Lec12
Lec12
Network Security
Chapter 18
Fifth Edition
by William Stallings
➢ confidentiality
⚫ protection from disclosure
➢ authentication
⚫ of sender of message
➢ message integrity samuel amr hoye msg modify kore pathale
compressed msg k encrypt krchi session key dya Ks dye decrypt korbe msg
PGP Operation – Confidentiality
& Authentication
➢ can use both services on same message
⚫ create signature & attach to message
⚫ encrypt both message & signature
⚫ attach RSA/ElGamal encrypted session key
PGP Operation –
Compression
➢ bydefault PGP compresses message
after signing but before encrypting
⚫ so can store uncompressed message &
signature for later verification
⚫ & because compression is non deterministic
➢ uses ZIP compression algorithm
PGP Operation – Email
Compatibility
➢ when using PGP will have binary data to send
(encrypted message etc)
➢ however email was designed only for text
➢ hence PGP must encode raw binary data into
printable ASCII characters
➢ uses radix-64 algorithm
⚫ maps 3 bytes to 4 printable chars
⚫ also appends a CRC
➢ PGP also segments messages if too big
PGP Operation – Summary