SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Public key cryptography: a practical
                  approach

                             Israel Herraiz
                           <isra@herraiz.org>
                        <israel.herraiz@upm.es>

                            KeyID FE0A7AF3

                               Fingerprint
           D0DA E915 BFDD E5CD 8BA0     B159 7E97 2ACB FE0A 7AF3

                          Slides and additional info at
                     http://mat.caminos.upm.es/~iht/pkc/


                                                                   1

http://herraiz.org
Privacy in electronic communicatios



                        Can we ensure
                     privacy in electronic
                      communications?




                                             2

http://herraiz.org
Reaching Google
              1      10.8.0.1 (10.8.0.1)
              2      192.168.1.1 (192.168.1.1)
              3      62.81.125.179.static.user.ono.com (62.81.125.179)
              4      10.115.49.217 (10.115.49.217)
              5      10.127.151.49 (10.127.151.49)
              6      10.127.10.137 (10.127.10.137)
              7      10.127.10.133 (10.127.10.133)
              8      10.127.3.82 (10.127.3.82)
              9      213.242.71.21 (213.242.71.21)
             10      ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42)
             11      ae-45-45.ebr1.London1.Level3.net (4.69.143.101)
             12      ae-1-51.edge3.London1.Level3.net (4.69.139.73)
             13      unknown.Level3.net (212.113.15.186)
             14      209.85.255.78 (209.85.255.78)
             15      66.249.95.173 (66.249.95.173)
             16      216.239.49.45 (216.239.49.45)
             17      * * *
             18      ww-in-f147.1e100.net (209.85.229.147)


                                                                         3

http://herraiz.org
Reaching Google
              1      10.8.0.1 (10.8.0.1)
              2      192.168.1.1 (192.168.1.1) Getafe
              3      62.81.125.179.static.user.ono.com (62.81.125.179)
              4      10.115.49.217 (10.115.49.217)
              5      10.127.151.49 (10.127.151.49)     Barcelona
              6      10.127.10.137 (10.127.10.137)
              7      10.127.10.133 (10.127.10.133)
              8      10.127.3.82 (10.127.3.82)
              9      213.242.71.21 (213.242.71.21)   Minneapolis
             10      ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42)   Paris
             11      ae-45-45.ebr1.London1.Level3.net (4.69.143.101)
             12      ae-1-51.edge3.London1.Level3.net (4.69.139.73)
                                                                   London
             13      unknown.Level3.net (212.113.15.186)
             14      209.85.255.78 (209.85.255.78) Atlanta
             15      66.249.95.173 (66.249.95.173) New York
             16      216.239.49.45 (216.239.49.45) Los Angeles
             17      * * *
             18      ww-in-f147.1e100.net (209.85.229.147) Atlanta


                                                                            4

http://herraiz.org
Hops while attempting to reach
                     Google




                                           5

http://herraiz.org
Is it that bad?



                     What kind of private
                     Information can be
                          captured?




                                            6

http://herraiz.org
Non-cyphered information
    ●   Geolocalization
        ●   Using your IP address
    ●   Web browser and operating system
    ●   Any info written in a form
        ●   Including passwords
    ●   Cookies
        ●   Have a look and take care
             –   http://www.youtube.com/watch?v=yyLdxO6xvh8
             –   http://www.youtube.com/watch?v=1FgKL2ywrX0
                                                              7

http://herraiz.org
Is it important?
                                                      ●   Strong PK crypto illegal
                                                          in France up to 2004
                                                      ●   PK implementations in
                                                          software considered
                                                          weapons in the US
                                                      ●   Software export
                                                          restrictions in EU and US
                                                       http://en.wikipedia.org/wiki/Cryptography_law
                                                       http://en.wikipedia.org/wiki/Key_disclosure_law



    http://en.wikipedia.org/wiki/Phil_Zimmermann

        http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States#History             8

http://herraiz.org
Solution

                     Enforce cyphering
                      using public key
                       cryptography


