E-Mail Security "Pretty Good Privacy"
E-Mail Security "Pretty Good Privacy"
• Loss of confidentiality.
• E-mails are sent in clear over open networks.
• E-mails stored on potentially insecure clients and
mail servers.
• Loss of integrity.
• No integrity protection on e-mails; anybody be
altered in transit or on mail server.
Threats to E-mail
• PGP Algorithms
• Symmetric encryption:
• DES, 3DES, AES and others.
• Public key encryption of session keys:
• RSA or ElGamal.
• Hashing:
• SHA-1, MD-5 and others.
• Signature:
• RSA, DSS, ECDSA and others.
PGP
(Pretty Good Privacy)
• PGP use:
• public keys for encrypting session keys
/ verifying signatures.
• private keys for decrypting session
keys / creating signatures.
PGP
Alice wants to send confidential e-mail, m, to Bob.
KS
m K (.)
S
KS(m ) KS(m )
KS( )
. m
+ Internet - KS
KS .+
K ()
B + +
-
KB( )
.
KB(KS ) KB(KS )
+ -
KB
KB
Alice:
generates random symmetric private key, KS.
encrypts message with KS (for efficiency)
also encrypts KS with Bob’s public key.
sends both KS(m) and KB(KS) to Bob.
PGP at the Sender site (A
Alice wants to send confidential e-mail, m, to Bob.
PGP
Alice wants to send confidential e-mail, m, to Bob.
KS
m K (.)
S
KS(m ) KS(m )
KS( ) . m
+ Internet - KS
KS
+.
K ()
B + +
- .
KB ( )
KB(KS ) KB(KS )
+ -
KB
KB
Bob:
uses his private key to decrypt and recover KS
uses KS to decrypt KS(m) to recover m
PGP at the Receiver site (B)
Alice wants to send confidential e-mail, m, to Bob.
PGP
• Alice wants to provide sender authentication
message integrity.
- KA
+
KA
- -
m .
H( )
-.
K ()
A
KA(H(m)) KA(H(m)) + .
KA ( )
H(m )
+ Internet - compare
m H( ). H(m )
m
• http://www.pgpi.org/doc/faq/
• www.gnupg.org
• William Stallings,” Cryptography and Network
Security Principles and Practices”, Fourth Edition
” Prentice Hall , 2005
• GITA” Encryption Technologies”, Standard P800-
S850 V2.0, April 5, 2004
• Sieuwert van Otterloo” A security analysis of
Pretty Good Privacy”, September 7, 2001
• Amr el-kadi” what is computer security”2005