1 / 13

PGP ENCRYPTION

PGP ENCRYPTION. Prepared by Noel Kigaraba.

gezana
Download Presentation

PGP ENCRYPTION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PGP ENCRYPTION Prepared by Noel Kigaraba

  2. IntroductionThis presentation explains the basic information about PGP encryption software.It discusses the practical use and installation of PGP in UNIX system. User requires spending an addition time to learn and become familiar with other PGP features and installation process.

  3. What is PGP? PGP describes as “PRETTY GOOD PRIVACY” is an encryption computer program. In the early 1990s, software engineer Philip Zimmermann initially developed PGP program. The PGP is based on technology called RSA public key encryption. The RSA is a name derived from the initials of the developers of the encryption technology: Rivest, Shamir, and Adelmen.

  4. PGP supports the following computer systems • UNIX/Linux, Windows, DOS, and Macintosh. • In UNIX/Linux systems PGP can be executed either using the command line interface or the graphical interface (GUI).

  5. PGP Distribution • There are wide range of PGP distribution web sites and subsequent versions available. • Most of PGP versions are located at this web site http://www.pgpi.org. • User can download a free copy of PGP (freeware) for personal use only. • In contrast, PGP freeware is not permitted for commercial use. • Accordingly, PGP commercial version is distributed and supported addition features; which are designed for commercial uses and not available in freeware version. For instance, PGP Personal Security and PGP Desktop Security are commercial versions.

  6. PGP uses Using Internet, it is entirely possible that email information can be compromised. After all, email by default is not secure at all. • Therefore, PGP has become as effective method for encrypting compute files and data communication. • The primary use of PGP is to encrypt computer files and data communication such as email and network connection i.e. some PGP versions support secure channels connection for remote systems access. • Protecting transmit data across insecure networks system such as Internet. For example, PGP VPN gateway is used for establishing secure connection to remote network systems. Data encrypts to ensure that sensitive information protects from unauthorized access.

  7. How PGP Work The PGP works as follow: • According to PGP International Organization, PGP uses a public-key encryption system. PGP includes the best features of public key cryptography (PKC). Public key encryption means one key uses (private key) to decrypt information is different from other key uses (public key) to encrypt the information. • Public key encryption system is an asymmetric scheme that uses cryptographic mathematic algorithms (very complex scientific math processes) to encrypt data. • These algorithm processes generate public/private keys for encrypting and decrypting computer files/data: a public key uses to encrypt information and private key (secret key) uses to decrypt information . • User makes a copy of public key available to other users such friends or co-workers to encrypt information intend to send to her or him. Therefore, recipient/owner/holder of the associated public key can decrypt information uses a corresponding private key ( see diagram on next slide).

  8. How PGP encryption and decryption works Source: PGP International Organization, http://www.pgpi.org/doc/pgpintro/#p9

  9. What bad about PGP? The main problems associate with PGP program are; • PGP is used system resources intensive because of complex mathematic algorithm processes which cause a great amount of process overheads on computer system. • PGP uses a file called a key ring “keys.asc to store public/private keys. • The key ring file is resided usually in computer hard disk. Therefore, because the key ring file is stored in local hard disk it is more susceptible to be compromised. For example, although the key.asc file is stored in encryption form but someone with sufficient privileges i.e. system administrator would have access to user key ring file. Indeed, it is essential to make sure the key ring file is well secured. • There is a slight chance that MD5 algorithm can be fooled; some of the newer algorithms, such as SHA1, are used now as being strongly secure from tampering.

  10. PGP installation in UNIX System • PGP install in UNIX system requires compiling the source code into directory and unpacks the file i.e. the .tar file. • After PGP install, the first task is to create a public and private key pair. In addition, it requires that pgp directory (.pgp) to locate in user home directory. For example, directory path /user/[username]”kigara01”/.pgp • The command #pgp –kg is used to create private/public keys. The PGP runs several prompts to set up the information such as key size, key user id, and pass phrase. • For addition information about PGP installation in UNIX system visits the following website: http://www.pgpi.org

  11. Conclusion The practical consideration in computer field is; nothing appears to keep data safe from compromising but using encryption in everyday operations reduce the possibility of data for being compromise. Also notice the problems associated with PGP, therefore, it is essential to make sure that sensitive information on computer files are well secured.

  12. References The International PGP. (2007). How PGP Works. Retrieved from April 1, 2007, from http://www.pgpi.org/doc/pgpintro/#p9 Northern Illinois University Department of Mathematic Sciences. (2006) Overview PGP. Retrieved from April 1, 2007, from http://www.math.niu.edu/help/unix/pgp.html Hackerthreads Organization Security Forum. (2007). what is PGP. Retrieved from March 29, 2007, from http://www.hackerthreads.org/phpbb/viewtopic.php?t=775 Willan, P. (Monday, May 26, 2003). PC World. PGP Encryption Proves Powerful. Retrieved March 29, 2007, from http://www.pcworld.com/article/id,110841-page,1/article.html

  13. The EndThank you! Cheers!

More Related