                                         9

http://herraiz.org
Cryptography
    ●   Traditionally, cyphering was done using a
        password and an algorithm
    ●   Symmetric approach
        ●   Password shared by both peers
    ●   Public key cryptography
        ●   Insecure channel
        ●   Private and secure communication without any
            previous physical contact


                                                           10

http://herraiz.org
Public key cryptography (PKP)




        Pub      Pri            Pub   Pri




                                            11

http://herraiz.org
Public key cryptography




        Pub      Pri                         Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                         12

http://herraiz.org
Criptografía de clave pública


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             13

http://herraiz.org
Public key cryptography

                       Pub

                       0F231A5




        Pub      Pri                           Pub   Pri



                             Keyserver


                                   Pub   Pub
                                                           14

http://herraiz.org
Public key cryptography

                                         Pub

                                         0F231A5




        Pub      Pri                           Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                           15

http://herraiz.org
Public key cryptography


                                         Hi there!




        Pub      Pri                             Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                             16

http://herraiz.org
How does it work?
    ●   PKP Algorithms
        ●   Prime number factorization
    ●   From a mathematical point of view, all
        messages can be decrypted
    ●   From a computational point of view, decrypting
        a message without the private key takes too
        long
             –   Key length is a crucial property


                                                     17

http://herraiz.org
Public key sample
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.19 (GNU/Linux)

JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8
bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3
5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na
K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa
mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv
VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t
2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv

-----END PGP PUBLIC KEY BLOCK-----




                                                            18

http://herraiz.org
Private key sample
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2.0.19 (GNU/Linux)

mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv
JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8
VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t
2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv
bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3
5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na
K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa

-----END PGP PRIVATE KEY BLOCK-----




                                                            19

http://herraiz.org
Keyservers
    ●   Internet hosts that contain public keys
    ●   Federated services
        ●   All servers contain all the public keys in the world
    ●   Public keyserver in Spain thanks to RedIRIS
        ●   URL: pgp.rediris.es




                                                                   20

http://herraiz.org
Message signing


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             21

http://herraiz.org
Message signing
                                       Created with the
                                         private key

                       Hi there!




        Pub      Pri                                      Pub   Pri



                               Keyserver


                                     Pub    Pub
                                                                      22

http://herraiz.org
Message signing


                                           Hi there!




        Pub      Pri                              Pub   Pri



                         Keyserver


                               Pub   Pub
                                                              23

http://herraiz.org
Signing and encrypting


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             24

http://herraiz.org
Signing and encrypting

                       Pub

                       FAD43A




        Pub      Pri                              Pub   Pri



                                Keyserver


                                      Pub   Pub
                                                              25

http://herraiz.org
Signing and encrypting

                                        Pub

                                            FAD43A




        Pub      Pri                                 Pub   Pri



                          Keyserver


                                Pub   Pub
                                                                 26

http://herraiz.org
Signing and encrypting


                                        Hi there!




        Pub      Pri                            Pub   Pri



                          Keyserver


                                Pub   Pub
                                                            27

http://herraiz.org
Signing and encrypting


                                        Hi there!




        Pub      Pri                            Pub   Pri



                          Keyserver


                                Pub   Pub
                                                            28

http://herraiz.org
Identity certification

               How do you know that
             public keys belong to their
                legitimate owners?


                     Public key   Can we ensure that the
                 Barack Obama       key does belong to
                                      Barack Obama?


                                                           29

http://herraiz.org
Identity certification


               Certificate Authorities



                        Trust chain


                                              30

http://herraiz.org
Public key signing
    ●   Public keys are plain text documents that can
        be cryptographically signed
    ●   Mutual public signing adds identity certification
        to PKP schemes




                                                            31

http://herraiz.org
Public key signing
      Barack Obama




        Pub      Pri                        Pub   Pri



                          Keyserver


                                Pub   Pub
                                                        32

http://herraiz.org
Public key signing
      Barack Obama
                       Key FE0A7AF2
                       Name Barack Obama
                       Fingerprint
                         D0DA E915 BFDD E5CD 8BA0
                         B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                      Pub   Pri



