SlideShare ist ein Scribd-Unternehmen logo
1 von 56
A. SARANG
INTRODUCTION
TO
SSH & PGP
Agenda
 Dial Up & broadband connections
 Introduction to SSH protocol & applications
 SSH-TRANS
 Client- Server Authentication
 SSH configuration
 Public & Private key pair generation
 Digital Signatures
 Use of SSH in Port Forwarding
 SSH in subversion control
 Introduction to PGP protocol & applications
 Email compatibility of PGP
A few years back ..
 DIAL-UP connection
Dial up connection
 Passwords were sent over
phoneline or LAN.
 Was it secure ?
The present day..
 Broadband connection
Broad band connection
 Passwords go through ISPs/
untrusted networks.
 How can there be a secure way of
sending passwords across the
internet ?
The need for encryption
 This can be solved by encrption of
the data sent over the untrusted
networks .
 This improves the strength of the
authentication mechanism people
use to login.
 We call this mechanism as …
SSH
Secure SHell
protocol & applications
SSH
 Replaces less secure telnet &
rlogin* programs.
 Uses public key cryptography to
authenticate remote PCs.
 *rlogin is a software utility for Unix-like computer operating
systems that allows users to log in on another host via
a network, communicating viaTCP port 513.
SSH can
 Execute commands & transfer files
(like unix rsh & rcp commands).
 Provides strong client/server
authentications
 Message integrity.
SSH can protect against ..
 Manipulation of data at intermediate
elements in the network.
 IP address spoofing where attack
hosts pretends to be trusted host by
sending packets with source address
of trusted hosts
 DNS spoofing.
SSH will not protect against ..
 A compromised root account .
 Insecure home directories
 Eg : if an attacker tries to modify
files in the home directory.
SSH version 2 protocols
 SSH-TRANS , a transport layer
protocol
 SSH-AUTH , an authentication
protocol.
 SSH-CONN , a connection
protocol.
 SSH-AUTH & SSH-TRANS are used for remote
login.
SSH - TRANS
 Provides encrypted channel
between client & server machines.
 Runs on top of TCP connection.
SSH-TRANS mechanism
 Client authenticates server using RSA
algorithm.
 After authentication , it establishes a
session key to encrypt data sent over
the channel.
 Message integrity check is done for
all data exchanged over the channel.
 Public key is owned by the server .
 How come client possesses the
server’s public key?
Step-1 : Client authenticates the server
 The server tells the client its public
key at the connection time.
 During first time , SSH application
warns the client that it has never
connected to the server before .
 The client remembers the server’s
public key.
 From the second time, the client
compares the key with the stored
public key.
Step 2 : Client authenticates itself to the
server
 This can be done in 3 ways :-
 User sends his password to user
directly in the secure channel.
 This is safe as the password is
encrypted.
 Public key is placed on the server
prior to connection .
 HOST BASED AUTHENTICATION
 The server has a set of trusted
hosts.
 Client claims to be a “trusted
host” .
Installing SSH on YOUR PC
 You can download the source code
from
 http://www.openssh.com/
Configuration files
 SSH has 2 different sets of
configuration files :-
 System wide configuration files
 User specific config files
System Wide Configuration Filles
 Stored in /etc/ssh directory
 Ssh_config : client config file.
 Sshd_config : sshd server config
files.
 Sshd.pid : Server’s pid in stored
here.
User specific configuration files ..
 Stored in ~UserName/.ssh
directory.
 Known_hosts : This file contains
host keys of SSH server s accessed
by the user.
 Authorized_keys2 : holds a list of
authorized public keys for users.
 When a client connects to a server
, server authenticates client by
checking the public key stored
here.
Why config files are important :
 Specify authentication methods.
 Specify SSH protocols supported .
 Behavior of server can be
controlled by :-
 Compling time configuration
 Config file
 Command line options
Key management in SSH
 SSH authenticates users using
keypairs :-
 Private key
 Public key
Keypairs
Key management commands
 Ssh-keygen : create key pairs
 Ssh-agent : holds private key in
memory
 Ssh-add : adds key to key agent
Applications of SSH : Port Forwarding
More practical application :
 Subversion control :-
 Github
 Gitorious
 svn
PGP
Pretty Good Privacy
 PGP is a data encryption and
decryption computer program that
provides cryptographic privacy
and authentication for data
communication.
 PGP combines the best available
cryptographic algorithms to achieve
secure e-mail communication.
PGP encryption is a serial combination
of :-
 Hashing
 Data Compression
 Symmetric Key Cryptography
 Public Key Cryptography
Supports
 Message Authentication
 Integrity Checking
(checking if message was altered
since completion ).
Using PGP to create Digital Signatures
 *plaintext : information a sender wishes to transmit to a receiver
 Hash function from plaintext*
 +
 Sender’s private keys
Using PGP in emails
 Authentication
 Confidentiality
 Compression
 Email compatibility using Radix 64
conversion
Alice sends Bob an email , again !
 Ad/Ae = private/public keypair
 m = digitally signed message
 SHA-1 = hashing function
Authentication- Sending
 Alice hashes the message using
SHA-1 to obtain SHA(m).
 Alice encrypts the hash using her
private key Ad to obtain
ciphertext c given by
 c=pk.encryptAd(SHA(m))
 Alice sends Bob the pair (m,c).
Authentication - Receiving
 Bob receives (m,c) .
 Bob decrypts c using Alice's public
key Ae to obtain signature s
 s=pk.decryptAe(c)
 Bob computes hash of m to get
signature s
 If s==m ,
Authenticated !! 
Confidentiality – Added Security
 Process is repeated with session
key sk
 m=sk.decryptk(c)
 NOTE : encryption is done for
session key+public key (same
time)
E-Mail compatibility
 Modern email system can transmit
only blocks of ASCII text.
 Encrypted ciphertext blocks may
not correspond to ASCII characters
.
 This problem is overcome by …
Radix-64 conversion/base 64 encoding
 The binary input is split into blocks of 24 bits
(3 bytes).
 Each 24 block is then split into four sets each
of 6-bits.
 Each 6-bit set will then have a value between
0 and 26-1 (=63).
 This value is encoded into a printable
character.
That’s all folks
THANK YOU !! 

