Pretty Good Privacy (PGP)



Similar documents
How To Use Pretty Good Privacy (Pgp) For A Secure Communication

An Introduction to Cryptography and Digital Signatures

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Information Security

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Elements of Security

Cryptography and Network Security

Encryption and Digital Signatures

A Noval Approach for S/MIME

Why you need secure

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

INTRODUCTION TO CRYPTOGRAPHY

Secure Frequently Asked Questions

Chapter 6 Electronic Mail Security

Understanding Digital Signature And Public Key Infrastructure

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Introduction to Encryption

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)

Cryptography & Digital Signatures

Is your data safe out there? -A white Paper on Online Security

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

How to Setup Privacy Guard Encryption.

Internet Programming. Security

Secure Data Exchange Solution

Network Security - ISA 656 Security

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Cryptography and Security

Network Security Protocols

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

PrivyLink Internet Application Security Environment *

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Chapter 23. Database Security. Security Issues. Database Security

Exam Papers Encryption Project PGP Universal Server Trial Progress Report

SSLPost Electronic Document Signing

Personal Secure Certificate

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

How to use PGP Encryption with iscribe

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

More effective protection for your access control system with end-to-end security

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

The science of encryption: prime numbers and mod n arithmetic

Options for encrypted communication with AUDI AG Version of: 31 May 2011

PGP - Pretty Good Privacy

One Time Pad Encryption The unbreakable encryption method

Insight Guide. Encryption: A Guide

Understanding Digital Certificates and Secure Sockets Layer (SSL)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

The Case For Secure

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

HMRC Secure Electronic Transfer (SET)

Professional Ethics for Computer Science

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Securing your Online Data Transfer with SSL

Content Teaching Academy at James Madison University


Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

cipher: the algorithm or function used for encryption and decryption

Guidelines Related To Electronic Communication And Use Of Secure Central Information Management Unit Office of the Prime Minister

Security in Android apps

New Security Features

Framework of e-commerce

Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business

PayFlex FTP - Wired Commute

Encryption. How do I send my encryption key?

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Chapter 23. Database Security. Security Issues. Database Security

CRYPTOGRAPHY IN NETWORK SECURITY

PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0

IT Networks & Security CERT Luncheon Series: Cryptography

Texas Medicaid & Healthcare Partnership (TMHP)

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via (and How to Avoid That)

Fighting product clones through digital signatures

Security Digital Certificate Manager

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

DATA AND PAYMENT SECURITY PART 1

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Overview Keys. Overview

ICOM 5018 Network Security and Cryptography

Implementing Transparent Security for Desktop Encryption Users

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Transcription:

Pretty Good Privacy (PGP) Contents...1 Abstract...2

Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and the use of (PGP)...7 Conclusion...8 References...9 Abstract Pretty Good Privacy (PGP) is a system which is used for the purpose of secure e-mails and messages communication over open network. The idea of (PGP), introduced in this paper, therefore it is an attempt to outline the importance of secure and efficiency of e-mail messages, the propose of this paper is to provide clear and certain idea about (PGP) as security tool which enables the users to secure their damaging information, and sensitive data by making their stored documents and e-mails safe and secured. This paper illustrates (PGP) as powerful and modern system, with increasing in operation automation and integration as

result of the growth in computer networkers, the paper has been divided into four parts each part discuses specific part of Pretty Good Privacy (PGP). Introduction Encryption is an old science, and as the use of computer has become more powerful the number of users who use encryption has grown and grown. Organisations officials grew increasingly concerned about the wide spread available of encryption techniques. Although encryption has perfectly valid uses for every day citizens, it is also a powerful tool for tasks are done within profitable or governmental organisation. In 1991 Senate Bill 266 (a sweeping anti crime bill) had a minor point those reuired government accessible back doors in all encryption tools. While this idea was under study and discussion Phil Zimmermann combined some common of encryption methods to produce the software he named Pretty Good Privacy or PGP. The ideas behind (PGP) were known and understood by computer scientist and mathematicians for certain yeas, which means that the main concepts were not exactly innovation. The real innovation of Zimmermann was making these tools usable by anyone with a home computer. Even early version of (PGP) gave users with standard

