Pretty Good Privacy (PGP) encryption technology
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
12-09-2009, 03:14 PM


Pretty Good Privacy (PGP) is a computer program that provides cryptographic privacy and authentication. PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications. It was originally created by Philip Zimmermann in 1991.

PGP and other similar products follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data
a public key encryption program originally written by Phil Zimmermann in 1991. Over the past few years, PGP has got thousands of adherent supporters all over the globe and has become a de-facto standard for encryption of email on the Internet


How PGP encryption works

PGP encryption uses public-key cryptography and includes a system which binds the public keys to a user name and/or an e-mail address. The first version of this system was generally known as a web of trust to contrast with the X.509 system which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Current versions of PGP encryption include both options through an automated key management server.

Digital signatures

PGP supports message authentication and integrity checking. The latter is used to detect whether a message has been altered since it was completed (the message integrity property), and the former to determine whether it was actually sent by the person/entity claimed to be the sender (a digital signature). In PGP, these are used by default in conjunction with encryption, but can be applied to plaintext as well. The sender uses PGP to create a digital signature for the message with either the RSA or DSA signature algorithms. To do so, PGP computes a hash (also called a message digest) from the plaintext, and then creates the digital signature from that hash using the sender's private keys.

Web of trust
Main article: Web of trust

Both when encrypting messages and when verifying signatures, it is critical that the public key one used to send messages to someone or some entity actually does 'belong' to the intended recipient. Simply downloading a public key from somewhere is not overwhelming assurance of that association; deliberate (or accidental) spoofing is possible. PGP has, from its first versions, always included provisions for distributing a user's public keys in an 'identity certificate' which is so constructed cryptographically that any tampering (or accidental garble) is readily detectable. But merely making a certificate which is impossible to modify without being detected effectively is also insufficient. It can prevent corruption only after the certificate has been created, not before. Users must also ensure by some means that the public key in a certificate actually does belong to the person/entity claiming it. From its first release, PGP products have included an internal certificate 'vetting scheme' to assist with this; a trust model which has been called a web of trust. A given public key (or more specifically, information binding a user name to a key) may be digitally signed by a third party user to attest to the association between someone (actually a user name) and the key. There are several levels of confidence which can be included in such signatures. Although many programs read and write this information, few (if any) include this level of certification when calculating whether to trust a key.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
gnaneshwar
Active In SP
**

Posts: 3
Joined: Feb 2010
#2
11-03-2010, 11:38 PM

i want total report for PGP
Reply
seminars on demand
Active In SP
**

Posts: 201
Joined: Jun 2010
#3
29-06-2010, 05:55 PM

The businesses around the world are out to seek new operational models, diversify globally, and develop closer relationships up and down the value chain. The IT organizations are trying to secure systems and communications to protect brand equity and the obligations for compliance . The PGP encryption platform allows them to manage multiple encryption applications cost-effectively thereby saving the precious human resources and capital which can be channelised for additional project and implimentations.
In large organisations, the business-critical data can be moved easily and with little impact on existing systems by using the PGP .The sensitive information stored on servers and backup media can also be protected using the PGP.

A Standard Solution Approach
a multitude of file encryption solutions is offered by the security makers because it protects the data in more circumstances.It must satisfy the following requirements:
-Support standards-based encryption and file format
-Easily integrate with existing processes
-Support a broad set of platforms
-Provide advanced key management

PGP Command Line

It fulfills all four of the requirements and can be made flexible. batch processing, network transfer, and backup applications all can benefit from this.
for more details, refer these pdf:


.pdf   PGP-Encryption-Platform.pdf (Size: 632.61 KB / Downloads: 831)

.pdf   PGP command line technology.pdf (Size: 1.04 MB / Downloads: 720)

visit this link too:
pgpinsight/white_papers/index.html#encryptionplatform
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#4
30-03-2011, 11:28 AM


