(Pretty Good Privacy) : Presented By: Sakshi Sharad Kulkarni (1906070) Janhavi Vijay Mali (1906083)
(Pretty Good Privacy) : Presented By: Sakshi Sharad Kulkarni (1906070) Janhavi Vijay Mali (1906083)
Symmetric Key
Compressed Message
Using Receiver’s
Public key Encrypted o/p
Digital Envelope
Encrypted Symmetric Key
PGP Algorithms
Algorithm ID Description
Public key 1 RSA (encryption or signing)
2 RSA (for encryption only)
3 RSA (for signing only)
17 DSS (for signing)
Hash Algorithm 1 MD5
2 SHA-l
3 RIPE-MD
Encryption 0 No Encryption
1 IDEA
2 Triple DES
9 AES
PGP Keyrings
• In the previous scenarios, we assumed that Alice needed to send a message to only Bob.
That is not always the case. Alice may need to send messages to many people.
• In this case, Alice needs a key ring of public keys, with a key belonging to each person with
whom Alice needs to correspond (send or receive messages).
• Each user needs to have two sets of rings: a ring of private/public keys and a ring of public
keys of other people.
• Each person in the ring can keep more than one public key for each other person.
Two cases may arise.
1. Alice needs to send a message to one of the persons in the community.
a. She uses her private key to sign the digest.
b. She uses the receiver's public key to encrypt a newly created session key.
c. She encrypts the message and signs the digest with the session key created.
• To trust the owner of the public key, each user in the PGP group needs to
have, implicitly or explicitly, a copy of the certificate of the public-key owner.
• Although the certificate can come from a certificate authority (CA), this
restriction is not required in PGP. PGP has its own certificate system
• In PGP, there is no need for CAs; anyone in the ring can sign a certificate for
anyone else in the ring
• There is no hierarchy of trust in PGP; there is no tree.
• There can be multiple paths in the line of trust from a fully or partially trusted
authority to a certificate.
Trusts and Legitimacy
• The entire operation of PGP is based on introducer trust, the certificate trust, and the legitimacy of the
public keys.
• PGP allows different levels of trust.
• for simplicity, let us assign three levels of trust to any introducer: none, partial, and full.
• The introducer trust level specifies the trust levels issued by the introducer for other people in the ring.
• The certificate trust level is normally the same as the introducer trust level that issued the certificate.
• There is no mechanism in PGP to determine how to make a decision about the trustworthiness of the
introducer; it is up to the user to make this decision.
Key Legitimacy
The purpose of using introducer and certificate trusts is to determine the legitimacy of a public key.
The level of the key legitimacy for a user is the weighted trust level of that user.
we assign the following weights to certificate trust levels:
1. A weight of 0 to a nontrusted certificate
2. A weight of to a certificate with partial trust
3. A weight of 1 to a certificate with full trust
Web of Trust
• If each entity introduces more entities to other entities, the public-key ring for
each entity gets larger and larger and entities in the ring can send secure e-mail to
one another.
Key Revocation
• It may become necessary for an entity to revoke his or her public key from the ring.
• This may happen if the owner of the key feels that the key is compromised
• To revoke a key, the owner can send a revocation certificate signed by himself The
revocation certificate must be signed by the old key and disseminated to all the
people in the ring who use that public key.