SlideShare a Scribd company logo
1 of 15
pretty good privacy securing e-mail communication 5.5.2010
THE PROBLEM e-mail „security“ 5.5.2010 Pretty good privacy 2
SMTP protocol 5.5.2010 3 S: 220 smtp.example.com ESMTP Postfix  C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you  C: MAIL FROM:<bob@example.org> S: 250 Ok  C: RCPT TO:<alice@example.com> S: 250 Ok  C: RCPT TO:<theboss@example.com>  S: 250 Ok  C: DATA  S: 354 End data with <CR><LF>.<CR><LF>  C: Hello Alice.  C: Your friend, Bob C: .  S: 250 Ok: queued as 12345  C: QUIT  S: 221 Bye Pretty good privacy
SMTP protocol 4 PLAIN TEXT everyone on the way can read it Pretty good privacy 5.5.2010
SMTP protocol Pretty good privacy 5 NO AUTHENTICATION everyone can pose as everyone 5.5.2010
SMTP protocol Pretty good privacy 6 SIZE LIMIT e-mails are limited in size 5.5.2010
THE SOLUTION PGP - open solution to our problems 5.5.2010 Pretty good privacy 7
PGP features Authentication Confidentiality Compression Segmentation 8 5.5.2010 Pretty good privacy
Predicates Asymetric encryption Digest algorithm 9 Private/public key pair Private key is secret and uncompromised Private key encrypted data can only be decrypted by corresponding public key Reverse holds true as well Same input always generates same output Small change of input causes huge change on output Chance of collision has to be minimal 5.5.2010 Pretty good privacy
Authentication 10 confirming the sender‘s identity MATCH? SHA-1digest SHA-1digest Sender‘s public key RSAencryption RSAdecryption Sender‘s private key 5.5.2010 Pretty good privacy
Encryption 11 confirming the sender‘s identitymaking sure noone else can read the message IDEAencryption Session key IDEAencryption Recipient‘s public key 5.5.2010 Pretty good privacy
Decryption 12 confirming the sender‘s identitymaking sure noone else can read the message IDEAdecryption IDEAdecryption Session key Recipient‘s private key 5.5.2010 Pretty good privacy
Decryption 13 saving bandwidthincreasing cryptoanalysis resistance Sender Recipient 5.5.2010 Pretty good privacy
Compatibility & segmentation 14 traveling across platformsavoiding maximum size limit Compatibility +33% size radix-64 binary data Segmentation automatic segmentation and reassembly of long messages 5.5.2010 Pretty good privacy
THE CONCLUSION Jernej Virag 15 5.5.2010 Pretty good privacy

More Related Content

More from Jernej Virag

Odprti video formati
Odprti video formatiOdprti video formati
Odprti video formatiJernej Virag
 
From Doom to Crysis
From Doom to CrysisFrom Doom to Crysis
From Doom to CrysisJernej Virag
 
Game design - formal and dramatic elements
Game design - formal and dramatic elementsGame design - formal and dramatic elements
Game design - formal and dramatic elementsJernej Virag
 
Jni – java native interface
Jni – java native interfaceJni – java native interface
Jni – java native interfaceJernej Virag
 
Gaming industry in 2010
Gaming industry in 2010Gaming industry in 2010
Gaming industry in 2010Jernej Virag
 

More from Jernej Virag (12)

Odprti video formati
Odprti video formatiOdprti video formati
Odprti video formati
 
Android services
Android servicesAndroid services
Android services
 
Hitre aplikacije
Hitre aplikacijeHitre aplikacije
Hitre aplikacije
 
From Doom to Crysis
From Doom to CrysisFrom Doom to Crysis
From Doom to Crysis
 
Security
SecuritySecurity
Security
 
Ip security
Ip securityIp security
Ip security
 
Encryption
EncryptionEncryption
Encryption
 
The Task Model
The Task ModelThe Task Model
The Task Model
 
Game design - formal and dramatic elements
Game design - formal and dramatic elementsGame design - formal and dramatic elements
Game design - formal and dramatic elements
 
Java stereams
Java stereamsJava stereams
Java stereams
 
Jni – java native interface
Jni – java native interfaceJni – java native interface
Jni – java native interface
 
Gaming industry in 2010
Gaming industry in 2010Gaming industry in 2010
Gaming industry in 2010
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Pretty good privacy

  • 1. pretty good privacy securing e-mail communication 5.5.2010
  • 2. THE PROBLEM e-mail „security“ 5.5.2010 Pretty good privacy 2
  • 3. SMTP protocol 5.5.2010 3 S: 220 smtp.example.com ESMTP Postfix C: HELO relay.example.org S: 250 Hello relay.example.org, I am glad to meet you C: MAIL FROM:<bob@example.org> S: 250 Ok C: RCPT TO:<alice@example.com> S: 250 Ok C: RCPT TO:<theboss@example.com> S: 250 Ok C: DATA S: 354 End data with <CR><LF>.<CR><LF> C: Hello Alice. C: Your friend, Bob C: . S: 250 Ok: queued as 12345 C: QUIT S: 221 Bye Pretty good privacy
  • 4. SMTP protocol 4 PLAIN TEXT everyone on the way can read it Pretty good privacy 5.5.2010
  • 5. SMTP protocol Pretty good privacy 5 NO AUTHENTICATION everyone can pose as everyone 5.5.2010
  • 6. SMTP protocol Pretty good privacy 6 SIZE LIMIT e-mails are limited in size 5.5.2010
  • 7. THE SOLUTION PGP - open solution to our problems 5.5.2010 Pretty good privacy 7
  • 8. PGP features Authentication Confidentiality Compression Segmentation 8 5.5.2010 Pretty good privacy
  • 9. Predicates Asymetric encryption Digest algorithm 9 Private/public key pair Private key is secret and uncompromised Private key encrypted data can only be decrypted by corresponding public key Reverse holds true as well Same input always generates same output Small change of input causes huge change on output Chance of collision has to be minimal 5.5.2010 Pretty good privacy
  • 10. Authentication 10 confirming the sender‘s identity MATCH? SHA-1digest SHA-1digest Sender‘s public key RSAencryption RSAdecryption Sender‘s private key 5.5.2010 Pretty good privacy
  • 11. Encryption 11 confirming the sender‘s identitymaking sure noone else can read the message IDEAencryption Session key IDEAencryption Recipient‘s public key 5.5.2010 Pretty good privacy
  • 12. Decryption 12 confirming the sender‘s identitymaking sure noone else can read the message IDEAdecryption IDEAdecryption Session key Recipient‘s private key 5.5.2010 Pretty good privacy
  • 13. Decryption 13 saving bandwidthincreasing cryptoanalysis resistance Sender Recipient 5.5.2010 Pretty good privacy
  • 14. Compatibility & segmentation 14 traveling across platformsavoiding maximum size limit Compatibility +33% size radix-64 binary data Segmentation automatic segmentation and reassembly of long messages 5.5.2010 Pretty good privacy
  • 15. THE CONCLUSION Jernej Virag 15 5.5.2010 Pretty good privacy