operating system based home computers access to military grade encryption in the USA. While Senate Bill 266 was still making its way through legislative process an effort was made to make military grade encryption widely available. The software was distributed to a variety of systems as well as on the Internet. Zimmermann a long time believed that (PGP) would be of most use to dissidents, and others who faced serious risks as a consequence of their belief, in other meaning to many people outside as well as inside the USA. Ever since the Second World War, the USA government has considered heavy duty encryption a serious threat to the national security and would not allow it to be exported from the USA (www Wikipedia.org), this provides an introduction about how the (PGP) was written by Zimmermann. Pretty Good Privacy originally was written by Zimmermann in source code, just like that used in any book, and computer tools were used to convert the human readable text into machine readable code. This is standard practice in the computer industry. Zimmermann took the text and had it published in book form, when the book of source code got exported. Then people all over the world have been able to the instructions to build their own (PGP) software. They promptly built the software form those instructions and (PGP) rapidly became a worldwide standard for encryption. Many people (users) find encryption distributing even scary after all, encryption techniques have been military and commercial secrets for millennia. Movies and novel use encryption as their plot demand, with total disregard for how encryption works in reality. ( Lucas, michael, 2006). The importance of the cryptography The first part starts by giving brief definition to cryptography in relation of protecting the information and keep it safe and secret. The cryptography is the practice and study of hiding specific information; it is used to keep the information secret and safe. When a message is sent using cryptography, it is changed (or encrypted) before it is sent. The change makes the message hard to read. If someone wants to read it, they need to change it back (or decrypt it). How to change it back is a secret. Both the person that sends the message and the one that gets it should know the secret way to change it, but other people should not be able to. There are steps to do that when the message is decoded and sent by the sender choosing appropriate method and after that when it is received decoded by the recipient. Cryptography in digital world offers three core areas that protect data from attempt to be taken, taking or an unauthorised use of data and. Cryptography covers these essential areas authentication, integrity, and confidentiality. Authentication; Authentication is a process in Cryptography that offers certificates as a solution, which are called digital IDs, they can be used to verify the identity of unauthorised person who is after to access secret data.

Integrity; Integrity is about how to protect data, corresponding to that certificates it can be used in another technique that s digital signatures, email can be easily forgotten but it s very hard to forge a digitally signed email message and so it s hard to modify or manipulate a message that is digitally signed. Confidentiality; by using the intelligent system that knows how to encrypt and decrypt data information can be kept secret especially when there are sensitive data over a network such as financial transactions, or personal records, other secret information. Cryptograph also known as secret key it has been in use for thousands of years in forms ranging from simple substitution to more complex constructions. However, developments in mathematics and the growth of computing power have made it possible to create this system is effectively and unbreakable. To encrypt and decrypt the data cryptography uses a single private key. The party having this key can use it to encrypt and decrypt data. The algorithm used in cryptography is fast and suitable for processing large streams of data in modern times cryptography can be a part of mathematics and computer science, and it is related to information theory computer security, and studying of engineering. Cryptography can be used to protect different kinds of information such as keeping information in bank cards, computer password, and the internet. The idea about how (PGP) works The second part of this paper discuses how the (PGP) works in term to explain that, it would be useful and helpful by giving precise definition of (PGP). Pretty Good Privacy is a computer program that provides cryptographic privacy and authentication. (PGP) is software which is used often for signing, encrypting and decrypting e-mails to increase the security of e-mail communication it was created by (Philip Zimmermann) as it is mentioned in the introduction. To more specific it is a program that gives electronic mail something that does not have. It provides this by encrypting the mail so it cannot be readable by any other user, when the message is encrypted it is made to look like meaningless, and that the idea of (PGP) works. It has been proven that (PGP) is a very capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text. (PGP) can be used to apply a digital signature to a message without encrypting. This is used in public posting where the message not needed to be hidden, but rather is needed to be allowed to the other users. Once a digital signature is created, it is impossible for any to modify either the message or signature without the modification being detected by (PGP).

