Beruflich Dokumente
Kultur Dokumente
Electronic Mail
Communication layers
Security protocols
Application layer
ssh, S/MIME, PGP, http digest
Transport layer
SSL, TLS, WTLS
Network layer
IPsec
Data Link layer
CHAP, PPTP, L2TP,
WEP (WLAN), A5 (GSM),
Bluetooth
Physical layer Frequency Hopping,Quantum
Cryptography
Operational Description
Consist of five services:
Authentication
Confidentiality
Compression
E-mail compatibility
Segmentation
Operational Description
Authentication
PGP provides it through the use digital signatures. Detail in book
diagram.
Confidentiality
Provide through the use of sysmetric block encryption.
Compression
PGP compresses the message after applying the signature but
before encryption.
This benefit save space both for email and for file storage .
The compression algorithm used is ZIP
Operational Description
E-mail Compatibility
The scheme used is radix-64 conversion (see appendix 5B).
The use of radix-64 expands the message by 33%.
Digital Signature
Message Encryption
Compression
E-mail Compatibility
Segmentation
Algorithm Used
DSS/SHA or RSA/SHA
CAST or IDEA or threekey
triple DES with DiffieHellman or RSA
ZIP
Radix-64 conversion
Text,message,video,image,application,multipart.
Transfer encodings
References
http://searchsecurity.techtarget.com/definition/Prett
y-Good-Privacy
Book william stallings(chapter 5)