A brief introduction to Crytography,the various types of crytography and the advantages and disadvantages associated to using the following tyes with some part of the RSA algorithm
This is a Presentation On use of AES Algorithm To Encrypt Or Decrypt a Text File. This Algorithm is the latest and better than DES. It is a Networking Presentation. Thank You.
A brief introduction to Crytography,the various types of crytography and the advantages and disadvantages associated to using the following tyes with some part of the RSA algorithm
This is a Presentation On use of AES Algorithm To Encrypt Or Decrypt a Text File. This Algorithm is the latest and better than DES. It is a Networking Presentation. Thank You.
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
Information and network security 31 public key cryptographyVaibhav Khanna
Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, and private keys. The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way function
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.
As data security becomes of paramount importance, we are going to need to have a reasonable understanding of encryption and encryption techniques. We will discuss the different types of encryption techniques and understand the difference between hashing (one way encryption) and encryption (designed to be two way). We will look at what is industry best practice for encryption today, and why. We will also look at some issues relating to performance of encryption.
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
Information and network security 31 public key cryptographyVaibhav Khanna
Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, and private keys. The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way function
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.
As data security becomes of paramount importance, we are going to need to have a reasonable understanding of encryption and encryption techniques. We will discuss the different types of encryption techniques and understand the difference between hashing (one way encryption) and encryption (designed to be two way). We will look at what is industry best practice for encryption today, and why. We will also look at some issues relating to performance of encryption.
Abstract: The growing demand on wireless communication service has created the necessity to support higher data rates for multimedia services. .As next generation wireless communication networks are expected to provide broadband multimedia services such as voice, web browsing, video conferencing etc. For high data rate achievement one must enhance the capacity of the wireless communication system. The capacity of a communication system can be enhanced by using OFDM system. OFDM is commonly used for communication system due to its high transmission rate and robustness against multipath fading So as to enhance the capacity of fading channels the OFDM system are combined to form hybrid system. Capacity is the measure of maximum information that can be transmitted reliably over a channel. This paper review on different channel capacity enhancement techniques used in OFDM system is SVD (Singular Value Decomposition), water Filling algorithm.
Abstract: This paper outlines the difference between the two brands of PLCs on the basis of their features and their applications. Over the years of demand for high quality and greater efficiency and automated machines has increased in the globalized area. The initial phase of this paper focus on the relativity on which the user can be easily justify their needs. This paper shows that the modelling techniques and design practices of software engineering can be combined with the traditional ways to of thinking in the automation system.
General terms - Automation, Role of PLC and SCADA in automation and types of PLC used.
Deze presentatie werd gegeven door Ron Vonk op de Kringbijeenkomst NVDO Kring Friesland BASF Nijhehaske op 16 februari 2011 met als titel: De harde en hardnekkige kanten van RCA (Root Cause Analysis)
A Review of Maximum Power Point Tracking: Design and Implementationpaperpublications3
Abstract: Photovoltaic Energy is the most important Energy Resource since it is clean pollution free and inexhaustible. In recent years a large number of techniques have been proposed for tracking the Maximum Power Point. PV array has non-linear I-V characteristic and output power depends on environmental conditions such as solar irradiation and temperature. There is a point on I-V, P-V characteristic curve of PV array called as Maximum Power Point (MPP), where the PV system produces its maximum output power. Location of MPP changes with change in environmental condition. The purpose of MPPT is to adjust the solar operating voltage close to MPP under changing environmental conditions. In order to continuously gather the maximum power from the PV array, they have to operate at their MPPT despite of the inhomogeneous change in environmental conditions. The two most commonly algorithms for PV applications as they are easy to Implement are Beta method Incremental Conductance (Inc. Con.).Beta algorithm is a type of MPPT algorithm. It is having fast tracking ability. The algorithm has been verified on a photovoltaic system, A review of various MPPT algorithms is proposed with more focus on above two algorithms.
