Professional Documents
Culture Documents
6) a.PGP Message Generation and Reception
6) a.PGP Message Generation and Reception
Security
private kev itself is not stored in the key ring. Rather, this key is encryped
Message
digest RNG
EP
Message
M
SessionKs key
Message Output
Signature
+ message EP
TECHNICAL PUBLICATIONS - an
4- 13
Application Layer Security
ii. PGP prompts user for
. PGP constructs the pasS-phrase to decrypt private key.
signature.component of the message.
b)Encryptsthe message :
PGP
i generates a session key and encrypts the
; PGP retrieves the receiver public key message.
id as an index, from the key ring using its user
ii PGP constructs session component of message.
11.5 PGP Message Reception
Fig. 4.1.9 shows PGP message receptiorn.
Public key
Passphrase H
ring
Select
Private key
ring
Select
encrypted
private key
DC
Private key
KRy
Public key
Receiver's KUa
key ID
DP
Encrypted
|session key
Session key Senders
Key ID
Encrypted Ks
message Encrypted DP
|+signature digest
DC Compare
Message
-
Fig. 4.1.9 PGP message recèption
The
a) receiving thePGP entity performsthe following steps :
Decrypting i
message :
PGP get privaté key from private-key ring using Key ID field in
session key component of message as an index.
ii. PGP prompts user for pass-phrase to decrypt private key.
iii. PGP recoves the session key and.decrypts the message.
TECHNICAL PUBLICATIONS an up-thrust for khowledge
Network Security 4- 14
Application Layer Securty
b) Authenticating the message :
i. PGP retrieves the sender's public key from the public-key ring
the Key ID field in the signature key component as index using
"ii. PGP recovers the transmitted message digest.
111. PGP computes the message for the received message and compares it
to the transmitted version for authentication.
D
E
H K
G N
o
X is signed by Y
(a)