Professional Documents
Culture Documents
Introduction
Introduction
The first version of PGP was programmed in 1991 by Phil R. Zimmerman, who later founded PGP Security Consulting. till now many versions of PGP has been launched.
Phil R. Zimmerman
Most recent being PGP Universal Gateway Vibhuti Bhushan, B.Tech., CSE, Email, Desktop email..etc...
NITC
Introduction (continues)
PGP Components
Scenarios Key Rings PGP Certificates Key Revocation Extracting Information from Rings PGP Packets PGP Messages
Vibhuti Bhushan, B.Tech., CSE, NITC 6
Every sender and reciever keeps a set of his own public-key , private-key pair and of all the users also, to whom he wants to send message. And to each user sender assigns a Trust level : full, partial, none. PGP certificates used to check key legitimacy of others.
10
Continued...
11
12
13
Introduction
The following algorithms are employed by PGP: 1. IDEA Cipher
- developed by James Massey & Xuejia Lai in 1990
3. GZIP
- A combination of Lempel-Ziv and Huffman Encoding
14
Algorithm (continues)
PGP Improvements:
1. Instead of using the the same key each time, PGP randomly generated a new IDEA key for every session. The same message sent at different times will be totally different and remembering the key will be useless and unnecessary. 2. The IDEA key is encrypted via RSA public key encryption algorithm. Decryption can be achieved only by those who knows the complementary key. 3. PGP compresses packages with GZIP.
Vibhuti Bhushan, B.Tech., CSE, NITC 15
Algorithm (continues)
16
Algorithm (continues)
17
Algorithm (continues)
18
Algorithm (continues)
19
By combining both IDEA and RSA, PGP uses the strengths of one algorithm to compensate for the weaknesses of the other. As the result, PGP is one of the strongest and fastest encrypting algorithm in existence.
20
NITC
21
22
PGP Desktop 9.x family includes PGP Desktop Email, PGP Whole Disk Encryption, and PGP NetShare.
Depending on application, the products feature desktop email, digital signatures, IM security, whole disk encryption, file and folder security, self decrypting archives, and secure shredding of deleted files.
23
References
PGP International Homepage. http://www.pgpi.org, 2001. PGP Security BIND vulnerability COVERT CyberCop Gauntlet. www.pgp.com, 2001. Back, Adam, PGP Timeline. http://www.cypherspace.org/~adam/timeline/, 1998. Brown, Lawrie, Cryptography and Computer Security. http://www.cs.adfa.oz.au/teaching/studinfo/csc/lectures/, 2001. Davie and Peterson, Larry L., Computer Networks. 2nd ed. Boston: Morgan Kaufmann, 2000. Page 599-601. Gimon, Charles A., The Phil Zimmerman Case. http://www.skypoint.com/members/gimonca/philzima.html, 1996.
25
Thank You!!!!!