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
Abstract: Security has become an increasingly important feature with the growth of electronic communication
which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the
encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is
famous for its ciphering strength and its strong defense against any attack for example the brute force attack.
Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future
[3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old
encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it
would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key".
In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more
speed in both the encryption and decryption of the files.
Keywords: AES, Cryptography, DES, NIST, Rijndael, Serpent.
Cryptography and network security Nit701Amit Pathak
Cryptography and network security descries the security parameter with the help of public and private key. Digital signature is one of the most important area which we apply in our daily life for transferring the data.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
Evolution of Network, Internet, Security and Public cryptography
1. Jiri J. Cejka
Internet and Security
I. Communication Introduction
II. Internet Introduction
III. Security Introduction
IV. Cryptography
V. Public Cryptography
2. Jiri J. Cejka
Chapter 1
Internet and Security
Communication Introduction
– Communication Theory
– Communication OSI Model
3. Jiri J. Cejka
Communication theory
Case 1
Two army problem
Time Synchronisation
Solution ?
Red Army
B
Red Army
A
Blue Army
4. Jiri J. Cejka
Communication theory
Case 2
Connection Management
Telephone call simulation
Protocol
A B
Connect request
Connect response
Connect indication
Connect confirm Connect responseConnect confirm
Data request
Data request
(Acknowledgment)
Data indication
Data indication
Disconnect response
Disconnect indication
Disconnect request
time
6. Jiri J. Cejka
Communication Model - 2
OSI Standard compared with TCP/IP
Seven Layers:
7. Application
6. Presentation
5. Session
4. Transport Datagram TCP (Internet Control Protocol)
3. Network Packet IP(ARP),X.25
2. Link Frames CSMA/CD
1. Physical Bits, modems 10011100001000100001
Frame Data AreaFrame Header
Datagram Data AreaDatagram Header
ICMP
Header
ICMP
Data
7. Jiri J. Cejka
Communication Model - 3
Layer Two - Data Link - Frames
Frame-level
1
2
3
4
6
7
Host
Frame-level
Access
Node
Node
Switcher
Bridge
Host
Access
Node
5
Frame-level
8. Jiri J. Cejka
Communication Model - 4
Layer Three - Data Packets
1
2
3
4
5
6
7
Host
Packet level
1-3-4-7
Access
Node
Node
Switcher
Router
Host
Access
Node
Packet level
2-3-4-5-6
Acknowledgment
Acknowledgment
9. Jiri J. Cejka
Communication Model - 5
Sliding windows
– Datagram
– Transport
– Data Link
Acknowledged
Sent
Not Sent
Messages
Source
1
2
3
4
56
4Ack
2
3
4
5
1
Acknowledged
7
6Sent
Not Sent
Destination
Messages
Packets
Frames
10. Jiri J. Cejka
Chapter 2
Internet and Security
Internet Introduction
– What is Internet- history, popularity of usage
– Role of Internet - security
11. Jiri J. Cejka
Internet Introduction
What is Internet?
Why has it become so popular?
Is Internet secure enough to build
business on it?
If Yes:
– HOW do I guarantee Security and Privacy
– WHEN should I start to invest into it?
12. Jiri J. Cejka
What is Internet
Definition of Internet
Development 1970 - DARPA
Two fundamental design observation:
– No single network can serve all users
– Users desire universal interconnections
1 2
3
4
5
13. Jiri J. Cejka
Internet Architecture
User’s view
– each computer appears to attach to a single network
Structure of networks and gateways
Address assignment:
IP Address: <net-id> <host-id>
Host : 193.73.248.10
Network: 193.73.248.0
Gateway: 193.73.248.1
Host Host
Gateway
Physical network
INTERNET
14. Jiri J. Cejka
The reasons for the worldwide use
The Flexibility of underlying protocols
Public and free Access
– bright spectrum of users
– modern design methods
Progress in computing technology
Development of modern GUI driven
languages
– usage of HTTP, HTML, URL
15. Jiri J. Cejka
Chapter 3
Internet and Security
Security Introduction
– Security Methods
– Security Model
16. Jiri J. Cejka
Security Introduction
“Public” Internet access versus “Security”
– Privacy and Integrity
– Authentication and Availability
– Data Integrity and Audit techniques
– Physical security and Management practices.