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
Hemant Shah
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
Sourav Roy
 
Ssh
SshSsh
Ssh
gh02
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 

Was ist angesagt? (19)

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
SSH
SSHSSH
SSH
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Intro to SSH
Intro to SSHIntro to SSH
Intro to SSH
 
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configFLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
 
OpenSSH tricks
OpenSSH tricksOpenSSH tricks
OpenSSH tricks
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Ssh
SshSsh
Ssh
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Reverse shell
Reverse shellReverse shell
Reverse shell
 
Tunneling
TunnelingTunneling
Tunneling
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 

Ähnlich wie Introduction to SSH & PGP

CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
jemtallon
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
Abdulaziz Mohd
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network client
root_fibo
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
sandyBS
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
ameerandsons
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
info145003
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
NYversity
 

Ähnlich wie Introduction to SSH & PGP (20)

Lecture17
Lecture17Lecture17
Lecture17
 
SSH.pdf
SSH.pdfSSH.pdf
SSH.pdf
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
 
Client Server Security with Flask and iOS
Client Server Security with Flask and iOSClient Server Security with Flask and iOS
Client Server Security with Flask and iOS
 
SSL.ppt
SSL.pptSSL.ppt
SSL.ppt
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Security
SecuritySecurity
Security
 
Ch15
Ch15Ch15
Ch15
 
crypto2ssh
crypto2sshcrypto2ssh
crypto2ssh
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network client
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 

Mehr von Sarang Ananda Rao

Mehr von Sarang Ananda Rao (10)

Reducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial MarketsReducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial Markets
 
Partners Healthcare Case Analysis
Partners Healthcare Case AnalysisPartners Healthcare Case Analysis
Partners Healthcare Case Analysis
 
Auction analysis from Kaggle
Auction analysis from KaggleAuction analysis from Kaggle
Auction analysis from Kaggle
 
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance MeasurePersonal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
 
ACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra SecuritiesACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra Securities
 
Ticketing platform for cinemalls
Ticketing platform for cinemallsTicketing platform for cinemalls
Ticketing platform for cinemalls
 
Redundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systemsRedundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systems
 
Musicperk - Developro 2012
Musicperk - Developro 2012Musicperk - Developro 2012
Musicperk - Developro 2012
 
CMS & Chrome Extension Development
CMS & Chrome Extension DevelopmentCMS & Chrome Extension Development
CMS & Chrome Extension Development
 
Ui disk & terminal drivers
Ui disk & terminal driversUi disk & terminal drivers
Ui disk & terminal drivers
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Introduction to SSH & PGP

