a digital data encryption program created by phil zimmerman presented by netiva caftori l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
a digital data encryption program Created by Phil Zimmerman Presented by Netiva Caftori PowerPoint Presentation
Download Presentation
a digital data encryption program Created by Phil Zimmerman Presented by Netiva Caftori

Loading in 2 Seconds...

play fullscreen
1 / 14

a digital data encryption program Created by Phil Zimmerman Presented by Netiva Caftori - PowerPoint PPT Presentation


  • 207 Views
  • Uploaded on

Pretty Good Privacy. a digital data encryption program Created by Phil Zimmerman Presented by Netiva Caftori. A word about PGP one of the strongest encryption tools available. Encryption is the process whereby codes are used to attempt to conceal the meaning of a message

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'a digital data encryption program Created by Phil Zimmerman Presented by Netiva Caftori' - Faraday


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
a digital data encryption program created by phil zimmerman presented by netiva caftori

Pretty Good Privacy

a digital data encryption program

Created by

Phil Zimmerman

Presented by

Netiva Caftori

a word about pgp one of the strongest encryption tools available
A word about PGPone of the strongest encryption tools available
  • Encryption is the process whereby codes are used to attempt to conceal the meaning of a message
  • Cryptography is the science of writing messages in secret codes . It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone
  • to promote awareness of the privacy issue in a digital age
where did pgp come from and how does it work
PGP is the culmination of a long history of cryptographic discoveries.

PGP uses public and private Key encryption

you'll share your Public Key with anyone you wish

Your Public Key is used to encrypt a message

you'll guard your Private Key secret

The Private Key is used to decrypt data that have been encrypted using your Public Key.

Where did PGP come fromandhow does it work?
public and private key encryption
Public and Private Key encryption
  • the message encrypted using your Public Key can only be decrypted by you, the owner of the corresponding Private Key
  • encryption solves 1of 2 major problems with older methods, namely that you had to somehow share the key with anyone you wanted to be able to read (decrypt) your secret message
the second major problem with older methods
The second major problem with older methods
  • Unlike earlier encryption methods, the security of PGP encryption lies entirely with the key.
  • It is PGP's selection of the complex keys used to do an encryption that makes it next to impossible to crack.
key attributes of secret key vs public key
Thousands years use

DES

Fast

Keys shared between usually only 2 people

128 bit

No non-repudiation (need 3rd party as witness)

Less than 50 years

RSA

Slow

Private: concealed

Public: widely shared

1,024

Nonrepudiation: Can’t deny having sent a message

Key attributes ofSecret keyvs. Public key
vocabulary definitions and acronyms
Symmetric encryption

Asymmetric encryption

Plaintext

Cyphertext

Cryptanalyst

Fi(n)=# positive integers <n relatively prime to n

DES=Data Encryption Standard

NSA=National Security Agency

Authentication

Man-in-the-middle

Trapdoors

Key escrow

Brute force attack

Vocabulary, definitions, and acronyms
public key encryption systems
Public key encryption systems
  • 1976: Diffie and Hellman
  • Merkle-Hellman Knapsacks
  • 1978: Rivest-Shamir-Adelman (RSA)
  • 1984: El gamal and digital signature
  • Hash algorithm
rsa encryption operates with arithmetic mod n
RSA Encryptionoperates with arithmetic mod n
  • e=encryption key; d=decryption key
  • P=plaintext---> Pe mod n =cyphertext
  • (Pe)d mod n = P recovered plaintext
  • Encryption and decryption are mutual inverses and commutative
  • Select large n=pq p & q prime
  • Choose e relatively prime to (p-1)(q-1)
  • Select d so e*d=1 mod (p-1)(q-1)
  • Or e*d=1 mod fi(n) as fi(p)=p-1 for p prime
  • Euler-Fermat: x**fi(n)=1mod n for all x relatively prime to n
public key cryptography is based on multiplicative inverses
Public key cryptography is based on multiplicative inverses
  • Suppose message to encrypt is ABC
  • Translate to 23+69+14=106
  • 106 is sent

Since 23*22=1 mod 101 the recipient will multiply 106x22=2332=9 mod 101

And infer that the message is ABC since 9=1+3+5

  • An interceptor will spend a long time figuring it out.
rsa vs knapsack
RSA vs. Knapsack
  • An error was discovered in the knapsack encryption by Shamir (from RSA), and is no longer used.
  • Modular inverse pairs are more used in RSA than in Knapsack.
  • RSA is the most widely used public key cryptographic system.
  • It bases its security on the difficulty of performing inverse calculations.
slide13

Pretty Good privacy

  • PGP is a remarkable phenomenon that provides confidentiality, authentication, and compression for email and data storage.
  • Its building blocks are made of the best available cryptographic algorithms: RSA, DSS, Diffie-Hellman.
  • It is independent of operating system and processor.
  • It has a small set of easy-to-use commands
conclusions
Conclusions
  • Because PGP is freely available via the Internet, and has a fully compatible low-cost commercial version it is now widely used.
  • It has a wide range of applicability from corporations to individuals who wish to communicate worldwide securely over the Internet and other networks.
  • It is not controlled by any government which makes it attractive to many.