SlideShare a Scribd company logo
Pretty Good PrivacyPretty Good Privacy
By
Nilanjan Danda
Amar Gambhire
Avinash Sardesai
Sandeep
Mahesh Sunderaraman
Vijay Venkatesh.
CryptographyCryptography
Cryptography is the science of usingCryptography is the science of using
mathematics to encrypt and decryptmathematics to encrypt and decrypt
data. Cryptography enables to storedata. Cryptography enables to store
sensitive information or transmit it acrosssensitive information or transmit it across
insecure networks.insecure networks.
NecessityNecessity
Protecting privacy and security isProtecting privacy and security is
paramount in case ofparamount in case of
• Private communicationsPrivate communications
• Business transactionsBusiness transactions
• Sensitive medical informationSensitive medical information
• Financial information .Financial information .
Types of Crypto systemTypes of Crypto system
• Symmetric (conventional) crypto systemsSymmetric (conventional) crypto systems
use the same key to encrypt and decryptuse the same key to encrypt and decrypt
a message.a message.
• Asymmetric crypto systems use theAsymmetric crypto systems use the
public key to encrypt a message and apublic key to encrypt a message and a
different key - the private key to decryptdifferent key - the private key to decrypt
What is PGPWhat is PGP ??
Pretty Good Privacy (PGP), from Phil'sPretty Good Privacy (PGP), from Phil's
pretty good software, is a high securitypretty good software, is a high security
cryptographic software application for MScryptographic software application for MS
-DOS, Unix, and other computers. It-DOS, Unix, and other computers. It
encrypts your mail so that nobody but theencrypts your mail so that nobody but the
intended person can read it.intended person can read it.
• Conventional CryptographyConventional Cryptography
• Public key cryptographyPublic key cryptography
• How PGP works ?How PGP works ?
Conventional encryption
Public key encryptionPublic key encryption
Mathematical StructureMathematical Structure
P0() is public key and S0() is private key.
P0(X) & S0(X) is meaningless gibberish,
S0(P0(X)) = X. P0(S0(X)) = X.
If key space = 128
No. of combination is more than 3 x 1030.
If capacity = 109
comp.generates 109
keys/sec
Time required more the age of universe
Impact of PGP
B2C UsesB2C Uses
• Brokerage HousesBrokerage Houses
• Financial InstitutionsFinancial Institutions
• Law FirmsLaw Firms
• Medical OrganizationsMedical Organizations
• Trade AssociationsTrade Associations
Impact of PGP
B2B UsesB2B Uses
• AccountingAccounting
• EngineeringEngineering
• Executive CommunicationsExecutive Communications
• Human ResourcesHuman Resources
• Information TechnologyInformation Technology
Impact of PGP
• MarketingMarketing
• RecruitingRecruiting
• SalesSales
• LegalLegal
PGPPGP & E-Governance in& E-Governance in IndiaIndia
• The information technology act 2000The information technology act 2000
(new addition)(new addition)
• Indian penal codeIndian penal code
• The bankers' books evidence act, 1891The bankers' books evidence act, 1891
• The reserve bank of India act, 1934The reserve bank of India act, 1934
• The Indian evidence act, 1872The Indian evidence act, 1872
ConclusionsConclusions
The success or failure of
internet applications is embedded in the
security of electronic data.

More Related Content

What's hot

Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
Gianni Fiore
 
Network security
Network securityNetwork security
Network security
Dhaval Kaneria
 
Pgp
PgpPgp
Pgp
precy02
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Email Security
Email SecurityEmail Security
Email Security
selvakumar_b1985
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
Rabei Hassan
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
cclay3
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
Del Elson
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
 
network and cyber security
network and cyber securitynetwork and cyber security
network and cyber security
Shruthi Reddy
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
RajKumar Rampelli
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 

What's hot (20)

Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 
Network security
Network securityNetwork security
Network security
 
Pgp
PgpPgp
Pgp
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Pgp1
Pgp1Pgp1
Pgp1
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Email Security
Email SecurityEmail Security
Email Security
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Encryption
EncryptionEncryption
Encryption
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
network and cyber security
network and cyber securitynetwork and cyber security
network and cyber security
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 

Viewers also liked

Handson 1 (5/6)
Handson 1 (5/6)Handson 1 (5/6)
Handson 1 (5/6)
Roberta Cuel
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Alex Adipati
 
PGP based social network
PGP based social networkPGP based social network
PGP based social network
José Moreira
 
Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - IntroO. R. Kumaran
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
Anil Kumar V
 
