Week 4 & 5 Cryptography
Week 4 & 5 Cryptography
• Overview of PGP:
o PGP is an encryption program that provides cryptographic privacy and
authentication for data communication. It is widely used for securing email
communications, file storage, and other data transfers.
o Developed by Phil Zimmermann in 1991, PGP uses both symmetric (private
key) and asymmetric (public key) encryption methods. It combines these to
provide confidentiality, authentication, and data integrity.
• How PGP Works:
o Symmetric Encryption: PGP encrypts the message using a symmetric
encryption algorithm (e.g., AES). The message is encrypted with a secret key,
which is fast and efficient.
o Asymmetric Encryption: After encrypting the message with a symmetric key,
the symmetric key itself is then encrypted with the recipient's public key using
asymmetric encryption (e.g., RSA). This ensures that only the recipient can
decrypt the symmetric key with their private key.
o The recipient can then use the symmetric key to decrypt the actual message
content.
• PGP's Key Features:
o Public Key Infrastructure (PKI): Users have public and private key pairs.
Public keys are shared openly, while private keys are kept secret.
o Message Integrity and Digital Signatures: PGP allows users to digitally sign
messages with their private key, ensuring the authenticity of the message and
proving that it hasn’t been altered during transit.
o Web of Trust: Unlike centralized systems like SSL certificates, PGP uses a
decentralized approach where users verify each other's public keys, forming a
“web of trust.”
• Advantages:
o Strong encryption and widely used for securing email and files.
o Provides both confidentiality and message integrity.
o Highly flexible and can be used with various email clients and systems.
• Disadvantages:
o PGP can be complex for users to understand and implement effectively.
o Key management can be cumbersome for individuals with many keys.
• Overview of S/MIME:
o S/MIME is a protocol for securing email communications. It is an enhancement
to the MIME (Multipurpose Internet Mail Extensions) standard, which allows
email attachments like images and audio files.
o S/MIME provides cryptographic services such as encryption, digital
signatures, and message integrity, ensuring that emails are secure and
trustworthy.
• How S/MIME Works:
o S/MIME uses asymmetric encryption (public and private key pairs) to encrypt
email content and digital signatures for authentication. The sender encrypts the
email content using the recipient's public key, and the recipient can decrypt it
using their private key.
o The sender can also digitally sign the email using their private key, and the
recipient can verify the authenticity of the sender's identity by using the sender’s
public key.
• S/MIME Key Features:
o Digital Signatures: S/MIME guarantees that the email message has not been
altered and confirms the identity of the sender.
o End-to-End Encryption: Provides confidentiality by encrypting the email
contents, ensuring that only the recipient can decrypt and read the message.
o Certificate Authorities (CAs): S/MIME certificates are issued by trusted third-
party CAs, which help validate the authenticity of the sender’s public key.
• Advantages:
o Provides a high level of security for email communications.
o Supported by many major email clients (e.g., Microsoft Outlook, Apple Mail).
• Disadvantages:
o Requires infrastructure support and certificates from trusted CAs.
o Managing and maintaining certificates can be complex.
• Overview of SET:
o SET is a cryptographic protocol designed to secure online payment
transactions, primarily used for credit card transactions over the internet. It was
developed by Visa and MasterCard in the late 1990s as a way to combat fraud
in online payments.
o SET was aimed at providing a secure method for transmitting payment
information, including credit card details, between buyers, merchants, and
financial institutions.
• How SET Works:
o SET uses public key cryptography to ensure the confidentiality and integrity
of payment transactions. It involves several steps:
▪ Encryption of Payment Information: The buyer's credit card
information is encrypted using the merchant’s public key to ensure that
only the merchant can decrypt and view the information.
▪ Digital Signatures: Both the buyer and merchant sign their messages
digitally to prove the authenticity of the transaction.
▪ Secure Payment Processing: A trusted third party (usually a bank or
financial institution) verifies the transaction’s legitimacy and ensures
that the payment is legitimate.
• Key Features of SET:
o Confidentiality: Protects sensitive information, such as credit card details, by
using strong encryption methods.
o Authentication: Verifies the identity of both the buyer and the merchant to
ensure the legitimacy of the transaction.
o Non-repudiation: Prevents either party from denying the transaction once it
has been completed.
• Advantages:
o Strong security for online credit card transactions.
o Provides confidentiality and authentication, reducing the risk of fraud.
• Disadvantages:
o Complex and difficult to implement, which led to limited adoption.
o SET has been largely replaced by other payment protocols like 3D Secure and
SSL/TLS for securing online transactions.
Cryptography plays a pivotal role in both authentication (verifying the identity of users and
systems) and privacy (ensuring that data remains confidential and is not exposed to
unauthorized parties). The integration of cryptographic techniques into authentication systems
and privacy mechanisms ensures secure communication and safe data exchanges.
Authentication is the process of verifying the identity of a user, device, or system before
granting access to resources. Cryptographic techniques such as digital signatures, hash
functions, and public key infrastructure (PKI) are used extensively in authentication
systems.
Privacy involves ensuring that sensitive data is protected and only accessible to authorized
parties. Cryptography helps preserve privacy by encrypting data and ensuring that unauthorized
individuals cannot read or tamper with it.
Conclusion