Beruflich Dokumente
Kultur Dokumente
using GNUPG
Presented By
M.Mary Benisha Keerthana(111312)
R.Moulin Rahini(111314)
Guided By
J.S.Simi Mole
AP/CSE
Abstract
• We recently noted that PGP and other e- mail
encryption protocols are, in theory, highly
vulnerable to chosen-ciphertext attacks in
which the recipient of the e-mail acts as an
unwitting “decryption oracle”.
• We argued further that such attacks are quite
feasible and therefore represent a
serious concern.
• Here, we investigate these claims in more detail by attempting to implement
the suggested attacks.On one hand, we are able to successfully implement the
described attacks against PGP and GnuPG (two widely used software packages) in
a number of different settings.
On the other hand, we show that the attacks largely fail when data is
Compressed before encryption.
Introduction
PGP (“Pretty Good Privacy”)
• Developed in 1991 by Phil Zimmerman
• Provides highly secure, portable encryption and signature for any digital data - including e-
mail
Existing System
With the advancement of cryptography, parts of PGP have been criticized for being dated:
The lack of forward secrecy
The long length of PGP public keys
Difficulty for the users to comprehend and poor usability
Limitations
Lack of ubiquity
A vulnerability in Symantec Encryption Desktop re-enables access to the system for users
whose access was previously revoked
Advantage
GNUPG was meant for Security
It works well for that and plug-in are
available for various emailing software.
The sure point of secure emails
(encryption and/or signatures) is about
making sure that you know the correct
public key for any correspondent.
Hardware Used
Algorithm Used
Deflate algorithm
Literature Survey
3 "FireGPG's developers blog". - The file "secring.gpg" is not anymore used to store the
Retrieved July 24, 2013 secret keys. Merging of secretkeys
isnowsupported.
- All support for PGP-2 keys has been removed
forsecurityreasons.
List of Modules
1.Sender Node
2.Encrypter-by Public Key Rings
3.Compressor With GNUPG
4.Decryptor-by Private Key Rings
5.Receiver Node
PGP_GNUPG
PGP_GNUPG use:
public keys for encrypting session keys / verifying signatures.
private keys for decrypting session keys / creating signatures.
m K (.)
KS(m KS(m
KS( )
.
S ) )
+ Internet - KS
KS
+.
K ()
B + + KB( )
- .
KB(KS ) KB(KS )
+ -
KB
KB
Alice:
-generates random symmetric private key, KS.
- encrypts message with KS (for efficiency)
- also encrypts KS with Bob’s public key.
-sends both KS(m) and KB(KS) to Bob.
Bob:
-uses his private key to decrypt and recover KS
-uses KS to decrypt KS(m) to recover m
- KA
+
KA
- -
m .
H( ) .
-
K ()
A
KA(H(m)) KA(H(m)) +
KA( )
. H
+ Internet - compa
m H( ). H
m
-Alice digitally signs message.
- sends both message (in the clear) and digital signature.