electronic mail security -- pretty good privacy

21
CS@UTC 1 Electronic mail security -- Pretty Good Privacy

Upload: clara

Post on 06-Jan-2016

45 views

Category:

Documents


1 download

DESCRIPTION

Electronic mail security -- Pretty Good Privacy. Pretty Good Privacy. Philip R. Zimmerman is the creator of PGP. PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications. Why Is PGP Popular?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Electronic mail security  --  Pretty Good Privacy

CS@UTC 1

Electronic mail security

-- Pretty Good Privacy

Page 2: Electronic mail security  --  Pretty Good Privacy

CS@UTC 2

Pretty Good PrivacyPretty Good Privacy

• Philip R. Zimmerman is the creator of PGP.

• PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.

Page 3: Electronic mail security  --  Pretty Good Privacy

CS@UTC 3

Why Is PGP Popular?Why Is PGP Popular?

• It is availiable free on a variety of platforms.

• Based on well known algorithms.• Wide range of applicability• Not developed or controlled by

governmental or standards organizations

Page 4: Electronic mail security  --  Pretty Good Privacy

CS@UTC 4

Operational DescriptionOperational Description

• Consist of five services:– Authentication– Confidentiality– Compression– E-mail compatibility– Segmentation

Page 5: Electronic mail security  --  Pretty Good Privacy

CS@UTC 5

PGP Operation – PGP Operation – AuthenticationAuthentication

1. Sender creates a message

2. SHA1 used to create 160-bit hash of message3. Hash code is encrypted using the sender's

private key, and resulting signature is attached to message

4. Receiver uses sender's public key to decrypt attached signature and recover hash code

5. Receiver generates hash code of message and compares with decrypted hash code.If match, message is accepted as authentic

Page 6: Electronic mail security  --  Pretty Good Privacy

CS@UTC 6

PGP Operation – PGP Operation – AuthenticationAuthentication

M = original messageH = hash function| | = concatenation (join)Z = compressionZ-1 = decompression

EP = public key encryptionDP = public key decryption KRa = A’s private keyKUa = A’s public key

Page 7: Electronic mail security  --  Pretty Good Privacy

CS@UTC 7

PGP Operation – PGP Operation – ConfidentialityConfidentiality

1. Sender generates message and random number to be used as session key for this message only

2. Message is encrypted, using AES, 3DES, IDEA or CAST-128, with session key

3. Session key is encrypted using RSA with recipient's public key, then attached to msg

4. Receiver uses RSA with its private key to decrypt and recover session key

5. Session key is used to decrypt message

Page 8: Electronic mail security  --  Pretty Good Privacy

CS@UTC 8

EC = symmetric encryptionDC = symmetric decryptionKs = session key

PGP Operation – PGP Operation – ConfidentialityConfidentiality

(book, fig 5.1b)

Page 9: Electronic mail security  --  Pretty Good Privacy

CS@UTC 9

Page 10: Electronic mail security  --  Pretty Good Privacy

CS@UTC 10

PGP Operation – PGP Operation – CompressionCompression

• PGP compresses the message:• after signing the hash

– to save having to compress document every time you wish to verify its signature

• before encryption– to speed up the process (less data to

encrypt)– for greater security; compressed messages

are more difficult to cryptanalyse as they have less redundancy)

Page 11: Electronic mail security  --  Pretty Good Privacy

CS@UTC 11

E-mail CompatibilityE-mail Compatibility• The scheme used is radix-64 conversion.• The use of radix-64 expands the message

by 33%.

Page 12: Electronic mail security  --  Pretty Good Privacy

CS@UTC 12

PGP PGP Operation – RADIX-Operation – RADIX-64 encoding64 encoding

Page 13: Electronic mail security  --  Pretty Good Privacy

CS@UTC 13

PGP PGP Operation – Operation – Segmentation/ReassemblySegmentation/Reassembly

• Email protocols often restrict a message to a certain maximum size (e.g. 50KB)

• Thus PGP divides messages that are too large into smaller ones

• Reassembly at the other end is required before decryption or signature verification

Page 14: Electronic mail security  --  Pretty Good Privacy

CS@UTC 14

Summary of PGP Summary of PGP Services Services

Function Algorithm Used Digital Signature DSS/ SHA or

RSA/ SHA Message Encryption

CAST or I DEA or three-key triple DES with Diffi e-Hellman or RSA

Compression ZI P E-mail Compatibility

Radix-64 conversion

Segmentation -

Page 15: Electronic mail security  --  Pretty Good Privacy

CS@UTC 15

Page 16: Electronic mail security  --  Pretty Good Privacy

CS@UTC 16

Format of PGP MessageFormat of PGP Message

Page 17: Electronic mail security  --  Pretty Good Privacy

CS@UTC 17

Page 18: Electronic mail security  --  Pretty Good Privacy

CS@UTC 18

Page 19: Electronic mail security  --  Pretty Good Privacy

CS@UTC 19

Page 20: Electronic mail security  --  Pretty Good Privacy

CS@UTC 20

The Use of TrustThe Use of Trust

• Key legitimacy field• Signature trust field• Owner trust field

Page 21: Electronic mail security  --  Pretty Good Privacy

CS@UTC 21