                                Keyserver


                                          Pub       Pub
                                                                      33

http://herraiz.org
Public key signing
      Barack Obama
                               Key FE0A7AF2
                               Name Barack Obama
                               Fingerprint
                                 D0DA E915 BFDD E5CD 8BA0
                                 B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                    Pub   Pri



                          Keyserver


                                Pub      Pub
                                                                    34

http://herraiz.org
Public key signing
                                                                Show me
                                                              your passport
      Barack Obama
                               Key FE0A7AF2
                               Name Barack Obama
                               Fingerprint
                                 D0DA E915 BFDD E5CD 8BA0
                                 B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                    Pub     Pri



                          Keyserver


                                Pub      Pub
                                                                          35

http://herraiz.org
Public key signing
                                                                        Show me
                                                                      your passport
      Barack Obama
                                       Key FE0A7AF2
                                       Name Barack Obama
                                       Fingerprint
                       Passport          D0DA E915 BFDD E5CD 8BA0
                       Barack            B159 7E97 2ACB FE0A 7AF2
                       Obama



        Pub      Pri                                            Pub     Pri



                                  Keyserver


                                        Pub      Pub
                                                                                  36

http://herraiz.org
Public key signing

               Pub
                                     Key FE0A7AF2
          Barack Obama               Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0         Fingerprint
    B159 7E97 2ACB FE0A 7AF2           D0DA E915 BFDD E5CD 8BA0
                                       B159 7E97 2ACB FE0A 7AF2




                               Download key FE0A7AF2          Pub   Pri



                                Keyserver


                                       Pub     Pub
                                                                          37

http://herraiz.org
Public key signing

               Pub
                                    Key FE0A7AF2
          Barack Obama              Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0        Fingerprint
    B159 7E97 2ACB FE0A 7AF2          D0DA E915 BFDD E5CD 8BA0
                                      B159 7E97 2ACB FE0A 7AF2




                                                             Pub   Pri



                               Keyserver


                                     Pub      Pub
                                                                         38

http://herraiz.org
Public key signing

               Pub
                                    Key FE0A7AF2
          Barack Obama              Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0        Fingerprint
    B159 7E97 2ACB FE0A 7AF2          D0DA E915 BFDD E5CD 8BA0
                                      B159 7E97 2ACB FE0A 7AF2




                                                             Pub   Pri



                               Keyserver


                                     Pub      Pub
                                                                         39

http://herraiz.org
Public key signing
      Barack Obama




                         Key signing is
                         often mutual
        Pub      Pri                        Pub   Pri



                          Keyserver


                                Pub   Pub
                                                        40

http://herraiz.org
Public key signing

                                    Barack Obama
                     Trust chain
      Pub



      Pub

                                                   Is he Barack
      Pub                                             Obama?




                                                                  41

http://herraiz.org
Signing party




                                     42

http://herraiz.org
Take away

                PK Cryptog.
                                  Each user creates
              Secure comms.
                                   a public-private
                  through
                                      key pair
              insec. channels



                                    Trust chain
                Keyservers
                                    Identity cert.
               contain every
                                       through
              key in the world
                                  public key signing

                                                       43

http://herraiz.org

Weitere ähnliche Inhalte

Was ist angesagt?

Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB
 
Bitcoin Investment Forum USA
Bitcoin Investment Forum USABitcoin Investment Forum USA
Bitcoin Investment Forum USAJoe root
 
Vundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityVundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityJacobo de Vera
 
Bitcoin Community Forums USA
Bitcoin Community Forums USABitcoin Community Forums USA
Bitcoin Community Forums USAJoe root
 
Tracker
TrackerTracker
TrackerWe Dua
 
Bitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaBitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaJoe root
 

Was ist angesagt? (6)

Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
 
Bitcoin Investment Forum USA
Bitcoin Investment Forum USABitcoin Investment Forum USA
Bitcoin Investment Forum USA
 
Vundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityVundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With Sanity
 
