBLYbCIPye+GBLvpGBXNCgkUi+iLb73e1pG8eiw== =JEo8 -----END PGP PUBLIC KEY BLOCK-----

Enigmail Private key file -----BEGIN PGP PRIVATE KEY BLOCK----- mqgibegn3cerbac+2os2hoacip4eikxezv+ivhowaznojigzy9zy4y8c0bhup++q ccgo9vgno1vixapyvjctwx9hfjiendlsbrwor69hpbabdo+3bbokwjfygq8akynv tbcodcnfofwqs/8xdoh25/oig+ujkhgxwkjkdd1ucj7shdgioxovjo13xwcgzrga k2oa9bne3hw+jupjjlu4ubkd/i7mbqffwtgxcxfrfsvdnkmpc+qvke00ajfrp31o DbRCRL4GZCFTx4/DFy1jYbgYwl6MoCtSlufca3v5jpZbRgtKndcnlrauJO16EURs LovKAJEkeCIcbTJTwnxMxCapTWhqIaitumZ6davIvV93UcDnQfYiCASzE5q/MD8L lqsla/9rvqoiawzlq+mal0maebtgee7ydtx08ia1h3mevxvjwuhpv54atwirbkfn MFzkiFyUvQ5w3TwX8Fn17cuQNpCXTh00iG30GuZVl1aOl3fQXU/c9+vw2Rb0gvDF BBlsnZ0MQns5bt6azIcLW44FzO2NKiK6/Y2XTiDVhtSAihTWLrQmRGFuaWVsZSBS (...) LunxO87fZF+JOoxs9F0IweA2nb1ga7fQ4Ud20ZVKfE4+vGCV5KXRNcOPbJL+vzuD I7dMD+T05X8kK2x2HsaURdpKOZVhAuHIzEqn7E1UnUXnm4nVXg2bkAkBPQdfd97D 3bRLiE8EGBECAA8FAkgN3cECGwwFCQlmAYAACgkQW9ZLGa9iatRGlACeIyyIBTGj wba7+lhvnlqaokbrunotayaqzd7vookwkiz+nplf =ve7c -----END PGP PRIVATE KEY BLOCK----- Do not distribute your private key!

Enigmail

Enigmail

Enigmail

Enigmail

Enigmail Your keyring contains all your collected keys

Public Key Cryptography Check a public key s fingerprint to ensure that it belongs to the correct person

Public Key Cryptography How to obtain someone s PGP public key: by hand, via e-mail, from website, etc. from a keyserver via Web of Trust / key signing parties from Web Key Directory

Public Key Cryptography Other uses of PKC: SSL/TLS (HTTPS) secure IM: WhatsApp, Signal, etc. digitally signed software SSH S/MIME email security

Public Key Cryptography Different techniques for key authentication S/MIME, HTTPS, signed software: public key is embedded in a certificate issued by a trusted CA SSH, secure IM: trust on first use (optional fingerprint check)

Public Key Cryptography Thanks for your attention!