PGP (Pretty Good Privacy) - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

PGP (Pretty Good Privacy)

Description:

There are three levels of trust in PGP: none, partial, or complete. 10. Conclusion ... It is capable of accepting different types of formats:message formats and ... – PowerPoint PPT presentation

Number of Views:368
Avg rating:3.0/5.0
Slides: 13
Provided by: sheila73
Category:

less

Transcript and Presenter's Notes

Title: PGP (Pretty Good Privacy)


1
PGP (Pretty Good Privacy)
  • Sheila Alston
  • Old Dominion University
  • November 2, 2005

2
What is PGP?
  • Secure mail protocol
  • Performs encryption and integrity protection on
    files
  • Original author Phil Zimmerman
  • Guerrilla Freeware
  • Generates private key for you
  • Uses public key cryptography for personal keys

3
How PGP Encryption Works
  • User encrypts plaintext using PGP
  • PGP compresses the plaintext
  • PGP creates a session key, which is a one-time
    secret key
  • The secret key works with the plaintext using a
    conventional encryption algorithm to encrypt the
    plaintext
  • The end result is ciphertext
  • Once data is encrypted the session key is
    encrypted to the recipients public key
  • Public key-encrypted session key is transmitted
    along with the encrypted data to the recipient

4
How PGP Works
5
How PGP Decryption Works
  • The recipient's copy of PGP uses their private
    key to recover the session key
  • PGP uses the recovered session key to decrypt the
    ciphertext
  • The combination of the two encryption methods
    combines the convenience of public key encryption
    with the speed of conventional encryption

6
How PGP Decrypts
7
Key Distribution
  • PGP uses public key cryptography for personal
    keys
  • Each user decides which keys to trust
  • PGP doesnt require certificates. They are
    optional.
  • To send someone mail or to verify their
    signature, you need to know their public key
  • People publish their PGP fingerprints on their
    websites, business cards, in their books, etc.

8
Private Key
  • PGP will generate a private key for you
  • You can specify the size of the key
  • It prompts you for a password
  • Password is converted into a IDEA key by doing
    MD5 message digest
  • IDEA key is used to encrypt the private key
  • Encryption is done with 64-bit CFB using a random
    IV which is stored with the encrypted private key

9
Key Rings
  • PGP creates key rings
  • Key Rings are data structures that contain. pubic
    keys, information about people and certificates.
  • Key Rings can be used as a database of public
    keys.
  • There are three levels of trust in PGP none,
    partial, or complete.

10
Conclusion
  • PGP is used to perform encryption and decryption
    for mail and for integrity protection of files.
  • It is capable of accepting different types of
    formatsmessage formats and primitive object
    formats.
  • PGP is used to protect our privacy.

11
References
  • How PGP Works, http//www.pgpi.org/doc/pgpintro/
  • Network Security Private Communication in a
    Public World, Second Edition, Prentice Hall PTR
  • ftp//ftp.pgpi.org/pub/pgp/6.5/docs/english/IntroT
    oCrypto.pdf
  • PGP Corporation - Home Page http//www.pgp.com/

12
Thank You
Write a Comment
User Comments (0)
About PowerShow.com