DOC PREVIEW
UT CS 361 - Lecture 66: PGP

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Foundations of Computer SecurityLecture 66: PGPDr. Bill YoungDepartment of Computer SciencesUniversity of Texas at AustinLecture 66: 1 PGPPretty Good PrivacyVarious crypto algorithms and products provide strong encryption,but are not particularly easy to use.Phil Zimmermann had the goal of providing strong encryption toeveryone, in the form of an email encryption system that is:extremely strong, using state of the art cryptographicalgorithms;easy to use and accessible to all.PGP is “the closest you’re likely to get to military-gradeencryption.” –Bruce Schneier, Applied CryptographyLecture 66: 2 PGPZimmermann’s MotivationZimmermann had a strong distrust of the government, andbelieved strongly that everyone had an absolute right to privacy.The government generally believes that the right to privacy islimited by the need of the government to read messages undercertain circumstances. Historically, the government restrictedaccess to strong encryption.PGP is a “end-run” around government restrictions, and almostlanded Zimmermann in jail.Lecture 66: 3 PGPDid Zimmermann Succeed?From Wikipedia page on PGP:In 2003, an incident involving seized Psion PDAsbelonging to members of the Red Brigade indicated thatneither the Italian police nor the FBI were able to decodePGP-encrypted files stored on them.A more recent incident in December 2006 (see UnitedStates v. Boucher) involving US customs agents and aseized laptop PC which allegedly contained childpornography indicates that US Government agencies findit “nearly impossible” to access PGP-encrypted files.Lecture 66: 4 PGPPGPZimmermann developed PGP (Pretty Good Privacy) in the late1980’s and early 1990’s. Some characteristics include:1Uses the best available cryptographic algorithms as buildingblocks.2Integrates these into a general-purpose algorithm that isprocessor-independent and easy to use.3Package and documentation, including source code, are freelyavailable on-line.4PGP is now provided by Viacrypt in a compatible, low-costcommercial version.Why would anyone buy this software from Viacrypt when it’savailable free?Lecture 66: 5 PGPGrowth of PGPPGP has grown explosively and is widely used.1Available free worldwide for Windows, UNIX, Macintosh, andothers. The commercial version satisfies businesses needingvendor support.2Based on algorithms with extensive public review.Public key encryption: RSA, DSS, Diffie-Hellman.Symmetric encryption: CAST-128, IDEA, and 3DES.Hash coding: SHA-1.3Wide applicability: standardized scheme for encryption,supports secure communication over Internet and othernetworks.4Not developed by or controlled by any government.5Now on track to become an Internet standard (RFC 3156).Lecture 66: 6 PGPLessonsPGP illustrates that strong encryption can be packagedconveniently and accessible to everyone.PGP is very widely used and extremely secure.Next lecture: PGP ServicesLecture 66: 7


View Full Document

UT CS 361 - Lecture 66: PGP

Documents in this Course
Load more
Download Lecture 66: PGP
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture 66: PGP and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture 66: PGP 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?