Ramkumar
PGP
Introduction PGP Services PGP Operation PGP Components PGP Message Generation and Reception PGP Key Management Structure of Key Rings
Ramkumar
PGP
Services
1 2
Digital Signature (DSS/SHA or RSA/SHA) Message Encryption (CAST-128, IDEA, 3-DES in conjunction with RSA) Compression (Lempel-Ziv) E-mail compatibility (Radix-64 conversion) Segmentation (to overcome maximum message length of 50,000 bytes for SMTP)
3 4 5
Ramkumar
PGP
Services
1 2
Authentication (DSS/SHA or RSA/SHA) Condentiality (CAST-128, IDEA, 3-DES in conjunction with RSA) Authentication and Condentiality
Ramkumar
PGP
Services
PGP Modes
Source A
KRa M H EP || Z Z-1 M EKRa[H(M)]
Destination B
KUa DP Compare H KRb DP DC Z-1 M
EKUb[Ks]
EKUb[Ks] KRb DP
EKRa[H(M)]
KUa DP
DC
Z-1
Compare H
Services
X file
Signature required? No
Yes
Confidentiality required? No
Yes
decrypt key, X
K DKRb[EKUb[Ks]] X DK[X]
Compress X Z(X)
Decompress X Z1(X)
Confidentiality required? No
Yes
Signature required? No
Yes
Ramkumar
PGP
Keys
Four types of keys - passphrase, one-time session keys, public keys, private keys Two key rings - private and public Private key ring is encrypted with passphrase Every user has a public-private key pair Can have multiple pairs.
2 3 4 5
Ramkumar
PGP
1 2 3
Ramkumar
PGP
Operation
Ramkumar
PGP
IDB
select Key ID
DC
H Message M
EP
||
message
EP
encrypted signature + message
||
Output
EC
Ramkumar PGP
DC
private key KRb public key KUa
sender's Key ID Encrypted digest
DP
session key Ks
DP
Compare
DC
message
H
Ramkumar PGP
1 2 3 4 5
Timestamp Key ID Public key Encrypted Private key (encrypted with passphrase) User ID
Ramkumar
PGP
1 2 3 4 5
Timestamp, Key ID, Public key, User ID, Owner Trust (OT) Key legitamacy (KL) Signature(s) Signature Trust(s) (ST)
Ramkumar
PGP
1 2 3 4 5 6
Undened Unknown Usually not trusted Usually trusted Always trusted Ultimate trust
Ramkumar
PGP
1 2 3 4
Ramkumar
PGP
4 5 6 7 8 9
Consider public key of A signed by B and C rA , rB and rC - rows in the public key ring corresponding to A, B and C . Legitamacy entry for A depends on the signature trusts of B and C in row rA . ST of B in rA - copy of the OT in row rB ST of C in rA - copy of the OT in row rC Owner Trust manually assigned by the PGP user. KL is a function of weighted STs If any ST is ultimate - KL is assigned complete trust X usually trusted signatures or Y for always trusted signatures for A (or any combination) would result in complete trust of As public key
Ramkumar PGP
Trust Propagation
You
?
G H
?
X Y
P
= unknown signatory = X is signed by Y = key's owner is trusted by you to sign keys = key's owner is partly trusted by you to sign keys = key is deemed legitimate by you