Pretty Good Privacy - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

Pretty Good Privacy

Description:

In this Project we are discussing the PGP Secure Messaging System. ... Brute Force Attacks. Operating System attacks. Network Attacks. Non technical Attacks ... – PowerPoint PPT presentation

Number of Views:388
Avg rating:3.0/5.0
Slides: 23
Provided by: npko
Category:

less

Transcript and Presenter's Notes

Title: Pretty Good Privacy


1
Pretty Good Privacy
  • Niket P. Kothari
  • Bhumika K Mehta
  • CSE 691 Internet Security Principles
  • Fall 2001- Final Project Presentation

2
Project Description
  • In this Project we are discussing the PGP
    Secure Messaging System. We are discussing how a
    message in encrypted and Decrypted in PGP and
    also how a Digital Signature is created.We are
    also going over some issues related to the use of
    PGP, some applications, and then a study of the
    downloaded software.

3
Contents of the Final Report
  • Introduction.
  • Why do you need PGP?
  • Basic Terminology.
  • Algorithms Used
  • How PGP Works?
  • Digital Certificates.
  • Practical attacks on PGP

4
Contents ( contd )
  • PGP legal Issues
  • Applications of PGP
  • What Bugs have been found in PGP
  • Conclusion
  • References
  • Appendix Using Different Tools in the
    Downloaded software

5
Why Do You need PGP ?
  • PGP provides the following Security Features
  • Confidentiality
  • Data Origin Authentication
  • Message Integrity

6
Basic Terminology
  • Keys
  • Public Key
  • Secret Key
  • Session Key
  • Key Certificates
  • Key Rings
  • Pass Phrases

7
Algorithms Used
  • Conventional Encryption Algorithms
  • Public Key Encryption Algorithms
  • Digital Signature Algorithms
  • Other Algorithms

8
How PGP Works ?
  • How a Message is Encrypted ?

9
How PGP Works ? ( contd )
  • How a Message is Decrypted ?

10
How PGP Works ? ( contd )
  • Digital Signatures.

11
How PGP Works ? ( contd )
  • Hash Functions

12
Digital certificates
  • A digital certificate Consists of
  • A Public Key
  • Certificate Information.
  • One or more Digital Signatures
  • Two Types of certificates used in PGP
  • PGP Certificate
  • X.509 Certificate

13
Digital Certificates .. ( contd )
  • PGP Certificate Format

14
Digital Certificates .. ( contd )
  • X.509 Certificate Format

15
Digital Certificates .. ( contd )
  • Certificate Distribution
  • Certificate servers
  • Public Key Infrastructures
  • Certificate Revocation
  • Communicating that a certificate has been revoked

16
Practical Attacks on PGP
  • Trojan Horse attacks
  • Brute Force Attacks
  • Operating System attacks
  • Network Attacks
  • Non technical Attacks
  • There are Counter Measures for all these kinds of
    attacks

17
Applications of PGP
  • An Introduction on some of the applications like
  • PGPFone
  • PGPDisk
  • The GNU privacy Guard ( GnuPG )
  • EBP ( Even Better Privacy )

18
Bugs found in PGP
  • Bugs related to MIT PGP should be sent to
  • pgp-bugs_at_mit.edu
  • Bug reports concerning non-MIT versions of PGP
    should be sent to
  • comp.security.pgp.tech
  • A short list of bugs in version later then 2.4 is
    given in the report.

19
References
  • Book Referred
  • Garfinkel, Simson, PGP Pretty Good Privacy,
  • OReilly Associates, 1994
  • Web Sites Referred
  • http//www,faqs.org/faqs/pgp-faq/part1
  • http//pgpdist.mit.edu/distserver/zz341524989/newp
    gp/index.html

20
References .. ( contd )
  • http//www.pgpi.org/
  • http//www.pgpi.org/doc/pgpintro/p11
  • http//thegate.gamers.org/tony/pgp-legal.html
  • http//www.pgp.net/pgnet/pgp-faq/faq-09.html9.2
  • http//www.pgp.net/pgnet/pgp-faq/
  • http//www.privacy.com.au/pgpatk.html

21
Appendix
  • The Appendix contains an introduction of the
    tools supported by the Downloaded PGP software.
  • The Downloaded software is the MIT PGP Software
    Version 6.5.8.

22
Final Conclusion
  • Thus the goal of introducing PGP and study on
    how it uses cryptography to encrypt the messages
    for a secure transmission is understood and
    further issues related to the use of PGP have
    been studied.
Write a Comment
User Comments (0)
About PowerShow.com