![Page 1: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/1.jpg)
PGP EncryptionJustin Shelby
![Page 2: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/2.jpg)
Encryption Methods There are two basic key types for
cryptography Symmetric Asymmetric
![Page 3: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/3.jpg)
Symmetric Key Cryptosystems One key is used to both encrypt and decrypt
messages Much more widely used than asymmetric. Must use an alternate transfer method to
spread the key.
![Page 4: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/4.jpg)
Asymmetric Key Cryptography Also called public key encryption. Uses two keys, one public, the other private. Can freely transmit the public key. VERY slow.
Approximately10,000 times slower than symmetric.
![Page 5: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/5.jpg)
Why bother? Financial information Medical information Military secrets Privacy
![Page 6: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/6.jpg)
Background of PGP Pretty Good Privacy Created by Phil Zimmerman in 1991 No license required for non-commercial use Rapidly spread across the internet
![Page 7: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/7.jpg)
Background Continued Criminal investigation started for export of
munitions due to using a key larger than 40 bits.
Eventually dropped and regulations relaxed. Created the OpenPGP standard for
interoperability. Free Software Foundation created GPG
GNU Privacy Guard
![Page 8: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/8.jpg)
How PGP Works Compresses the message or file Generates a symmetric key Encrypts the compressed message Encrypts the symmetric key with the
recipients public key Signs the compressed and encrypted file with
one of PGP’s hash functions
![Page 9: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/9.jpg)
Program functions Encrypted emails and instant messages Creation of an encrypted virtual partition Encrypt the hard drive
Must enter passphrase to access it, even to boot up the machine.
Secure shared folder File shredder
![Page 10: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/10.jpg)
Algorithms Asymmetric
RSA DSS/DH
Symmetric AES CAST TripleDES IDEA Twofish
Hashes SHA-2
256, 384, and 512 bits
RIPEMD-160 SHA-1 MD-5
![Page 11: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/11.jpg)
PGP Setup Download the software from the website
www.pgp.com Current version 9.61
Run the setup program and reboot Enter your information
![Page 12: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/12.jpg)
PGP Setup Continued
Select your preferred key type
Enter your passphrase and generate your key
![Page 13: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/13.jpg)
Is it Secure? “If all the personal computers in the world –
260 million – were put to work on a single PGP-encrypted message, it would still take an estimated 12 million times the age of the universe, on average, to break a single message William Crowell, Deputy Director of the NSA
March 20, 1997
![Page 14: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/14.jpg)
Questions?
![Page 15: PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric](https://reader036.vdocuments.net/reader036/viewer/2022082517/56649e445503460f94b37d22/html5/thumbnails/15.jpg)
Sources http://www.wikipedia.org PGP Desktop 9.6 help pages http://cpsc420.cs.clemson.edu http://www.mccune.cc