SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
Public key cryptography: a practical
                  approach

                             Israel Herraiz
                           <isra@herraiz.org>
                        <israel.herraiz@upm.es>

                            KeyID FE0A7AF3

                               Fingerprint
           D0DA E915 BFDD E5CD 8BA0     B159 7E97 2ACB FE0A 7AF3

                          Slides and additional info at
                     http://mat.caminos.upm.es/~iht/pkc/


                                                                   1

http://herraiz.org
Privacy in electronic communicatios



                        Can we ensure
                     privacy in electronic
                      communications?




                                             2

http://herraiz.org
Reaching Google
              1      10.8.0.1 (10.8.0.1)
              2      192.168.1.1 (192.168.1.1)
              3      62.81.125.179.static.user.ono.com (62.81.125.179)
              4      10.115.49.217 (10.115.49.217)
              5      10.127.151.49 (10.127.151.49)
              6      10.127.10.137 (10.127.10.137)
              7      10.127.10.133 (10.127.10.133)
              8      10.127.3.82 (10.127.3.82)
              9      213.242.71.21 (213.242.71.21)
             10      ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42)
             11      ae-45-45.ebr1.London1.Level3.net (4.69.143.101)
             12      ae-1-51.edge3.London1.Level3.net (4.69.139.73)
             13      unknown.Level3.net (212.113.15.186)
             14      209.85.255.78 (209.85.255.78)
             15      66.249.95.173 (66.249.95.173)
             16      216.239.49.45 (216.239.49.45)
             17      * * *
             18      ww-in-f147.1e100.net (209.85.229.147)


                                                                         3

http://herraiz.org
Reaching Google
              1      10.8.0.1 (10.8.0.1)
              2      192.168.1.1 (192.168.1.1) Getafe
              3      62.81.125.179.static.user.ono.com (62.81.125.179)
              4      10.115.49.217 (10.115.49.217)
              5      10.127.151.49 (10.127.151.49)     Barcelona
              6      10.127.10.137 (10.127.10.137)
              7      10.127.10.133 (10.127.10.133)
              8      10.127.3.82 (10.127.3.82)
              9      213.242.71.21 (213.242.71.21)   Minneapolis
             10      ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42)   Paris
             11      ae-45-45.ebr1.London1.Level3.net (4.69.143.101)
             12      ae-1-51.edge3.London1.Level3.net (4.69.139.73)
                                                                   London
             13      unknown.Level3.net (212.113.15.186)
             14      209.85.255.78 (209.85.255.78) Atlanta
             15      66.249.95.173 (66.249.95.173) New York
             16      216.239.49.45 (216.239.49.45) Los Angeles
             17      * * *
             18      ww-in-f147.1e100.net (209.85.229.147) Atlanta


                                                                            4

http://herraiz.org
Hops while attempting to reach
                     Google




                                           5

http://herraiz.org
Is it that bad?



                     What kind of private
                     Information can be
                          captured?




                                            6

http://herraiz.org
Non-cyphered information
    ●   Geolocalization
        ●   Using your IP address
    ●   Web browser and operating system
    ●   Any info written in a form
        ●   Including passwords
    ●   Cookies
        ●   Have a look and take care
             –   http://www.youtube.com/watch?v=yyLdxO6xvh8
             –   http://www.youtube.com/watch?v=1FgKL2ywrX0
                                                              7

http://herraiz.org
Is it important?
                                                      ●   Strong PK crypto illegal
                                                          in France up to 2004
                                                      ●   PK implementations in
                                                          software considered
                                                          weapons in the US
                                                      ●   Software export
                                                          restrictions in EU and US
                                                       http://en.wikipedia.org/wiki/Cryptography_law
                                                       http://en.wikipedia.org/wiki/Key_disclosure_law



    http://en.wikipedia.org/wiki/Phil_Zimmermann

        http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States#History             8

http://herraiz.org
Solution

                     Enforce cyphering
                      using public key
                       cryptography


                                         9

http://herraiz.org
Cryptography
    ●   Traditionally, cyphering was done using a
        password and an algorithm
    ●   Symmetric approach
        ●   Password shared by both peers
    ●   Public key cryptography
        ●   Insecure channel
        ●   Private and secure communication without any
            previous physical contact


                                                           10

http://herraiz.org
Public key cryptography (PKP)




        Pub      Pri            Pub   Pri




                                            11

http://herraiz.org
Public key cryptography




        Pub      Pri                         Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                         12

http://herraiz.org
Criptografía de clave pública


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             13

http://herraiz.org
Public key cryptography

                       Pub

                       0F231A5




        Pub      Pri                           Pub   Pri



                             Keyserver


                                   Pub   Pub
                                                           14

http://herraiz.org
Public key cryptography

                                         Pub

                                         0F231A5




        Pub      Pri                           Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                           15

http://herraiz.org
Public key cryptography


                                         Hi there!




