X

Download Email Security Using PGP PowerPoint Presentation


Login   OR  Register
X

Share page



  Preview

               
Home / Computers & Web / Computers & Web Presentations / Email Security Using PGP PowerPoint Presentation

Email Security Using PGP PowerPoint Presentation

worldwideweb By : worldwideweb

On : Aug 07, 2014

In : Computers & Web

Embed :
540
views

0
downloads
Login / Signup - with account for


  • → Make favorite
  • → Flag as inappropriate
  • → Download Presentation
  • → Share Presentation
  • Slide 1 - Email Security Using PGP - Prajakta Bahekar
  • Slide 2 - Importance of Email Security Email is one of the most widely used network service on Computer Currently email message contents are not secure. Emails without encryption is similar to send mail by postcard.
  • Slide 3 - Goal of Email Security Confidentiality A message is concealed by encoding it. Authentication Ensuring that information is accessible only to authorized person. Message integrity Ensures that the message received is the same as the message that was sent
  • Slide 4 - One possible solution : PGP Pretty Good Privacy developed by Phil Zimmermann PGP is a key encryption program mainly intended for email privacy and authentication. PGP email encryption uses asymmetric key encryption algorithms. A PGP key is a piece of data used to crypt and/or sign the message ; it has a keyid and contains the name and email address of the owner.
  • Slide 5 - Why PGP ? Its building blocks are made of the best available cryptographic algorithms: RSA, DSS, Diffie-Hellman. [2] It is independent of operating system and processor. A Web of Trust - A web of trust is a bunch of PGP keys plus the connections between them, formed by key signings.
  • Slide 6 - PGP a Trust Model
  • Slide 7 - PGP Operation – Authentication Sender creates a message SHA-1 used to generate 160-bit hash code The hash code is encrypted with RSA using the sender’s private key, and result is attached to message Receiver uses RSA or DSS with sender’s public key to decrypt and recover hash code Receiver generates new hash code for message and compares with decrypted hash code, if match, message is accepted as authentic
  • Slide 8 - PGP Operation – Confidentiality Sender generates message and random 128-bit number to be used as session key for this message only Message is encrypted, using CAST-128 / IDEA/3DES with session key Session key is encrypted using RSA with recipient's public key, then attached to message Receiver uses RSA with its private key to decrypt and recover the session key Session key is used to decrypt message
  • Slide 9 - PGP Operation Summary
  • Slide 10 - Conclusion PGP is a remarkable phenomenon that provides confidentiality, authentication, and compression for email. [1] It is platform independent. Web of Trust makes it really easy to use. It is not controlled by any government.
  • Slide 11 - References Zimmerman P. Pretty Good Privacy: a digital data encryption program. Available from : http://users.ox.ac.uk/~aesb/pgp.ppt Garfinkel S. PGP: Pretty Good Privacy OReilly;1994. 430 p.

Description : Available Email Security Using PGP powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags : email security | online email security | email spam | email security using PGP

Shortcode : Get Shareable link