Suche senden
Hochladen
Gnu Privacy Guard - Intro
•
3 gefällt mir
•
1,107 views
O. R. Kumaran
Folgen
Technologie
Bildung
Melden
Teilen
Melden
Teilen
1 von 27
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
Felipe Prado
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable Security
TWD Industries AG
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
PGP - Pretty Good Privacy
PGP - Pretty Good Privacy
Juliano Flores
Pretty good privacy
Pretty good privacy
Pushkar Dutt
PGP for Smarties
PGP for Smarties
Jan Schaumann
Pretty good privacy
Pretty good privacy
Jernej Virag
Gpg basics
Gpg basics
obsidisconsortia
Empfohlen
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
Felipe Prado
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable Security
TWD Industries AG
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
PGP - Pretty Good Privacy
PGP - Pretty Good Privacy
Juliano Flores
Pretty good privacy
Pretty good privacy
Pushkar Dutt
PGP for Smarties
PGP for Smarties
Jan Schaumann
Pretty good privacy
Pretty good privacy
Jernej Virag
Gpg basics
Gpg basics
obsidisconsortia
Gpg Twitter
Gpg Twitter
The Glover Park Group
Installing Gpg
Installing Gpg
Jon Spriggs
GPG Signing Git Commits
GPG Signing Git Commits
Dinis Cruz
Handson 1 (5/6)
Handson 1 (5/6)
Roberta Cuel
Pretty good privacy
Pretty good privacy
Alex Adipati
Pgp
Pgp
Nilanjan Danda
PGP based social network
PGP based social network
José Moreira
E mail security
E mail security
Soumya Vijoy
Using pgp with mule
Using pgp with mule
Anil Kumar V
PGP and Enigmail
PGP and Enigmail
Tania Silva
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
Federico Costantini
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
Symantec
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
Pgp
Pgp
Abhishek Kesharwani
PGP presentation 2014
PGP presentation 2014
Barbara Nadeem
PGP Basic Lecture 01
PGP Basic Lecture 01
Qaisar Ayub
pgp s mime
pgp s mime
Chirag Patel
Pgp
Pgp
precy02
Introduction to SSH & PGP
Introduction to SSH & PGP
Sarang Ananda Rao
Pgp security mule
Pgp security mule
Sindhu VL
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
n|u - The Open Security Community
Weitere ähnliche Inhalte
Andere mochten auch
Gpg Twitter
Gpg Twitter
The Glover Park Group
Installing Gpg
Installing Gpg
Jon Spriggs
GPG Signing Git Commits
GPG Signing Git Commits
Dinis Cruz
Handson 1 (5/6)
Handson 1 (5/6)
Roberta Cuel
Pretty good privacy
Pretty good privacy
Alex Adipati
Pgp
Pgp
Nilanjan Danda
PGP based social network
PGP based social network
José Moreira
E mail security
E mail security
Soumya Vijoy
Using pgp with mule
Using pgp with mule
Anil Kumar V
PGP and Enigmail
PGP and Enigmail
Tania Silva
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
Federico Costantini
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
Symantec
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
Pgp
Pgp
Abhishek Kesharwani
PGP presentation 2014
PGP presentation 2014
Barbara Nadeem
PGP Basic Lecture 01
PGP Basic Lecture 01
Qaisar Ayub
pgp s mime
pgp s mime
Chirag Patel
Pgp
Pgp
precy02
Introduction to SSH & PGP
Introduction to SSH & PGP
Sarang Ananda Rao
Pgp security mule
Pgp security mule
Sindhu VL
Andere mochten auch
(20)
Gpg Twitter
Gpg Twitter
Installing Gpg
Installing Gpg
GPG Signing Git Commits
GPG Signing Git Commits
Handson 1 (5/6)
Handson 1 (5/6)
Pretty good privacy
Pretty good privacy
Pgp
Pgp
PGP based social network
PGP based social network
E mail security
E mail security
Using pgp with mule
Using pgp with mule
PGP and Enigmail
PGP and Enigmail
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Pgp
Pgp
PGP presentation 2014
PGP presentation 2014
PGP Basic Lecture 01
PGP Basic Lecture 01
pgp s mime
pgp s mime
Pgp
Pgp
Introduction to SSH & PGP
Introduction to SSH & PGP
Pgp security mule
Pgp security mule
Ähnlich wie Gnu Privacy Guard - Intro
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
n|u - The Open Security Community
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
Tanner Lovelace
Crypto hlug
Crypto hlug
fangjiafu
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
Sanjeev Kumar Jaiswal
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
Tom Limoncelli
Using pgp with mule
Using pgp with mule
Anil Kumar V
gpg4win-for-novices-1.0.0 (1).pdf
gpg4win-for-novices-1.0.0 (1).pdf
FERNANDOJOSEGARCIAFI
G43053847
G43053847
IJERA Editor
Network and information security
Network and information security
rithika858339
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
ikirkton
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
Paulo Henrique
Steganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
Cryptoparty v1
Cryptoparty v1
Surendran Balachandran
OpenPGP and Russian Cryptography
OpenPGP and Russian Cryptography
Dmitry Baryshkov
Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPG
Ankit Mehta
Gpg Mswl
Gpg Mswl
guest648519
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
Future Insights
PGP desk top basis lecture 002
PGP desk top basis lecture 002
Qaisar Ayub
Facts about pygame
Facts about pygame
alamimi983
Ähnlich wie Gnu Privacy Guard - Intro
(20)
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
Crypto hlug
Crypto hlug
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
The BlackBox Project: Safely store secrets in Git/Mercurial (originally for P...