Presented by
Netiva Caftori


.ppt   PGP.PPT (Size: 155 KB / Downloads: 234)
a digital data encryption program
A word about PGP one of the strongest encryption tools available
Encryption is the process whereby codes are used to attempt to conceal the meaning of a message
Cryptography is the science of writing messages in secret codes . It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone
to promote awareness of the privacy issue in a digital age
Where did PGP come from and how does it work?
PGP is the culmination of a long history of cryptographic discoveries.
PGP uses public and private Key encryption
you'll share your Public Key with anyone you wish
Your Public Key is used to encrypt a message
you'll guard your Private Key secret
The Private Key is used to decrypt data that have been encrypted using your Public Key.
Public and Private Key encryption
the message encrypted using your Public Key can only be decrypted by you, the owner of the corresponding Private Key
encryption solves 1of 2 major problems with older methods, namely that you had to somehow share the key with anyone you wanted to be able to read (decrypt) your secret message
The second major problem with older methods
Unlike earlier encryption methods, the security of PGP encryption lies entirely with the key.
It is PGP's selection of the complex keys used to do an encryption that makes it next to impossible to crack.
Key attributes of Secret key vs. Public key
Thousands years use
DES
Fast
Keys shared between usually only 2 people
128 bit
No non-repudiation (need 3rd party as witness)
Less than 50 years
RSA
Slow
Private: concealed
Public: widely shared
1,024
Nonrepudiation: Can’t deny having sent a message
Vocabulary, definitions, and acronyms
Symmetric encryption
Asymmetric encryption
Plaintext
Cyphertext
Cryptanalyst
Fi(n)=# positive integers <n relatively prime to n
DES=Data Encryption Standard
NSA=National Security Agency
Authentication
Man-in-the-middle
Trapdoors
Key escrow
Brute force attack
Public key encryption systems
1976: Diffie and Hellman
Merkle-Hellman Knapsacks
1978: Rivest-Shamir-Adelman (RSA)
1984: El gamal and digital signature
Hash algorithm
RSA Encryption
operates with arithmetic mod n
e=encryption key; d=decryption key
P=plaintext---> Pe mod n =cyphertext
(Pe)d mod n = P recovered plaintext
Encryption and decryption are mutual inverses and commutative
Select large n=pq p & q prime
Choose e relatively prime to (p-1)(q-1)
Select d so e*d=1 mod (p-1)(q-1)
Or e*d=1 mod fi(n) as fi(p)=p-1 for p prime
Euler-Fermat: x**fi(n)=1mod n for all x relatively prime to n
Simple knapsack example
Public key cryptography is based on multiplicative inverses
Suppose message to encrypt is ABC
Translate to 23+69+14=106
106 is sent
Since 23*22=1 mod 101 the recipient will multiply 106x22=2332=9 mod 101
And infer that the message is ABC since 9=1+3+5
An interceptor will spend a long time figuring it out.
RSA vs. Knapsack
An error was discovered in the knapsack encryption by Shamir (from RSA), and is no longer used.
Modular inverse pairs are more used in RSA than in Knapsack.
RSA is the most widely used public key cryptographic system.
It bases its security on the difficulty of performing inverse calculations.
PGP is a remarkable phenomenon that provides confidentiality, authentication, and compression for email and data storage.
Its building blocks are made of the best available cryptographic algorithms: RSA, DSS, Diffie-Hellman.
It is independent of operating system and processor.
It has a small set of easy-to-use commands
Conclusions
Because PGP is freely available via the Internet, and has a fully compatible low-cost commercial version it is now widely used.
It has a wide range of applicability from corporations to individuals who wish to communicate worldwide securely over the Internet and other networks.
It is not controlled by any government which makes it attractive to many.
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#5
14-02-2012, 02:13 PM


to get information about the topic pgp full report ,ppt and related topic refer the link bellow
topicideashow-to-pretty-good-privacy-pgp

topicideashow-to-pretty-good-privacy-pgp-encryption-technology

topicideashow-to-pretty-good-privacy-pgp-encryption-technology?pid=42583#pid42583


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  BRAIN GATE TECHNOLOGY ABSTRACT project girl 1 491 01-04-2016, 11:20 AM
Last Post: mkaasees
  latest seminar topics for information technology jaseelati 0 360 23-02-2015, 03:17 PM
Last Post: jaseelati
  seminar topics for information technology with ppt jaseelati 0 316 21-02-2015, 04:16 PM
Last Post: jaseelati
  information technology seminar topics jaseelati 0 316 07-02-2015, 12:58 PM
Last Post: jaseelati
  bicmos technology seminar report jaseelati 0 321 09-01-2015, 02:58 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 405 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 327 30-12-2014, 03:23 PM
Last Post: jaseelati
  embedded web technology ppt jaseelati 0 498 16-12-2014, 04:34 PM
Last Post: jaseelati
  6g technology ppt jaseelati 0 304 16-12-2014, 02:17 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,299 13-09-2014, 02:35 PM
Last Post: Radhika.m