        Pub      Pri                             Pub   Pri



                           Keyserver


                                 Pub   Pub
                                                             16

http://herraiz.org
How does it work?
    ●   PKP Algorithms
        ●   Prime number factorization
    ●   From a mathematical point of view, all
        messages can be decrypted
    ●   From a computational point of view, decrypting
        a message without the private key takes too
        long
             –   Key length is a crucial property


                                                     17

http://herraiz.org
Public key sample
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.19 (GNU/Linux)

JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8
bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3
5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na
K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa
mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv
VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t
2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv

-----END PGP PUBLIC KEY BLOCK-----




                                                            18

http://herraiz.org
Private key sample
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2.0.19 (GNU/Linux)

mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv
JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8
VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t
2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv
bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3
5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na
K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa

-----END PGP PRIVATE KEY BLOCK-----




                                                            19

http://herraiz.org
Keyservers
    ●   Internet hosts that contain public keys
    ●   Federated services
        ●   All servers contain all the public keys in the world
    ●   Public keyserver in Spain thanks to RedIRIS
        ●   URL: pgp.rediris.es




                                                                   20

http://herraiz.org
Message signing


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             21

http://herraiz.org
Message signing
                                       Created with the
                                         private key

                       Hi there!




        Pub      Pri                                      Pub   Pri



                               Keyserver


                                     Pub    Pub
                                                                      22

http://herraiz.org
Message signing


                                           Hi there!




        Pub      Pri                              Pub   Pri



                         Keyserver


                               Pub   Pub
                                                              23

http://herraiz.org
Signing and encrypting


                       Hi there!




        Pub      Pri                             Pub   Pri



                               Keyserver


                                     Pub   Pub
                                                             24

http://herraiz.org
Signing and encrypting

                       Pub

                       FAD43A




        Pub      Pri                              Pub   Pri



                                Keyserver


                                      Pub   Pub
                                                              25

http://herraiz.org
Signing and encrypting

                                        Pub

                                            FAD43A




        Pub      Pri                                 Pub   Pri



                          Keyserver


                                Pub   Pub
                                                                 26

http://herraiz.org
Signing and encrypting


                                        Hi there!




        Pub      Pri                            Pub   Pri



                          Keyserver


                                Pub   Pub
                                                            27

http://herraiz.org
Signing and encrypting


                                        Hi there!




        Pub      Pri                            Pub   Pri



                          Keyserver


                                Pub   Pub
                                                            28

http://herraiz.org
Identity certification

               How do you know that
             public keys belong to their
                legitimate owners?


                     Public key   Can we ensure that the
                 Barack Obama       key does belong to
                                      Barack Obama?


                                                           29

http://herraiz.org
Identity certification


               Certificate Authorities



                        Trust chain


                                              30

http://herraiz.org
Public key signing
    ●   Public keys are plain text documents that can
        be cryptographically signed
    ●   Mutual public signing adds identity certification
        to PKP schemes




                                                            31

http://herraiz.org
Public key signing
      Barack Obama




        Pub      Pri                        Pub   Pri



                          Keyserver


                                Pub   Pub
                                                        32

http://herraiz.org
Public key signing
      Barack Obama
                       Key FE0A7AF2
                       Name Barack Obama
                       Fingerprint
                         D0DA E915 BFDD E5CD 8BA0
                         B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                      Pub   Pri



                                Keyserver


                                          Pub       Pub
                                                                      33

http://herraiz.org
Public key signing
      Barack Obama
                               Key FE0A7AF2
                               Name Barack Obama
                               Fingerprint
                                 D0DA E915 BFDD E5CD 8BA0
                                 B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                    Pub   Pri



                          Keyserver


                                Pub      Pub
                                                                    34

http://herraiz.org
Public key signing
                                                                Show me
                                                              your passport
      Barack Obama
                               Key FE0A7AF2
                               Name Barack Obama
                               Fingerprint
                                 D0DA E915 BFDD E5CD 8BA0
                                 B159 7E97 2ACB FE0A 7AF2




