Professional Documents
Culture Documents
PGP & Mime
PGP & Mime
PGP & Mime
Outline
2
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
PGP
4
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 5
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Operational Description
Henric Johnson 6
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 7
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 9
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
10
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
11
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 12
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Growth of PGP
PGP Authentication
This is a digital signature function.
1 Sender creates a message.
2 SHA-1 (or DSS/SHA-1) is used to generate a 160-bit hash
code of the message.
3 The hash code is encrypted with RSA using the sender’s
private key and the result is prepended to the message.
4 The receiver uses RSA with the sender’s public key to
decrypt and recover the hash code.
5 The receiver generates a new hash code for the message and
compares it with e decrypted hash code.
PGP Confidentiality
Compression
E-mail Compatibility
At the receiving end, PGP strips off mail headers and reassembles
the message from its component pieces.
Key Management
PGP makes use of four types of keys: one-time session
symmetric keys, public keys, private keys, passphrase-based
symmetric keys.
1 Unpredictable session keys must be generated.
2 PGP allows users to have multiple public/private key pairs.
There is not a one-one correspondence between users and
public keys.
3 Each entity must maintain a file of its own public/private key
pairs as well as the public keys of others
Signing a Message
Encrypting a Message
[4]
Decrypting a message
Authenticating a Message
• PGP retrieves sender’s public key from the public-key ring,
using the Key ID field in the signature key component of the
message as an index.
• PGP recovers the transmitted message digest.
• PGP computes the message digest for the received message
and compares it to the transmitted message digest to
authenticate.
• compromise is suspected, or
• to limit the period of use of the key.
S/MIME
Henric Johnson 33
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 34
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 35
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
S/MIME Functions
Henric Johnson 36
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Algorithms Used
Henric Johnson 37
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 38
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 39
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
Henric Johnson 40
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
References
• http://www.brainkart.com/article/Classical-Encryption-
Techniques_8339/
• https://www.tutorialspoint.com/cryptography/index.ht
m
• https://www.geeksforgeeks.org/cryptography-introducti
on/
• https://www.techopedia.com/definition/1770/cryptogr
aphy#:~:text=Cryptography%20involves%20creating%2
0written%20or,information%20to%20be%20kept%20s
ecret.&text=Information%20security%20uses%20crypto
graphy%20on,transit%20and%20while%20being%20st
ored
.
• https://www2.slideshare.net/lineking/classical-encrypti
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
E- Books Recommended
• https://www.pdfdrive.com/cyber-security-books.html
• https://bookauthority.org/books/new-cyber-security-eb
ooks
• https://bookauthority.org/books/best-cyber-security-eb
ooks
• https://www.freetechbooks.com/information-security-f5
2.html