Bitcoin Community Forums USA
Bitcoin Community Forums USABitcoin Community Forums USA
Bitcoin Community Forums USA
 
Tracker
TrackerTracker
Tracker
 
Bitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaBitcoin Mining Forum Australia
Bitcoin Mining Forum Australia
 

Andere mochten auch

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyShivashish Kumar
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptographyishmecse13
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSAJohn Paul Prassanna
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardMohamed Loey
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101Joshua Thijssen
 

Andere mochten auch (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Cryptography
CryptographyCryptography
Cryptography
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptography
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSA
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Ch09
Ch09Ch09
Ch09
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 

Ähnlich wie Public Key Cryptography

OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with pythonJose Manuel Ortega Candel
 
MNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsAPNIC
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project MNCERT
 
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...APNIC
 
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Frédéric Harper
 
GOTO Paris | @see Gopher
GOTO Paris | @see GopherGOTO Paris | @see Gopher
GOTO Paris | @see GopherJan Klat
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxnull - The Open Security Community
 
When a robot is smart enough?
When a robot is smart enough?When a robot is smart enough?
When a robot is smart enough?Tomáš Jukin
 
38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet 38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet APNIC
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Stéphane M. Grueso
 
Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08sung young son
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataAPNIC
 
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeSecurity of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeDeep Datta
 
Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Deep Datta
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksGreg Foss
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensionsZoltan Balazs
 
WebRTC: A front-end perspective
WebRTC: A front-end perspectiveWebRTC: A front-end perspective
WebRTC: A front-end perspectiveshwetank
 

Ähnlich wie Public Key Cryptography (20)

OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with python
 
MNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
 
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
 
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
 
GOTO Paris | @see Gopher
GOTO Paris | @see GopherGOTO Paris | @see Gopher
GOTO Paris | @see Gopher
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
 
Preso fcul
Preso fculPreso fcul
Preso fcul
 
When a robot is smart enough?
When a robot is smart enough?When a robot is smart enough?
When a robot is smart enough?
 
38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet 38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)
 
Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
 
Encode polkadot club
Encode polkadot club  Encode polkadot club
Encode polkadot club
 
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeSecurity of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
 
Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
儲かるドキュメント
儲かるドキュメント儲かるドキュメント
儲かるドキュメント
 
WebRTC: A front-end perspective
WebRTC: A front-end perspectiveWebRTC: A front-end perspective
WebRTC: A front-end perspective
 

Mehr von Israel Herraiz

intensive metrics software evolution
intensive metrics software evolutionintensive metrics software evolution
intensive metrics software evolutionIsrael Herraiz
 
Statistical Distribution of Metrics
Statistical Distribution of MetricsStatistical Distribution of Metrics
Statistical Distribution of MetricsIsrael Herraiz
 
¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPMIsrael Herraiz
 
The Ultimate Debian Database
The Ultimate Debian DatabaseThe Ultimate Debian Database
The Ultimate Debian DatabaseIsrael Herraiz
 
Evaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsEvaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsIsrael Herraiz
 
Software size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costSoftware size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costIsrael Herraiz
 
The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011Israel Herraiz
 
Mining Software Repositories
Mining Software RepositoriesMining Software Repositories
Mining Software RepositoriesIsrael Herraiz
 

Mehr von Israel Herraiz (8)

intensive metrics software evolution
intensive metrics software evolutionintensive metrics software evolution
intensive metrics software evolution
 
Statistical Distribution of Metrics
Statistical Distribution of MetricsStatistical Distribution of Metrics
Statistical Distribution of Metrics
 
¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM
 
The Ultimate Debian Database
The Ultimate Debian DatabaseThe Ultimate Debian Database
The Ultimate Debian Database
 
Evaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsEvaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasets
 
Software size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costSoftware size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software cost
 
The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011
 
Mining Software Repositories
Mining Software RepositoriesMining Software Repositories
Mining Software Repositories
 