17. Jiri J. Cejka
Security Methods
Optimal combination of tools
and methods
Cryptography
– Transaction security
Firewalls and routers
– Unauthorised access
Operating systems
– Internal sources
1. Intruder has
access to Your system
4. Intercepted
on the destination
INTERNET
2. Wiretapped during
the transmission
3.Stolen while
waiting at server
Message Origination Message Destination
2. Wiretapped during
the transmission
INTERNET
18. Jiri J. Cejka
Security Methods
Usage of:
– Firewalls
– Filtering
routers
Filtering Router
INTERNET
External User(s)
Firewall Proxy
Server
DNS Functions
Bank Internal Networks
Server of
Service Provider
Internal User
Internal System
Filtering Router of
Service Provider
Secured Area
19. Jiri J. Cejka
Security Methods
INTERNET
External
Network
External
User(s)
POLICIES, PROCEDURES, ADMINISTRATION
PHYSICALSECURITY
Network Access Layer
WORKSTATION
SECURITY
System Access Layer
Application Access Layer
AUDIT
TRIAL
SECURITY
MONITORING
HOST
Data
Software
CHANGE
CONTROL
Access Control
Tables
Software
20. Jiri J. Cejka
Security Methods
WEB Security Control Points
C2
Firewall #2
INTERNET
B2
External Web
Server
E1
Any External
Company
Web Server
A1
Web Client
Browser
D1
Any External
Internet User’s
Web Client Browser
COMPANY
INTERNAL
NETWORK
A Company
E2
Any Web
Server
C1
Firewall #1
B1
Internal Web
Server
21. Jiri J. Cejka
Chapter 4
Internet and Security
Cryptography Basics
– History and different Kinds of security
Cryptography Standards
– Private Cryptography
– Public Cryptography
22. Jiri J. Cejka
Cryptography Basics
How does simple cryptography works
– Message to be encrypted (plaintext)
– Message after it is encrypted (ciphertext)
– Encryption Algorithm (mathematical function)
– Key (number, password, phrase)
Cryptography goal
– impossible: plaintext from ciphertext
Encryption
Algorithm
Plaintext
Ciphertext
Key
23. Jiri J. Cejka
Cryptography Basics
Unbreakable Codes
– Code Word - Code Meaning
– one shot
– restricted to simple information
Ciphers
– Technique of scrambling Message
– Truly cryptography
24. Jiri J. Cejka
History of Cryptography
Substitution ciphers
– Earliest ciphers 2000 B.C.
– Julius Ceasar - Shift alphabet
– Rennaisance Freemasons -Secret cipher
– G. Washington - Assigned numbers
One-Time Pads - Vernam cipher
– Each page used once
– “Hotline” Stream of numbers as pads
–each number defines shift of a letter
–fix length numbers: Cryptographic Key
A B C D E
0 1 2 3 4
N O P
1. Launch
2. Target
05 08 14 20 01
26. Jiri J. Cejka
Private Cryptography
Algorithms
Private Key Algorithms
– Key distribution
– Types of Private Cryptography
–DES, Triple DES 1977 : 56-bit key length
–RC2, RC4 Rivest code: 1-1024 bit length
–IDEA 1990 Zurich: 128 bit key
27. Jiri J. Cejka
Sending secret message only after
prior arrangement - key exchange
Number of the keys: n*(n-1)/2
Key could be intercepted
Distribution of Keys
– Key Distribution Center
– (session key)
Problems with Private
Cryptography
A’s private Key
Session
Key
B’s private Key
Key
Distribution
Center
KDC
28. Jiri J. Cejka
Public Cryptography
1970 Breakthrough - Asymmetric
Algorithms
Generate Keys
– Public Key
– Private Key
Public Key
from person B
INTERNET
Own Secret Key
from person B
Person A
Person B
1. Message is
Encrypted
2. Message is
Decrypted
29. Jiri J. Cejka
Public Key Systems
1974 Ralph Merkle “Jigsaw puzzle”
– Secure communication over insecure channels
1975 Diffie-Hellman
– Exponential Key exchange
– Multi-user cryptographic techniques
– (1975 Private system as Standard DES)
1977 Rivest, Shamir, Adleman: RSA
– Easy to multiply two large prime numbers
– Difficult to find its prime factors.
