Experiment-7
Experiment-7
Aim:
To implement Pretty Good Privacy (PGP) security method.
Theory:
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and
authentication for data communication. Developed by Phil Zimmermann in 1991, PGP uses a
combination of symmetric-key and public-key encryption to secure email communications
and files. By encrypting messages, PGP ensures that only the intended recipient, who
possesses the corresponding private key, can read the content. This dual-layered approach
enhances security, allowing users to share sensitive information without fear of interception.
One of the key features of PGP is its use of a web of trust model, which allows users to
authenticate each other’s public keys without relying solely on centralized authorities.
Instead of a single certificate authority, users can sign each other's keys, creating a
decentralized trust network. This model empowers users to verify the authenticity of public
keys, reducing the risk of man-in-the-middle attacks. As a result, PGP not only protects the
confidentiality of messages but also helps to ensure the integrity and authenticity of the
communication.
Over the years, PGP has evolved, with various implementations and extensions, such as
OpenPGP, which standardizes the encryption method. Despite the rise of other encryption
tools and services, PGP remains a foundational technology in secure communications. Its
influence can be seen in many modern encryption practices, and it continues to be a crucial
tool for journalists, activists, and anyone needing to communicate securely in an increasingly
digital world. However, its complexity and the learning curve associated with managing keys
can pose challenges for new users, necessitating ongoing efforts to improve usability without
sacrificing security.
Implementation:
Following is a step-by-step walkthrough of PGP implementation that was carried out along
with the lab partner (Palaash Jain - 2021300050)-
Downloading and installing gpg4win (for PGP implementation) and kleopatra (for key
management)
Creating the public-private RSA-based key pair for self (using kleopatra’s interface)
Similar process was followed on the partner’s end and following encrypted message was
received (message_send.txt)
Providing the password to allow the system to utilize private key for decryption of the
received message
A similar activity was performed through command line interface, summary images of which
are as follows
Further, upon successful verification of proper functioning of the PGP routine, it was
integrated with the email system (postbox) through enigmail, the details of which are as
follows-
Installing enigmail extension for postbox (to integrate the PGP routine with the mail service)
Similarly, sending an email (automatically encrypted and signed by the enigmail extension)
The decrypted message (from part-1) as viewed on the lab partner’s screen