SlideShare a Scribd company logo
1 of 15
pretty good privacy securing e-mail communication 5.5.2010
THE PROBLEM e-mail „security“ 5.5.2010 Pretty good privacy 2
SMTP protocol 5.5.2010 3 S: 220 smtp.example.com ESMTP Postfix  C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you  C: MAIL FROM:<bob@example.org> S: 250 Ok  C: RCPT TO:<alice@example.com> S: 250 Ok  C: RCPT TO:<theboss@example.com>  S: 250 Ok  C: DATA  S: 354 End data with <CR><LF>.<CR><LF>  C: Hello Alice.  C: Your friend, Bob C: .  S: 250 Ok: queued as 12345  C: QUIT  S: 221 Bye Pretty good privacy
SMTP protocol 4 PLAIN TEXT everyone on the way can read it Pretty good privacy 5.5.2010
SMTP protocol Pretty good privacy 5 NO AUTHENTICATION everyone can pose as everyone 5.5.2010
SMTP protocol Pretty good privacy 6 SIZE LIMIT e-mails are limited in size 5.5.2010
THE SOLUTION PGP - open solution to our problems 5.5.2010 Pretty good privacy 7
PGP features Authentication Confidentiality Compression Segmentation 8 5.5.2010 Pretty good privacy
Predicates Asymetric encryption Digest algorithm 9 Private/public key pair Private key is secret and uncompromised Private key encrypted data can only be decrypted by corresponding public key Reverse holds true as well Same input always generates same output Small change of input causes huge change on output Chance of collision has to be minimal 5.5.2010 Pretty good privacy
Authentication 10 confirming the sender‘s identity MATCH? SHA-1digest SHA-1digest Sender‘s public key RSAencryption RSAdecryption Sender‘s private key 5.5.2010 Pretty good privacy
Encryption 11 confirming the sender‘s identitymaking sure noone else can read the message IDEAencryption Session key IDEAencryption Recipient‘s public key 5.5.2010 Pretty good privacy
Decryption 12 confirming the sender‘s identitymaking sure noone else can read the message IDEAdecryption IDEAdecryption Session key Recipient‘s private key 5.5.2010 Pretty good privacy
Decryption 13 saving bandwidthincreasing cryptoanalysis resistance Sender Recipient 5.5.2010 Pretty good privacy
Compatibility & segmentation 14 traveling across platformsavoiding maximum size limit Compatibility +33% size radix-64 binary data Segmentation automatic segmentation and reassembly of long messages 5.5.2010 Pretty good privacy
THE CONCLUSION Jernej Virag 15 5.5.2010 Pretty good privacy

More Related Content

More from Jernej Virag (12)

Odprti video formati
Odprti video formatiOdprti video formati
Odprti video formati
 
Android services
Android servicesAndroid services
Android services
 
Hitre aplikacije
Hitre aplikacijeHitre aplikacije
Hitre aplikacije
 
From Doom to Crysis
From Doom to CrysisFrom Doom to Crysis
From Doom to Crysis
 
Security
SecuritySecurity
Security
 
Ip security
Ip securityIp security
Ip security
 
Encryption
EncryptionEncryption
Encryption
 
The Task Model
The Task ModelThe Task Model
The Task Model
 
Game design - formal and dramatic elements
Game design - formal and dramatic elementsGame design - formal and dramatic elements
Game design - formal and dramatic elements
 
Java stereams
Java stereamsJava stereams
Java stereams
 
Jni – java native interface
Jni – java native interfaceJni – java native interface
Jni – java native interface
 
Gaming industry in 2010
Gaming industry in 2010Gaming industry in 2010
Gaming industry in 2010
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Pretty good privacy

  • 1. pretty good privacy securing e-mail communication 5.5.2010
  • 2. THE PROBLEM e-mail „security“ 5.5.2010 Pretty good privacy 2
  • 3. SMTP protocol 5.5.2010 3 S: 220 smtp.example.com ESMTP Postfix C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you C: MAIL FROM:<bob@example.org> S: 250 Ok C: RCPT TO:<alice@example.com> S: 250 Ok C: RCPT TO:<theboss@example.com> S: 250 Ok C: DATA S: 354 End data with <CR><LF>.<CR><LF> C: Hello Alice. C: Your friend, Bob C: . S: 250 Ok: queued as 12345 C: QUIT S: 221 Bye Pretty good privacy
  • 4. SMTP protocol 4 PLAIN TEXT everyone on the way can read it Pretty good privacy 5.5.2010
  • 5. SMTP protocol Pretty good privacy 5 NO AUTHENTICATION everyone can pose as everyone 5.5.2010
  • 6. SMTP protocol Pretty good privacy 6 SIZE LIMIT e-mails are limited in size 5.5.2010
  • 7. THE SOLUTION PGP - open solution to our problems 5.5.2010 Pretty good privacy 7
  • 8. PGP features Authentication Confidentiality Compression Segmentation 8 5.5.2010 Pretty good privacy
  • 9. Predicates Asymetric encryption Digest algorithm 9 Private/public key pair Private key is secret and uncompromised Private key encrypted data can only be decrypted by corresponding public key Reverse holds true as well Same input always generates same output Small change of input causes huge change on output Chance of collision has to be minimal 5.5.2010 Pretty good privacy
  • 10. Authentication 10 confirming the sender‘s identity MATCH? SHA-1digest SHA-1digest Sender‘s public key RSAencryption RSAdecryption Sender‘s private key 5.5.2010 Pretty good privacy
  • 11. Encryption 11 confirming the sender‘s identitymaking sure noone else can read the message IDEAencryption Session key IDEAencryption Recipient‘s public key 5.5.2010 Pretty good privacy
  • 12. Decryption 12 confirming the sender‘s identitymaking sure noone else can read the message IDEAdecryption IDEAdecryption Session key Recipient‘s private key 5.5.2010 Pretty good privacy
  • 13. Decryption 13 saving bandwidthincreasing cryptoanalysis resistance Sender Recipient 5.5.2010 Pretty good privacy
  • 14. Compatibility & segmentation 14 traveling across platformsavoiding maximum size limit Compatibility +33% size radix-64 binary data Segmentation automatic segmentation and reassembly of long messages 5.5.2010 Pretty good privacy
  • 15. THE CONCLUSION Jernej Virag 15 5.5.2010 Pretty good privacy