Kürzlich hochgeladen

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Public Key Cryptography

  • 1. Public key cryptography: a practical approach Israel Herraiz <isra@herraiz.org> <israel.herraiz@upm.es> KeyID FE0A7AF3 Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF3 Slides and additional info at http://mat.caminos.upm.es/~iht/pkc/ 1 http://herraiz.org
  • 2. Privacy in electronic communicatios Can we ensure privacy in electronic communications? 2 http://herraiz.org
  • 3. Reaching Google 1 10.8.0.1 (10.8.0.1) 2 192.168.1.1 (192.168.1.1) 3 62.81.125.179.static.user.ono.com (62.81.125.179) 4 10.115.49.217 (10.115.49.217) 5 10.127.151.49 (10.127.151.49) 6 10.127.10.137 (10.127.10.137) 7 10.127.10.133 (10.127.10.133) 8 10.127.3.82 (10.127.3.82) 9 213.242.71.21 (213.242.71.21) 10 ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42) 11 ae-45-45.ebr1.London1.Level3.net (4.69.143.101) 12 ae-1-51.edge3.London1.Level3.net (4.69.139.73) 13 unknown.Level3.net (212.113.15.186) 14 209.85.255.78 (209.85.255.78) 15 66.249.95.173 (66.249.95.173) 16 216.239.49.45 (216.239.49.45) 17 * * * 18 ww-in-f147.1e100.net (209.85.229.147) 3 http://herraiz.org
  • 4. Reaching Google 1 10.8.0.1 (10.8.0.1) 2 192.168.1.1 (192.168.1.1) Getafe 3 62.81.125.179.static.user.ono.com (62.81.125.179) 4 10.115.49.217 (10.115.49.217) 5 10.127.151.49 (10.127.151.49) Barcelona 6 10.127.10.137 (10.127.10.137) 7 10.127.10.133 (10.127.10.133) 8 10.127.3.82 (10.127.3.82) 9 213.242.71.21 (213.242.71.21) Minneapolis 10 ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42) Paris 11 ae-45-45.ebr1.London1.Level3.net (4.69.143.101) 12 ae-1-51.edge3.London1.Level3.net (4.69.139.73) London 13 unknown.Level3.net (212.113.15.186) 14 209.85.255.78 (209.85.255.78) Atlanta 15 66.249.95.173 (66.249.95.173) New York 16 216.239.49.45 (216.239.49.45) Los Angeles 17 * * * 18 ww-in-f147.1e100.net (209.85.229.147) Atlanta 4 http://herraiz.org
  • 5. Hops while attempting to reach Google 5 http://herraiz.org
  • 6. Is it that bad? What kind of private Information can be captured? 6 http://herraiz.org
  • 7. Non-cyphered information ● Geolocalization ● Using your IP address ● Web browser and operating system ● Any info written in a form ● Including passwords ● Cookies ● Have a look and take care – http://www.youtube.com/watch?v=yyLdxO6xvh8 – http://www.youtube.com/watch?v=1FgKL2ywrX0 7 http://herraiz.org
  • 8. Is it important? ● Strong PK crypto illegal in France up to 2004 ● PK implementations in software considered weapons in the US ● Software export restrictions in EU and US http://en.wikipedia.org/wiki/Cryptography_law http://en.wikipedia.org/wiki/Key_disclosure_law http://en.wikipedia.org/wiki/Phil_Zimmermann http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States#History 8 http://herraiz.org
  • 9. Solution Enforce cyphering using public key cryptography 9 http://herraiz.org
  • 10. Cryptography ● Traditionally, cyphering was done using a password and an algorithm ● Symmetric approach ● Password shared by both peers ● Public key cryptography ● Insecure channel ● Private and secure communication without any previous physical contact 10 http://herraiz.org
  • 11. Public key cryptography (PKP) Pub Pri Pub Pri 11 http://herraiz.org
  • 12. Public key cryptography Pub Pri Pub Pri Keyserver Pub Pub 12 http://herraiz.org
  • 13. Criptografía de clave pública Hi there! Pub Pri Pub Pri Keyserver Pub Pub 13 http://herraiz.org
  • 14. Public key cryptography Pub 0F231A5 Pub Pri Pub Pri Keyserver Pub Pub 14 http://herraiz.org
  • 15. Public key cryptography Pub 0F231A5 Pub Pri Pub Pri Keyserver Pub Pub 15 http://herraiz.org
  • 16. Public key cryptography Hi there! Pub Pri Pub Pri Keyserver Pub Pub 16 http://herraiz.org