  • 2. Agenda  Dial Up & broadband connections  Introduction to SSH protocol & applications  SSH-TRANS  Client- Server Authentication  SSH configuration  Public & Private key pair generation  Digital Signatures  Use of SSH in Port Forwarding
  • 3.  SSH in subversion control  Introduction to PGP protocol & applications  Email compatibility of PGP
  • 4. A few years back ..  DIAL-UP connection
  • 5. Dial up connection  Passwords were sent over phoneline or LAN.  Was it secure ?
  • 6. The present day..  Broadband connection
  • 7. Broad band connection  Passwords go through ISPs/ untrusted networks.  How can there be a secure way of sending passwords across the internet ?
  • 8. The need for encryption  This can be solved by encrption of the data sent over the untrusted networks .  This improves the strength of the authentication mechanism people use to login.  We call this mechanism as …
  • 10.
  • 11. SSH  Replaces less secure telnet & rlogin* programs.  Uses public key cryptography to authenticate remote PCs.  *rlogin is a software utility for Unix-like computer operating systems that allows users to log in on another host via a network, communicating viaTCP port 513.
  • 12. SSH can  Execute commands & transfer files (like unix rsh & rcp commands).  Provides strong client/server authentications  Message integrity.
  • 13.
  • 14. SSH can protect against ..  Manipulation of data at intermediate elements in the network.  IP address spoofing where attack hosts pretends to be trusted host by sending packets with source address of trusted hosts  DNS spoofing.
  • 15. SSH will not protect against ..  A compromised root account .  Insecure home directories  Eg : if an attacker tries to modify files in the home directory.
  • 16. SSH version 2 protocols  SSH-TRANS , a transport layer protocol  SSH-AUTH , an authentication protocol.  SSH-CONN , a connection protocol.  SSH-AUTH & SSH-TRANS are used for remote login.
  • 17. SSH - TRANS  Provides encrypted channel between client & server machines.  Runs on top of TCP connection.
  • 18. SSH-TRANS mechanism  Client authenticates server using RSA algorithm.  After authentication , it establishes a session key to encrypt data sent over the channel.  Message integrity check is done for all data exchanged over the channel.
  • 19.  Public key is owned by the server .  How come client possesses the server’s public key?
  • 20. Step-1 : Client authenticates the server  The server tells the client its public key at the connection time.  During first time , SSH application warns the client that it has never connected to the server before .
  • 21.  The client remembers the server’s public key.  From the second time, the client compares the key with the stored public key.
  • 22. Step 2 : Client authenticates itself to the server  This can be done in 3 ways :-  User sends his password to user directly in the secure channel.  This is safe as the password is encrypted.
  • 23.  Public key is placed on the server prior to connection .  HOST BASED AUTHENTICATION  The server has a set of trusted hosts.  Client claims to be a “trusted host” .
  • 24. Installing SSH on YOUR PC  You can download the source code from  http://www.openssh.com/
  • 25. Configuration files  SSH has 2 different sets of configuration files :-  System wide configuration files  User specific config files
  • 26. System Wide Configuration Filles  Stored in /etc/ssh directory  Ssh_config : client config file.  Sshd_config : sshd server config files.  Sshd.pid : Server’s pid in stored here.
  • 27. User specific configuration files ..  Stored in ~UserName/.ssh directory.  Known_hosts : This file contains host keys of SSH server s accessed by the user.
  • 28.  Authorized_keys2 : holds a list of authorized public keys for users.  When a client connects to a server , server authenticates client by checking the public key stored here.
  • 29. Why config files are important :  Specify authentication methods.  Specify SSH protocols supported .  Behavior of server can be controlled by :-  Compling time configuration  Config file  Command line options
  • 30. Key management in SSH  SSH authenticates users using keypairs :-  Private key  Public key
  • 32.
  • 33.
  • 34.
  • 35. Key management commands  Ssh-keygen : create key pairs  Ssh-agent : holds private key in memory  Ssh-add : adds key to key agent
  • 36.
  • 37.
  • 38. Applications of SSH : Port Forwarding
  • 39. More practical application :  Subversion control :-  Github  Gitorious  svn
  • 40.
  • 42.  PGP is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.  PGP combines the best available cryptographic algorithms to achieve secure e-mail communication.
  • 43. PGP encryption is a serial combination of :-  Hashing  Data Compression  Symmetric Key Cryptography  Public Key Cryptography
  • 44. Supports  Message Authentication  Integrity Checking (checking if message was altered since completion ).
  • 45. Using PGP to create Digital Signatures  *plaintext : information a sender wishes to transmit to a receiver  Hash function from plaintext*  +  Sender’s private keys
  • 46.
  • 47. Using PGP in emails  Authentication  Confidentiality  Compression  Email compatibility using Radix 64 conversion
  • 48. Alice sends Bob an email , again !  Ad/Ae = private/public keypair  m = digitally signed message  SHA-1 = hashing function
  • 49. Authentication- Sending  Alice hashes the message using SHA-1 to obtain SHA(m).  Alice encrypts the hash using her private key Ad to obtain ciphertext c given by  c=pk.encryptAd(SHA(m))  Alice sends Bob the pair (m,c).
  • 50. Authentication - Receiving  Bob receives (m,c) .  Bob decrypts c using Alice's public key Ae to obtain signature s  s=pk.decryptAe(c)
  • 51.  Bob computes hash of m to get signature s  If s==m , Authenticated !! 
  • 52. Confidentiality – Added Security  Process is repeated with session key sk  m=sk.decryptk(c)  NOTE : encryption is done for session key+public key (same time)
  • 53. E-Mail compatibility  Modern email system can transmit only blocks of ASCII text.  Encrypted ciphertext blocks may not correspond to ASCII characters .  This problem is overcome by …
  • 54. Radix-64 conversion/base 64 encoding  The binary input is split into blocks of 24 bits (3 bytes).  Each 24 block is then split into four sets each of 6-bits.  Each 6-bit set will then have a value between 0 and 26-1 (=63).  This value is encoded into a printable character.
  • 55.