Using pgp with mule
Using pgp with mule
gpg4win-for-novices-1.0.0 (1).pdf
gpg4win-for-novices-1.0.0 (1).pdf
G43053847
G43053847
Network and information security
Network and information security
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
Steganography ppt.ppt
Steganography ppt.ppt
Cryptoparty v1
Cryptoparty v1
OpenPGP and Russian Cryptography
OpenPGP and Russian Cryptography
Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPG
Gpg Mswl
Gpg Mswl
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
PGP desk top basis lecture 002
PGP desk top basis lecture 002
Facts about pygame
Facts about pygame
Mehr von O. R. Kumaran
Supervised learning
Supervised learning
O. R. Kumaran
Version control with Subversion
Version control with Subversion
O. R. Kumaran
Search for Extra Terrestrial Intelligence
Search for Extra Terrestrial Intelligence
O. R. Kumaran
Understanding gil
Understanding gil
O. R. Kumaran
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
O. R. Kumaran
Hg wells time-machine.
Hg wells time-machine.
O. R. Kumaran
Mehr von O. R. Kumaran
(6)
Supervised learning
Supervised learning
Version control with Subversion
Version control with Subversion
Search for Extra Terrestrial Intelligence
Search for Extra Terrestrial Intelligence
Understanding gil
Understanding gil
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
Hrishikesh kulkarni's and madeline wills's powerpoint file on the talent code-
Hg wells time-machine.
Hg wells time-machine.
Kürzlich hochgeladen
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Kürzlich hochgeladen
(20)
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Gnu Privacy Guard - Intro
1.
Gnu Privacy Guard
2.
Outline Why Privacy? PGP is Pretty Good Privacy with IDEA. What is Gnu Privacy Guard? Cryposystems are Mathematical. The Algos used: Getting Started with GnuPG. Exploring the options. Open PGP Specification – RFC 2440 I need your Public Key, Bob; says Alice. GPG + Mutt.
3.
Privacy and Security If Privacy can be outlawed then, only outlaws will have privacy. – Phillip Zimmermann “Why I wrote PGP” Network security problems and privacy is essentially about Secrecy Authentication Non Repudiation Integrity Control
4.
What is GnuPrivacy Guard (GPG)? ● ● ● ● Free Software Replacement of PGP. It does not use the Patented IDEA Algorithm for encryption (As used by PGP) Supported by German Ministry of Economics and Commerce. Free Software available by default under all major distros of Linux, FreeBSD,Solaris and other unices.
5.
alice@hermachine$gpg v –version gpg (GnuPG) 1.2.1 Copyright (C) 2002 Free Software Foundation, Inc. ... Home: ~/.gnupg Supported algorithms: Pubkey: RSA, RSAE, RSAS, ELGE, DSA, ELG Cipher: 3DES (S2), CAST5 (S3), BLOWFISH (S4), AES (S7), AES192 (S8), AES256 (S9), TWOFISH (S10) Hash: MD5 (H1), SHA1 (H2), RIPEMD160 (H3)
6.
The Bottom line for any Public Key Cryptography Public Key is for Others to use when encrypting messages to you and when verifying the signatures from you. Private Key is used for creating signatures and for decrypting messages to you.
7.
Getting Started with GnuPG Generating a new keypair Generating a revocation certificate Exchanging keys Exporting a public key Importing a public key Encrypting and decrypting documents Making and verifying signatures Clearsigned documents
8.
Cocepts of Ciphers Symmetric ciphers ● Publickey ciphers ● Hybrid ciphers ● Digital signatures ●
9.
Encryption – Decryption Plain Text Encryption CypherText Decryption PlainText
10.
Conventional CryptoGraphy
11.
Public Key Cryptography
12.
How GPG Works – Hybrid
13.
Decryption in GPG
14.
Key Management Managing your own keypair Key integrity Adding and deleting key components Revoking key components Updating a key's expiration time Validating other keys on your public keyring Trust in a key's ownerHa Using trust to validate keys Distributing keys A chain is only as strong as its weakest link.
