- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
E-mail SecurityPGP and SMIME.ppt
E-mail Security:PGP and S/MIME Outline PGP services message format key management trust management S/MIME services message formats key management What is PGP? PGP - Pretty Good Privacy general purpose application to protect (encrypt and/or sign) files can be used to protect e-mail messages can be used by corporations as well as individuals based on strong cryptographic algorithms (IDEA, RSA, SHA-1) available free of charge at first version developed by Phil Zimmermann PGP is now on an Internet standards track (RFC 3156) PGP services messages authentication confidentiality compression e-mail compatibility segmentation and reassembly key management generation, distribution, and revocation of public/private keys generation and transport of session keys and IVs Message authentication based on digital signatures supported algorithms: RSA/SHA and DSS/SHA Message confidentiality symmetric key encryption in CFB mode with a random session key and IV session key and IV is encrypted with the public key of the receiver supported algorithms: symmetric: CAST, IDEA, 3DES asymmetric: RSA, ElGamal Compression applied after the signature enough to store clear message and signature for later verification it would be possible to dynamically compress messages before signature verification, but … then all PGP implementations should use the same compression algorithm however, different PGP versions use slightly different compression algorithms applied before encryption compression reduces redundancy ? makes cryptanalysis harder supported algorithm: ZIP E-mail compatibility encrypted messages and signatures may contain arbitrary octets most e-mail systems support only ASCII characters PGP converts an arbitrary binary stream into a stream of printable ASCII characters radix 64 conversion: 3 8-bit blocks ? 4 6-bit blocks Combining services PGP message format Key IDs a user may have several public key – private key pairs which private key to use to decrypt the session key? which publi
您可能关注的文档
- §1.2集合的运算.ppt
- §7-3 周转轮系传动比计算.ppt
- (a.k.a. Phase I trials).ppt
- 1.1.1 正弦定理的推导.ppt
- 1.3人口分布与 人口合理容量.ppt
- 1.什么叫旋转对称图形?.ppt
- 1.我的背景 ?.ppt
- 1.苹果为什么下落?.ppt
- 100 GbE Network implementations, challenges and testing.ppt
- 13C-NMR, 2D-NMR, and MRI.ppt
- E-Resource Use and the Role of the University Library.ppt
- ECG 与CAG不一致的急诊PCI —谁是“罪犯”血管?.ppt
- ECOLOGY chapter 50.ppt
- Education and “Human Capital”.ppt
- EE 369Power Systems Engineering.ppt
- Efficient Concurrent Mark-Sweep Cycle Collection.ppt
- Elastomeric Materials.ppt
- Electric Motors.ppt
- Electric Vehicles.PPT
- ELECTRONIC WARFARE.ppt
文档评论(0)