asymmetric cryptography - PowerPoint PPT Presentation

About This Presentation
Title:

asymmetric cryptography

Description:

asymmetric cryptography by David Kumar Content What is a asymmetric Cryptosystem? How Public Keys can be trusted GnuPG Creating Key pair Handle the keys Thunderbird ... – PowerPoint PPT presentation

Number of Views:382
Avg rating:3.0/5.0
Slides: 19
Provided by: Inder1
Category:

less

Transcript and Presenter's Notes

Title: asymmetric cryptography


1
asymmetric cryptography
  • by David Kumar

2
Content
  • What is a asymmetric Cryptosystem?
  • How Public Keys can be trusted
  • GnuPG
  • Creating Key pair
  • Handle the keys
  • Thunderbird
  • Questions?

3
Review asymmetric cryptography
  • Asymmetric
  • Public Key
  • Secret Key

Review
4
How Public Keys can be trusted
  • Authority Infrastructures
  • Public Key Infrastructure (PKI)
  • Financial transaction
  • Cross certification
  • Company's
  • Web of Trust
  • GnuPG

Review? How Public Keys can be trusted
5
Public Key Infrastructure
  • Often used in combination with Hardware

Review? How Public Keys can be trusted
6
Cross certification
Review? How Public Keys can be trusted
7
Web of Trust
  • allows anyone to sign anyone else's public key

Review? How Public Keys can be trusted
8
GnuPG
  • Under GNU General Public License
  • Web of Trust
  • Command line Tool
  • But there are some GUIs for
  • Instant messaging
  • Email
  • Etc.
  • http//www.gnupg.org/

Review? How Public Keys can be trusted ? GnuPG
9
Creating Key pair
  • gpg --gen-key (generates the sec. and pub. key)
  • Algorithm DSA/ ElGamal
  • Key length
  • 1024 4096 bits
  • duration of validity
  • Valid for ever
  • Valid for specific time
  • days, weeks, month, years
  • Personal Information
  • Name, Email address
  • Passphrase

Review? How Public Keys can be trusted ? GnuPG
10
Creating Key pair
  • Digital Signature Algorithm
  • ElGamal (al-Dschamal)
  • Based on Diffie-Hellman

Review? How Public Keys can be trusted ? GnuPG
11
Example GnuPG Key
  • -----BEGIN PGP PUBLIC KEY BLOCK-----
  • Version GnuPG v1.4.7 (MingW32)
  • mQGiBEdXIhgRBADTvEasLZVWbkb42eq37vNNmXD8JoNFCCaD
    rCdZmLrFc2S4Pq
  • Wb63jmtlaZ0QG9BG8RcMxo7fPeoUZu1W6abHm29bE1cDqBp8R
    dTrcRcbMnW9A5w
  • Yrfga5Rc5f3eL9rRGcddq2zoSf86jNjoJoAuJWP20dPTTG7Rta
    qSazH12wCg1A8I
  • MOrirxgsl/rxaNrUoAUOykD/iOXD3jVIiLgGQi2pAgJlHANrt
    Oj13FoUWLVYbuR
  • QTSy6FI5uHxopYaj7B2FydWFeBZh16dtaFT0v5zR8auEDA7EI
    G0WldkmdRBo115
  • IS7MpSX6WGqoaRCH9sW/UO1QzZEjSZ8T7nQTGvsa/pNmQQyIA
    rTpf04gAflW2C
  • kQ0lBADTuw90GAyNZBkgmYrJNFLjbMX/ogsmscuymHeTBMVTcN
    56EIQ4B09D6aq2
  • wQHDjBeEdSOUxnxGyq9yPiNjjzsZ/D3o51VFpITy57xvkWCmlf
    lU9OJ/AF3mgYz
  • rXxkHeuRzNR2oOfyDTGxD8hF5qXNsXxRuJzANgDqz9aflzBW07
    QkRGF2aWQgUy4g
  • S3VtYXIgPGRza3VtYXJAY2xlbXNvbi5lZHUiGAEExECACAFAk
    dXIhgCGwMGCwkI
  • BwMCBBUCCAMEFgIDAQIeAQIXgAAKCRAwvq2f1WC3UrIpAJ4z4c
    O46tiq7UwQQ1U
  • JVeJWIMxBQCfRy9Wq/RNIIaOLFK7hLh/hGXle5Ag0ER1ciGB
    AIAMkRCgBtzkvM
  • 3TQ/Boxwgzoy6w6gxOJQAArKKwwcI3FPEAp5LaZ3xlCgGIPTe
    tJrIk07hBkdrxn
  • MECTaQSTzsnwrBmkmwqJQCRZ7VNEwTHg2l5P5ag3fsVZUde77
    lcw9YXQ/U06aQy
  • KHLw3urdy9tZNAf8lTneV1ySRug7EXhceJvGKOQGbpd/y8nxkS
    oiccGqtJixcDf
  • 0TUZAvG2nt62sDpknj06xP5L/IaFiordD4xse3dHfLkwCl6M
    T9FIy1iGSTHTh

Review? How Public Keys can be trusted ? GnuPG
12
Key Export / Import
  • Export
  • gpg --export UID o filename
  • Why export?
  • Import
  • gpg --import Datei
  • Why import?
  • Show all keys
  • gpg --fingerprint

Review? How Public Keys can be trusted ? GnuPG
13
Signing a Key
  • gpg --edit-key UID
  • sign
  • Be careful to sign Keys!

Review? How Public Keys can be trusted ? GnuPG
14
Thunderbird
  • Enigmail Thunderbird Add-on for GnuPG

Review? How Public Keys can be trusted ? GnuPG
15
Enigmail
Review? How Public Keys can be trusted ? GnuPG
16
Thunderbird
Review? How Public Keys can be trusted ? GnuPG
17
Thunderbird
Review? How Public Keys can be trusted ? GnuPG
18
  • Questions?

Review? How Public Keys can be trusted ? GnuPG
?THE END
Write a Comment
User Comments (0)
About PowerShow.com