PGP desk top basis lecture 002

553 views
488 views

Published on

A software used for network security

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
553
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

PGP desk top basis lecture 002

  1. 1. PGP Desktop Basics By Qaisar Ayub [email_address] 2
  2. 2. PGP Product Components <ul><li>Product Components </li></ul>PGP desktop users are known as managed users as all settings, configurations, policies available in their PGP desktop software .
  3. 3. PGP Product Components PGP Whole Disk Encryption PGP NetShare PGP Virtual Disk volumes : PGP Zip PGP Messaging
  4. 4. Achievement We have understand the Products of PGP desktop
  5. 5. Terms used in PGP 01100101 00000011 01101000 Encryption Code Input in PGP Data ENCRYPTION
  6. 6. Decryption 01101000 Decryption Communication Media 01101000 Encrypted data Terms used in PGP
  7. 7. Signing 01101000 Decryption Communication Media 01101000 Encrypted data Terms used in PGP 1. The sender apply a signature using his private key 2. Data signed by private key can be verified by using sender Public key
  8. 8. Terms used in PGP Private key: The key you keep very, very private. Only your private key can decrypt data that was encrypted using your public key. Also, only your private key can create a digital signature that your public key can verify. Public key: The key you distribute to others so that they can send protected messages to you (messages that can only be decrypted by your private key) and so they can verify your digital signature. Public keys are meant to be widely distributed . Key server: A repository for keys. Some companies host keyservers for the public keys of their employees, so other employees can find their public keys and send them protected messages.
  9. 9. Achievement We have understand the Terminologies of PGP
  10. 10. Cryptography <ul><li>Conventional Cryptography </li></ul>Use the same key to encrypt and decrypt the data Advantage Fast working Drawback Not suited when data need to be send some one else you don’t know. Solution PUBLIC KEY CRYPTOGRAPHY
  11. 11. Cryptography <ul><li>Public key cryptography </li></ul>Use the two keys <ul><li>Public Key (Bank account number) </li></ul><ul><li>Private Key (PIN/CODE) </li></ul>Working Public key Private key Private key Public key (keyserver.pgp.com Sender Receiver Public key Public key Send message by encrypting using private key Can view message using sender public key

×