30. Jiri J. Cejka
Ralph Merkle’s Puzzles
1. Alice send open message to Bob.
2. Alice creates 1.000000 Encryption Keys.
3. Each key is hidden in one puzzle.
-each Puzzle takes 2 Minutes to solve.
4. All puzzles are sent to Bob.
5. Bob chooses one puzzle and
unscrambles one key.
6. Bob encrypts previous message
with his key.
7. Message is sent to Alice.
8. Alice tries all keys until one fits.(850).
Eavesdropper has to try all 1000000 puzzleseach taking
him two minutes to solve!
Alice
1.
2.
:
1000.000
Bob
850
850
1
2.
3.
4.
5.
6.
7.
8.
31. Jiri J. Cejka
Diffie-Hellman Multi-user
1. Alice and Bob agrees on two numbers.
They are known and public: a, q.
2. Each part chooses a secret number X: X1, X2
and transmits the results of mathematical formula
involving a, q, and X.
3. Both participants compute number K as
function of (X1 and Y2) or (X2, Y1).
Eavesdropper knows a,q,Y1 and Y2 nut does not know X1
or X2: he cannot compute number K.
K is used as a session key for private key encryption algorithm
such as DES.
Alice BobNumbers a, q
K =Y2(exp( X1)(mod q)
1.
2.
3.
X1
Y1 = a(exp(X1))(mod q)
X2
Y2=f(a,q,X2)
K=f(X2,Y1)
32. Jiri J. Cejka
Data Encryption Standard DES
Description of nationwide Standard System
1960 IBM Private encryption system
– Lucifer 1974 on a chip for market
– length set to 128 bits
1975 NSA and NIST design of DES
Architecture of DES : P-box, S-box
DES controversy 128 Bits-> 56 bit Key
– How secure is DES now
33. Jiri J. Cejka
Rivest, Shamir, Adelman: RSA
1977 U.S. patent to MIT
Company RSA DSI marketing
– computation intensive
– chip production unsuccessful
– RSA Bidzos MailSafe
Phil Zimmermann PGP
– Encryption on microprocessor
– PGP Public key algorithm on PC
– Export law, International Version
34. Jiri J. Cejka
How Does RSA works?
Each the person has to create key pair consisting of
public and secret key.
1. Alice chooses very large two prime numbers P and Q per random. P=47, Q=71.
2. Encryption modulus is created multiplying: N = P * Q. N=3337.
3. The encryption key is created : e is prime to (P-1) * (Q-1) e = 3220
4. Using Euclid algorithm decryption key d is found :
d = e(exp-1) *(mod ((P-1) * (Q-1))) d = 1019
5. Then Public key = (N,e)
Secret key = d.