PGP and Enigmail
PGP and EnigmailPGP and Enigmail
PGP and Enigmail
Tania Silva
 
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age""Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
Federico Costantini
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
Symantec
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionClint Walker
 
PGP presentation 2014
PGP presentation 2014PGP presentation 2014
PGP presentation 2014
Barbara Nadeem
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
Qaisar Ayub
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
Jan Schaumann
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Jernej Virag
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
Sindhu VL
 

Viewers also liked (18)

Handson 1 (5/6)
Handson 1 (5/6)Handson 1 (5/6)
Handson 1 (5/6)
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
PGP based social network
PGP based social networkPGP based social network
PGP based social network
 
Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - Intro
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
PGP and Enigmail
PGP and EnigmailPGP and Enigmail
PGP and Enigmail
 
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age""Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
Pgp
PgpPgp
Pgp
 
PGP presentation 2014
PGP presentation 2014PGP presentation 2014
PGP presentation 2014
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 

Similar to Pgp

Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptography
markjhouse
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
Sai Natkar
 
Cryptography intro
Cryptography introCryptography intro
Cryptography introismaelhaider
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
 
Cryptography ppt
Cryptography pptCryptography ppt
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
ravin349878
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
MohitManna
 
encryption
encryptionencryption
encryptions1170037
 

Similar to Pgp (20)

Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptography
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cryptography
CryptographyCryptography
Cryptography
 
Sw2
Sw2Sw2
Sw2
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Pgp

  • 1. Pretty Good PrivacyPretty Good Privacy By Nilanjan Danda Amar Gambhire Avinash Sardesai Sandeep Mahesh Sunderaraman Vijay Venkatesh.
  • 2. CryptographyCryptography Cryptography is the science of usingCryptography is the science of using mathematics to encrypt and decryptmathematics to encrypt and decrypt data. Cryptography enables to storedata. Cryptography enables to store sensitive information or transmit it acrosssensitive information or transmit it across insecure networks.insecure networks.
  • 3. NecessityNecessity Protecting privacy and security isProtecting privacy and security is paramount in case ofparamount in case of • Private communicationsPrivate communications • Business transactionsBusiness transactions • Sensitive medical informationSensitive medical information • Financial information .Financial information .
  • 4. Types of Crypto systemTypes of Crypto system • Symmetric (conventional) crypto systemsSymmetric (conventional) crypto systems use the same key to encrypt and decryptuse the same key to encrypt and decrypt a message.a message. • Asymmetric crypto systems use theAsymmetric crypto systems use the public key to encrypt a message and apublic key to encrypt a message and a different key - the private key to decryptdifferent key - the private key to decrypt
  • 5. What is PGPWhat is PGP ?? Pretty Good Privacy (PGP), from Phil'sPretty Good Privacy (PGP), from Phil's pretty good software, is a high securitypretty good software, is a high security cryptographic software application for MScryptographic software application for MS -DOS, Unix, and other computers. It-DOS, Unix, and other computers. It encrypts your mail so that nobody but theencrypts your mail so that nobody but the intended person can read it.intended person can read it.
  • 6. • Conventional CryptographyConventional Cryptography • Public key cryptographyPublic key cryptography • How PGP works ?How PGP works ?
  • 9. Mathematical StructureMathematical Structure P0() is public key and S0() is private key. P0(X) & S0(X) is meaningless gibberish, S0(P0(X)) = X. P0(S0(X)) = X. If key space = 128 No. of combination is more than 3 x 1030. If capacity = 109 comp.generates 109 keys/sec Time required more the age of universe
  • 10. Impact of PGP B2C UsesB2C Uses • Brokerage HousesBrokerage Houses • Financial InstitutionsFinancial Institutions • Law FirmsLaw Firms • Medical OrganizationsMedical Organizations • Trade AssociationsTrade Associations
  • 11. Impact of PGP B2B UsesB2B Uses • AccountingAccounting • EngineeringEngineering • Executive CommunicationsExecutive Communications • Human ResourcesHuman Resources • Information TechnologyInformation Technology
  • 12. Impact of PGP • MarketingMarketing • RecruitingRecruiting • SalesSales • LegalLegal
  • 13.
  • 14. PGPPGP & E-Governance in& E-Governance in IndiaIndia • The information technology act 2000The information technology act 2000 (new addition)(new addition) • Indian penal codeIndian penal code • The bankers' books evidence act, 1891The bankers' books evidence act, 1891 • The reserve bank of India act, 1934The reserve bank of India act, 1934 • The Indian evidence act, 1872The Indian evidence act, 1872
  • 15. ConclusionsConclusions The success or failure of internet applications is embedded in the security of electronic data.