1 / 24

Encrypton-RSA, PGP

Encrypton-RSA, PGP. Presented by Aine Reynolds Eric Hopkins Rosanna Madera Susanti Kusmiantoro. Overview of Encryption. The issue of security and privacy is not a new one, however the old-age science of cryptography has been in use since people had information they wished to hide.

Download Presentation

Encrypton-RSA, PGP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Encrypton-RSA, PGP Presented by Aine Reynolds Eric Hopkins Rosanna Madera Susanti Kusmiantoro

  2. Overview of Encryption • The issue of security and privacy is not a new one, however the old-age science of cryptography has been in use since people had information they wished to hide. • Cryptography has naturally been extended into the realm of computers, and provides a solution to electronic security and privacy issues

  3. Encryption • Encryption and decryption typically occur using complex mathematical algorithms with the use of a key • There are two types of key-based encryption algorithms, • Symmetric (private key) • Asymmetric (public key)

  4. Symmetric encryption • Typically use 128-bit length keys • The Same key is used to encrypt and decrypt the message • Message encrypted using a key • Message sent to receiver • Encryption key communicated separately, to allow the message to be decrypted by receiver An Example is the use of a password, to encrypt and decrypt

  5. Symmetric Encryption ..cont… Simplicity is a source of its problem, along with how many keys needed for each message • N*(N-1)/2 Number of private keys that need to exist As the number of N increases, the management of the private key becomes costly and cumbersome.

  6. Asymmetric(Public Key) Encryption

  7. Asymmetric Encryption • Uses a pair of keys instead of a singular key • One key is kept private while one is public • Encryption by one can only be decrypted by using the other • The property of the key-pair can be used to perform two functions, encryption and digital signatures • The public key of the recipient is used to encrypt the message

  8. Asymmetric Encryption…cont.. • Message encrypted using a one-use private key (randomly generated for the specific message) • This message specific key is then encrypted using the recipient’s public key • Both are sent together • On receipt the recipient used his private key to decrypt the message specific key, thus giving him access to the message • This combined approach provides speed of private key along with the manageability of public key encryption

  9. Digital Signatures

  10. PKI- The implementation of Public Key Cryptography

  11. History of Encrytion • 1900 BC: carvings that incorporate simple forms of coding inside tombs in Egypt • 1500 B.C.: cyphered pottery glaze formula • 400 BC: A physical method of disguising the meaning of messages called "Skytale" was devised by the Spartans. • The Greeks described several substitution ciphers • Julius Caesar is known to have used a cryptographic system to keep his orders secret • 400 AC: The "art of secret writing" is even included in the Kama Sutra as a skill that women should learn and practice • One of the most popular pastimes of the vikings was to devise riddles which were suitable to encrypt message content

  12. History of Encryption Cont. • In the turbulent medieval times, the renaissance, and later through the French revolution, mathematicians of all countries devised more and more sophisticated encryption algorythms • Invention of Telegraph • 1945 World War II, Cracking the German Enigma • 1960 IBM creates “Lucifer” • 1973 NIST standarized encryption with DES • 1976 DES was authorized for public use • 1977 RSA was developed • 1986 PGP was developed • The next breakthrough in cryptography will probably happen with the arrival of quantum computers

  13. Who Uses Encryption? • Bank records and other financial data - to protect privacy and to protect against theft of funds. • Protecting Ones Identity Against Theft • Passwords and personal identification numbers used for electronic funds transfers, automated teller machines, and so on. • Any sensitive data stored in databases, such as medical records. • Research and product development files - to protect trade secrets. • Viruses using encryption

  14. Who Uses Encryption? Cont. • Sensitive business communications. • Email and telephone communications - to protect privacy. • Personal files on home computers. • Cable/Satellite television signals - to prevent reception by people who have not paid. • Tests and student grade files kept by teachers • Military • Firewalls (VPN) • Multimedia

  15. RSA • Is the most trusted name in e-security to help organizations build a secure, trusted foundation for e-business through their RSA Web Security Portfolio. • SecurID - two-factor authentication • BSAFE – encryption • Keon - public key infrastructure solution • All are based on the RSA algorithm. • RSA security is the market leader.

  16. RSA SecurID • Two-factor user authentication service for enterprise networks, operating systems, e-commerce Web sites and other IT infrastructures. • Function like an ATM card for a network, requiring users to identify themselves using a PIN number (public key) of some kind.

  17. RSA BSAFE • BSAFE products provide a family of platform-independent encryption development tools, which enable corporate and commercial software developers to reliably incorporate security into a wide variety of applications. • Embedded in over 450 copies of Internet applications, including, Web browsers, commerce servers, email systems and virtual private network products.

  18. RSA Keon • Interoperable product that are standard-based to work with PKI-enabled applications for managing digital certificates • Provides an environment for authenticated, private and legally binding electronic communications and transactions.

  19. RSA Algorithm • Consist of a public key, private key and a very complicated factorial computation • p and q, two large prime numbers and compute their product(modulus) n = (p)(q). • Choose e (public key), less than n and relatively prime to (p-1)(q-1). • Compute d (private key) such that (ed-1) is divisible by (p-1)(q-1). Example: http://world.std.com/!franl/crypto/rsa-example.html • Breaking the RSA system • Attackers discover the private key corresponding to the given public key • Attackers aim not on the cryptosystem, but on the insecure implementation of the system or bad key management.

  20. Market Leader • Web Security Portfolio allow organizations to work with a single vendor to provide quality security services. • Most widely used public-key cryptosystem • Interoperability • Strategic relationships and partnership programs • Global e-security provider

  21. PGP – Pretty Good Privacy • PGP is a computer program that encrypts and decrypts data that enables email and files protections. • PGP uses RSA public key encryption system. • Philip Zimmermann is the creator.

  22. PGP – How does it work? • PGP generates two keys; public and private.

  23. PGP – How safe it is? • Nobody has publicly demonstrated the skill to outsmart PGP. • PGP uses the strongest encryption available outside the government. • Weak point = encryption schemes are totally open for peer review, algorithms are open to whoever interested, and vulnerability with the algorithm.

  24. PGP – Why uses it? • Security – like envelopes with paper mail. • Flexibility - plugin to the email software • Free • Worldwide Strength and Compatibility - Full Strenght over US and Canada - Security packages are not yet available outside US and Canada

More Related