Top Banner
CS@UTC 1 Electronic mail security -- Pretty Good Privacy
21

CS@UTC1 Electronic mail security -- Pretty Good Privacy.

Dec 21, 2015

Download

Documents

Cleopatra Wood
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 1

Electronic mail security

-- Pretty Good Privacy

Page 2: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 2

Pretty Good PrivacyPretty Good Privacy

• Philip R. Zimmerman is the creator of PGP.

• PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.

Page 3: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 3

Why Is PGP Popular?Why Is PGP Popular?

• It is availiable free on a variety of platforms.

• Based on well known algorithms.• Wide range of applicability• Not developed or controlled by

governmental or standards organizations

Page 4: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 4

Operational DescriptionOperational Description

• Consist of five services:– Authentication– Confidentiality– Compression– E-mail compatibility– Segmentation

Page 5: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 5

PGP Operation – PGP Operation – AuthenticationAuthentication

1. Sender creates a message

2. SHA1 used to create 160-bit hash of message3. Hash code is encrypted using the sender's

private key, and resulting signature is attached to message

4. Receiver uses sender's public key to decrypt attached signature and recover hash code

5. Receiver generates hash code of message and compares with decrypted hash code.If match, message is accepted as authentic

Page 6: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 6

PGP Operation – PGP Operation – AuthenticationAuthentication

M = original messageH = hash function| | = concatenation (join)Z = compressionZ-1 = decompression

EP = public key encryptionDP = public key decryption KRa = A’s private keyKUa = A’s public key

Page 7: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 7

PGP Operation – PGP Operation – ConfidentialityConfidentiality

1. Sender generates message and random number to be used as session key for this message only

2. Message is encrypted, using AES, 3DES, IDEA or CAST-128, with session key

3. Session key is encrypted using RSA with recipient's public key, then attached to msg

4. Receiver uses RSA with its private key to decrypt and recover session key

5. Session key is used to decrypt message

Page 8: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 8

EC = symmetric encryptionDC = symmetric decryptionKs = session key

PGP Operation – PGP Operation – ConfidentialityConfidentiality

(book, fig 5.1b)

Page 9: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 9

Page 10: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 10

PGP Operation – PGP Operation – CompressionCompression

• PGP compresses the message:• after signing the hash

– to save having to compress document every time you wish to verify its signature

• before encryption– to speed up the process (less data to

encrypt)– for greater security; compressed messages

are more difficult to cryptanalyse as they have less redundancy)

Page 11: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 11

E-mail CompatibilityE-mail Compatibility• The scheme used is radix-64 conversion.• The use of radix-64 expands the message

by 33%.

Page 12: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 12

PGP PGP Operation – RADIX-Operation – RADIX-64 encoding64 encoding

Page 13: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 13

PGP PGP Operation – Operation – Segmentation/ReassemblySegmentation/Reassembly

• Email protocols often restrict a message to a certain maximum size (e.g. 50KB)

• Thus PGP divides messages that are too large into smaller ones

• Reassembly at the other end is required before decryption or signature verification

Page 14: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 14

Summary of PGP Summary of PGP Services Services

Function Algorithm Used Digital Signature DSS/ SHA or

RSA/ SHA Message Encryption

CAST or I DEA or three-key triple DES with Diffi e-Hellman or RSA

Compression ZI P E-mail Compatibility

Radix-64 conversion

Segmentation -

Page 15: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 15

Page 16: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 16

Format of PGP MessageFormat of PGP Message

Page 17: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 17

Page 18: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 18

Page 19: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 19

Page 20: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 20

The Use of TrustThe Use of Trust

• Key legitimacy field• Signature trust field• Owner trust field

Page 21: CS@UTC1 Electronic mail security -- Pretty Good Privacy.

CS@UTC 21