  • 17. How does it work? ● PKP Algorithms ● Prime number factorization ● From a mathematical point of view, all messages can be decrypted ● From a computational point of view, decrypting a message without the private key takes too long – Key length is a crucial property 17 http://herraiz.org
  • 18. Public key sample -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.19 (GNU/Linux) JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8 bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3 5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t 2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv -----END PGP PUBLIC KEY BLOCK----- 18 http://herraiz.org
  • 19. Private key sample -----BEGIN PGP PRIVATE KEY BLOCK----- Version: GnuPG v2.0.19 (GNU/Linux) mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8 VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t 2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3 5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa -----END PGP PRIVATE KEY BLOCK----- 19 http://herraiz.org
  • 20. Keyservers ● Internet hosts that contain public keys ● Federated services ● All servers contain all the public keys in the world ● Public keyserver in Spain thanks to RedIRIS ● URL: pgp.rediris.es 20 http://herraiz.org
  • 21. Message signing Hi there! Pub Pri Pub Pri Keyserver Pub Pub 21 http://herraiz.org
  • 22. Message signing Created with the private key Hi there! Pub Pri Pub Pri Keyserver Pub Pub 22 http://herraiz.org
  • 23. Message signing Hi there! Pub Pri Pub Pri Keyserver Pub Pub 23 http://herraiz.org
  • 24. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 24 http://herraiz.org
  • 25. Signing and encrypting Pub FAD43A Pub Pri Pub Pri Keyserver Pub Pub 25 http://herraiz.org
  • 26. Signing and encrypting Pub FAD43A Pub Pri Pub Pri Keyserver Pub Pub 26 http://herraiz.org
  • 27. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 27 http://herraiz.org
  • 28. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 28 http://herraiz.org
  • 29. Identity certification How do you know that public keys belong to their legitimate owners? Public key Can we ensure that the Barack Obama key does belong to Barack Obama? 29 http://herraiz.org
  • 30. Identity certification Certificate Authorities Trust chain 30 http://herraiz.org
  • 31. Public key signing ● Public keys are plain text documents that can be cryptographically signed ● Mutual public signing adds identity certification to PKP schemes 31 http://herraiz.org
  • 32. Public key signing Barack Obama Pub Pri Pub Pri Keyserver Pub Pub 32 http://herraiz.org
  • 33. Public key signing Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 33 http://herraiz.org
  • 34. Public key signing Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 34 http://herraiz.org
  • 35. Public key signing Show me your passport Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 35 http://herraiz.org
  • 36. Public key signing Show me your passport Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint Passport D0DA E915 BFDD E5CD 8BA0 Barack B159 7E97 2ACB FE0A 7AF2 Obama Pub Pri Pub Pri Keyserver Pub Pub 36 http://herraiz.org
  • 37. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Download key FE0A7AF2 Pub Pri Keyserver Pub Pub 37 http://herraiz.org
  • 38. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Keyserver Pub Pub 38 http://herraiz.org
  • 39. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Keyserver Pub Pub 39 http://herraiz.org
  • 40. Public key signing Barack Obama Key signing is often mutual Pub Pri Pub Pri Keyserver Pub Pub 40 http://herraiz.org
  • 41. Public key signing Barack Obama Trust chain Pub Pub Is he Barack Pub Obama? 41 http://herraiz.org
  • 42. Signing party 42 http://herraiz.org
  • 43. Take away PK Cryptog. Each user creates Secure comms. a public-private through key pair insec. channels Trust chain Keyservers Identity cert. contain every through key in the world public key signing 43 http://herraiz.org