Then Bob encrypts number X: X(exp e)(mod N) -> A
Alice decrypts A: A(exp d)(mod N) -> X
35. Jiri J. Cejka
Privacy and Public Policy
FBI’s Digital Telephony Plan
– History if wiretapping
– 1995 Cryptography and Constitution
NSA’s Clipper Chip
– After DES a new public technology standard
– Algorithm “Skipjack” 80 bits
– Escrowed Encryption Standard EES
–Using Family Key, Chip Key and Session Key
– Public usage Administration - Market
36. Jiri J. Cejka
Clipper Chip EES
1. Session Key Conversation
- different for each conversation
- SKIPJACK (NSA algorithm)
2. Clipper Chip Telephone Session
2.1 UniqueChip A Key
2.2. Chip A Serial Nr
2.3 Checksum
2.4 Family key common to all chips
creates Law Enforcement Access Field
3. Escrowed Encryption Standard EES
3.1 Family Key Master Key held by government
3.2. Decrypts LEAF and gives Serial Number
3.3. Two companies give two fragment of Chips key
3.4. Agent creates Chip key and under permission decrypts Session key
ChipB Key14365275890364789
14365275890364789
Serial Nr B
Checksum
BA
LEAF A LEAF B
Family Key
37. Jiri J. Cejka
Digital Signature Standard - DSS
Proposed by NIST in 1991
Federal Information Process. Standard
FIPS
– Developed in fact by NSA
Digital Signature Algorithm - DSA
– Slower then RSA
– Opposition against DSA might contain back door
– Used as digital signature only
– Using Secure Hash Algorithm SHA 160 bit length
38. Jiri J. Cejka
Comparison Public-Secret
Cryptography
Advantages:
– Increased security: Secret key is not transmitted
–Secret key : sharing the secrecy with other side
– Authentication: method for digital signatures
– Legal binding for Public-key
–Authentication of signature: non-repudiation
–Kerberos authenticate only access: not legally bounded
Disadvantages
– Speed: solution is combination of secret-public key
39. Jiri J. Cejka
Cryptography
“Without strong cryptography no one will
have the confidence
– to use networks to conduct business
– to engage in commercial transactions electronically
– to transmit sensitive personal information”.
40. Jiri J. Cejka
Chapter 5
Internet and Security
Public Cryptography PGP
– Public and Secret Key
– Pass Phrase
– Random Bit & Session Key generation
– Digital Signature
– Key Rings & Key Certification
– Web of Trust
41. Jiri J. Cejka
Public Cryptography
Pretty Good Privacy PGP
Generating of Keys
– Public Key
– Secret Key
Distribution of Keys
– Public key ring
– Trust
– Validity
Own Secret Key
from person B
Public Key
from person B
INTERNET
Person A Person B
1. Message is
Encrypted 2. Message is
Decrypted
42. Jiri J. Cejka
PGP - Public and Secret key
Generating of Public and Secret key: pgp -kg
1. Set-up the length : 512, 1024 bits: 1,2,3
2. Define User ID: <name@comp.com>
3. Defined he Pass Phrase : Text string
4. Generate random number: Text, time
Key identifications:
Type Bits keyID Date User ID
pub 512 C7A966DD 1996/10/09 name@company.com added to pubring.asc
sec 512 HIAF12EG 1996/10/09 name@company.com added to secring.asc
Public Key
from person B
INTERNET
Own Secret Key
from person B
Person A Person B
1. Message is
Encrypted 2. Message is
Decrypted
43. Jiri J. Cejka
PGP- Session Key
Encrypting the message
using Session Key:
pgp -eat <file name> <public key id>
- e Session key automatically
- a Result as text file
- t Source as text file
<filename.asc>
1.Session Key is
randomly generated
Own Secret Key
from person B
Person A
Person B
4. Both encryption are
bundled together and
sent to person B
5. Message is
Decrypted
2. Message is encrypted
using IDEA algorithm
3. Session Key encrypted
using RSA algorithm
and B’s Public Key
INTERNET
44. Jiri J. Cejka
PGP-Pass Phrase
Decrypting the message
Secret Key decryption/encryption
pgp <file name.asc>
- Secret Key is required to read file
- Pass Phrase is needed to unlock RSA key
- Using MD5 hash function 128-bit code
is generated from the Pass Phrase
- IDEA algorithm decrypts Secret Key
Local usage of Pass Phrase
1. Encrypting of text file
pgp -c <your file>
-Pass Phrase required
2. Decrypting of text file
pgp <your file.pgp>
-Pass Phrase required
INTERNET
Person A
Person B
2.Secret Key is
decrypted after
encrypted
message came
1.Secret Key is
encrypted during
generation
Public/Private key
using Pass Phrase
3. Message is
decrypted using
B’s Secret Key
45. Jiri J. Cejka
INTERNET
4. Seal is
encrypted
using A’s
Public Key
Person A
Person B
2. The number is
encrypted using
secret key into a
“seal”
1. MessageDigest function
is run over the message
producing 128-bit number
6. Both digest numbers
are compared
- if they are same
message is authentic.