Legal issues surrounding (PGP) The third part of these paper discuses the legal issues surrounding (PGP) as a lot of people claim that (PGP) is illegal. There are three spread reasons why they might claim that, it probable but not certain that (PGP) falls under the (ITAR) restrictions, which control the export the monitions and cryptographic technology form the (USA) and (Canada). The legal status of Pretty Good Privacy can be summarised to give clear image about it, for the users in the (USA) and (Canada) (PGP) should be used via (VIACRYPT PGP) or (MIT PGP 2.6), which should be bought, otherwise it will be infringing the patents held by(pkp) which should be paid for. If the users from outside the (USA) or (Canada) (PGP) can be used without having any legal issue and there no problems of using international (PGP) (version 2.6.2i), and talking to other versions. Because (2.6.2i) is endorsed by (Philip Zimmermann) for the use outside the (USA), and is faster and more compatible than any other version of (PGP). Fortunately for users outside the (USA) it has been possible to export the non encryption parts of the (PGP) source code, and the plug in the original encryption system from (PGP2.3) and that is illegal in the (USA) ( it is illegal to send encrypted message in some countries and network ) (Simmon Garfinkel, 1995). The implementation and the use of (PGP) Having a clear idea about (PGP) and how it can be used to keep data and information safe in this forth part of this paper outlines about the implementation of (PGP) and how to get the most benefit of this brilliant program, and it may be the best way to do that by bringing

considerable question to our attention which is why is (PGP) the case to encryption? An explanation can be provided as response to this question. As huge number of electronic messages are being passed every day between the world`s networks, users use electronic mail for the same purpose which they have historically used paper mail, the telephone and fax machines. Most of electronic mails are routines, many of them speed business transactions. Unfortunately, most of these electronic mails are vulnerable. The Internet is expanding doubling in size every year. Electronic mail one of the reasons for this fantastic growth, electronic mail is being sent almost free, and it is used to send document that can be edited and reviewed by other people, nowadays contacts, business plans, proposal, and even books routinely set by email. With considering using (PGP), that means there is concern about the information that stored on the computers or transmitted by communication systems, but if there is intention to take time to use (PGP) program, it should be an overall strategy of computer security at the same time with that, so the extra effort in encrypting data is not undone by some problems. Computer security has got different meaning to different users. In general, though, the security of computer concerned with several fundamental goals and aims such as, privacy, integrity, and availability (Simmon Garfinkel, 1995). Privacy is one goal of computer security it is used to keep the private documents private and secured. While this goal is sometimes addressed with encryption, it is also handled with password and other access control systems. Integrity is another goal of computer security is to make sure that data and applications are not modified without consent. Availability actually the previously described goals are designed to ensure another goal that computer and the data it contains are available when they are needed. An effective computer plan includes many other important components. Such as physical security, all these goals work together to keep the system running smoothly and securely. Conclusion To conclude (PGP) has been increasingly becoming such a significant system in our life, as the use of the computer and the networks has became fundamental element, in the system communications around the world. This part comes at the end of this paper to discuss how (PGP) is used and use encryption well. Encryption can be used by any one. Unfortunately, it is also true that it can be used badly. In fact using encryption badly is worse than not using encryption at all. Because when encryption is not used the files and emails messages that contain important information are created more carefully to be kept safe and secured. However when bad encryption is used by users it might lulled into false sense of security while confidential information remains available and it can be accessed and damaged.

References 1/ (Lucas, Michael, 2006) PGP and PGP Email for the Practical Paranoid ISBN: 9781593270711 2/ (Simon Garfinkel, 1995) Encryption for Everyone PGP Pretty Good Privacy First edition ISBN 1-5-6592-098-8 3/ (www.wikipedia.org) 4/ (www.sciencedirect.com )