15.
Need for Message Signatures Authenticity: The From header from an email can be easily forged. Integrity: The contents of the Message could have altered from the original one before you read.
16.
Daily use of GnuPG Defining your security needs Choosing a key size Protecting your private key Selecting expiration dates and using subkeys Managing your web of trust Building your web of trust Using GnuPG legally
17.
Alice Requests Bob for Public Key What will Bob Do? Follow these Instructions to generate a Public Key and parcipitate in secure communication with Alice. bob@hismachine$ gpg –genkeys # This will create a KeyPair for Bob, consisting of Public Key and his Private Key. ✔ bob@hismachine$ gpg –listkeys # Just checks if his keys are present. ✔ bob@hismachine$ gpg –output bob.publickey –armor –export ✔ bob@hismachine # Bob Exports his public key to bob.publickey(File) in ascii armored form.
18.
Alice Imports Bobs Key and Sends him an Encrypted File Alice@hermachine $mutt #opens her favorite MUA, downloads and saves bobs public key. Alice@hermachine$gpg –import bob.publickey #Alice Imports the public key of bob in her king rings. Alice @hermachine$gpg –listkeys #Alice checks for the presence of Bobs Key along with her key ring pairs. /* Alice has a document gpg.txt which she wants to send it to bob */ Alice @ hermachine $ gpg –output gpg.txtencrypt –encrypt gpg.txt –recipient bob@hismachine # Alice has encrypted the file to gpg.txtencrypt
19.
Bob Receives and Gets it! bob@hismachine $gpg –output gpg.txt –decrypt gpg.txt encrypt ● This Command likes to verify if Bob is only trying to decrypt it and it prompts for his passphrase ● Bob Provides his passphrase successfully. ● The file is decrypted and the original file is obtained. ● Hurray! Bob feels delighted
20.
Insecure Memory Warning On many systems this program should be installed as setuid(root). This is necessary to lock memory pages. Locking memory pages prevents the operating system from writing them to disk and thereby keeping your secret keys really secret. If you get no warning message about insecure memory your operating system supports locking without being root. The program drops root privileges as soon as locked memory is allocated. But running the program as suid root one should be alert to the danger of Trojan horses. Since a Trojan horse running as superuser can damage an entire system. If for this reason (or any other reason) you choose not run GnuPG as root you can switch off the warning by setting nosecmem warning in ~/.gnupg/options.
21.
PGP Key Signing Party For establishing the web of trust and spreading the usage of Gnu Privacy Guard, there can be Key Signing Parties. Steps to Follow. ➔ Each Attendee creates his key pair ➔ Notes down the Fingerprint and KeyID in some sheet and brings it along to the key singing party. ➔ Bring some more Identification like Voter Card, Photo Bank Card, Passport etc. ➔ Each other member verifies each other and notes down the KeyID and Fingerprint. ➔
22.
RFC 2440 OpenPGP Message Format Popularity of the PGP Software in Secure Communication led way to the Internet Draft RFC 2440 establishing OpenPGP message Format for Communication in the Internet. GPG (expect for few options) complies with the OpenPGP messaging format. General Functions Data Element Formats Packet Syntax,Tags,Types Public Keys and all other algorithms needed for Secure
23.
KeyManagement Tools GPA – Privacy Assistant – Gnome. ● KGPG – Standard and comes with FC2. ● SeaHorse – For Gnome ● Pgp dump – Paste your ASCII Armored key and Show the packets. ● Keylookup – Utility to fetch keys from keyserver. Libraries ● Libgcrypt ● A general purpose cryptographic library based on the code from GnuPG. It provides functions for all cryptographic building blocks: symmetric ciphers, hash algorithms, MACs, public key algorithms, large integer functions, random numbers and a lot of supporting ●
24.
References www.gnupg.org FAQ HowTos Gnu Privacy Handbook Mailing Lists www.pgp.com www.google.com
25.
Thats all folks! Key ID : 4C88D59C Key Fingerprint: 6C8E 0A4A 64BF 9C70 6034 FD5A 1931 DE09 4C88 D59C Key Server: gpg.mit.edu O.R.Senthil Kumaran Senthil_OR@Dell.com
26.
27.
Getting Started with GnuPG Generating a new keypair alice% gpg genkey Generating a revocation certificate alice% gpg output revoke.asc genrevoke <mykey> Exchanging keys Exporting a public key alice% gpg output alice.gpg export alice@cyb.org Importing a public key alice% gpg import blake.gpg Encrypting and decrypting documents alice% gpg output doc.gpg encrypt recipient blake@cyb.org doc blake% gpg output doc decrypt doc.gpg Making and verifying signatures alice% gpg output doc.sig sign doc blake% gpg output doc decrypt doc.sig
Jetzt herunterladen