14365275890364789
3. The signature block
“seal” is added to the
message ready to be
sent in readable form
1436527589036478914365275890364789
5. Message
Digest function
creates new
128-bit number
PGP-Digital Signature
Authentication of message
- Message Digest Function MD5
unique 128 bit code created
- Code encrypted with Secret Key
- Pass Phrase is required
pgp -sta <file name>
- result in <file name.asc>
- Signature decrypted with Public Key
pgp <file name.asc>
- Automatic check with text file
Signing and Encrypting
-most secure
pgp -se <file name>
46. Jiri J. Cejka
Locally created
keys stored
on Secret Ring
14365275890364789
1. Pass Phrase opens secret key-ring to
change any identifications:
- From Path Phrase MD5 function counts
128 bit code to decrypt IDEA encryption
2. To Encrypt Text file a random bit
generates a Session key to Encrypt file
using IDEA
3. Message is encrypted using Session
Key and
conventional IDEA algorithm
4. The Session Key is encrypted using
RSA and Recipient’s Public key
5. Using MD5 Function and Secret Key
generates Digital Signature
PGP- Key Rings
Received
keys
stored on
Public Ring
Random bit
generator
“Any secret text..”
MD5
RSA
IDEA
MD5
47. Jiri J. Cejka
PGP- Key Certification
Public Key Certification is built into
PGP:
- Validity - Identification that the key
received really belongs to the person to
whom it says it belongs.
- Trust - Measure of how much you believe
honesty and judgment of the person created
the key.
INTERNET
Person A Person B
14365275889 143652758901436524789
48. Jiri J. Cejka
John
John does not believe Phil’s
certification
John trusts Jane
John does not trust Chris.
John does not trust any person
certification by Chris
Jane certifies Phil
Certifying and Distributing of Public Keys:
- John’s trusts
- John’s belief of identity
- No trust, no belief of identify
Jane
Phil
Phil certifies Lori
Lori
PGP-Web of Trust
John believes Jane’s certification of Phil
Chris
49. Jiri J. Cejka
Adding Key with Signatures on Public ring
pgp -ka <file name.pgp>
Key Fingeprint is displayed - Key’s unique Digest of 128 bits code
Key can be certified personally
- RSA Secret Key has to be unlocked - Pass Phrase is needed
Level of Trust has to be added: 1= Not known, 2= No, 3=Usually, 4= Always.
Viewing Public key ring and Signatures
pgp -kc
Type bits/KeyID Date User ID
pub 512/ 33681029 1994/08/28 Name1 <name1@.comp1.com>
sig! A71712F9 1994/12/28 Name2 <name2@.comp2.com>
Key ID Trust Validity User ID
33681029 marginal complete Name1 <name1@comp1.com>
complete complete Name2<name2@comp2.com>
pgp -kvv Viewing Fingerprint
PGP- Adding Public Key
50. Jiri J. Cejka
“Only those defenses are good, certain and
durable, which depend on yourself alone
and your own ability”.
The Prince
- Nicollo Machiavelli
Internet Security
Resume