        Pub      Pri                                    Pub     Pri



                          Keyserver


                                Pub      Pub
                                                                          35

http://herraiz.org
Public key signing
                                                                        Show me
                                                                      your passport
      Barack Obama
                                       Key FE0A7AF2
                                       Name Barack Obama
                                       Fingerprint
                       Passport          D0DA E915 BFDD E5CD 8BA0
                       Barack            B159 7E97 2ACB FE0A 7AF2
                       Obama



        Pub      Pri                                            Pub     Pri



                                  Keyserver


                                        Pub      Pub
                                                                                  36

http://herraiz.org
Public key signing

               Pub
                                     Key FE0A7AF2
          Barack Obama               Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0         Fingerprint
    B159 7E97 2ACB FE0A 7AF2           D0DA E915 BFDD E5CD 8BA0
                                       B159 7E97 2ACB FE0A 7AF2




                               Download key FE0A7AF2          Pub   Pri



                                Keyserver


                                       Pub     Pub
                                                                          37

http://herraiz.org
Public key signing

               Pub
                                    Key FE0A7AF2
          Barack Obama              Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0        Fingerprint
    B159 7E97 2ACB FE0A 7AF2          D0DA E915 BFDD E5CD 8BA0
                                      B159 7E97 2ACB FE0A 7AF2




                                                             Pub   Pri



                               Keyserver


                                     Pub      Pub
                                                                         38

http://herraiz.org
Public key signing

               Pub
                                    Key FE0A7AF2
          Barack Obama              Name Barack Obama
    D0DA E915 BFDD E5CD 8BA0        Fingerprint
    B159 7E97 2ACB FE0A 7AF2          D0DA E915 BFDD E5CD 8BA0
                                      B159 7E97 2ACB FE0A 7AF2




                                                             Pub   Pri



                               Keyserver


                                     Pub      Pub
                                                                         39

http://herraiz.org
Public key signing
      Barack Obama




                         Key signing is
                         often mutual
        Pub      Pri                        Pub   Pri



                          Keyserver


                                Pub   Pub
                                                        40

http://herraiz.org
Public key signing

                                    Barack Obama
                     Trust chain
      Pub



      Pub

                                                   Is he Barack
      Pub                                             Obama?




                                                                  41

http://herraiz.org
Signing party




                                     42

http://herraiz.org
Take away

                PK Cryptog.
                                  Each user creates
              Secure comms.
                                   a public-private
                  through
                                      key pair
              insec. channels



                                    Trust chain
                Keyservers
                                    Identity cert.
               contain every
                                       through
              key in the world
                                  public key signing

                                                       43

http://herraiz.org

Mais conteúdo relacionado

Mais procurados

Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB
 
Bitcoin Investment Forum USA
Bitcoin Investment Forum USABitcoin Investment Forum USA
Bitcoin Investment Forum USAJoe root
 
Vundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityVundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityJacobo de Vera
 
Bitcoin Community Forums USA
Bitcoin Community Forums USABitcoin Community Forums USA
Bitcoin Community Forums USAJoe root
 
Tracker
TrackerTracker
TrackerWe Dua
 
Bitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaBitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaJoe root
 

Mais procurados (6)

Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm NaySoi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
Soi Cầu XSMB - Soi Cầu MB - Dự Đoán Xổ Số Miền Bắc Hôm Nay
 
Bitcoin Investment Forum USA
Bitcoin Investment Forum USABitcoin Investment Forum USA
Bitcoin Investment Forum USA
 
Vundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With SanityVundle: Managing Vim Plugins With Sanity
Vundle: Managing Vim Plugins With Sanity
 
Bitcoin Community Forums USA
Bitcoin Community Forums USABitcoin Community Forums USA
Bitcoin Community Forums USA
 
Tracker
TrackerTracker
Tracker
 
Bitcoin Mining Forum Australia
Bitcoin Mining Forum AustraliaBitcoin Mining Forum Australia
Bitcoin Mining Forum Australia
 

Destaque

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyShivashish Kumar
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptographyishmecse13
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSAJohn Paul Prassanna
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardMohamed Loey
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101Joshua Thijssen
 

Destaque (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Cryptography
CryptographyCryptography
Cryptography
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptography
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 
Cryptography - key sharing - RSA
Cryptography - key sharing - RSACryptography - key sharing - RSA
Cryptography - key sharing - RSA
 
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Ch09
Ch09Ch09
Ch09
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 

Semelhante a Public Key Cryptography: A Practical Approach

OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with pythonJose Manuel Ortega Candel
 
MNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsAPNIC
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project MNCERT
 
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...APNIC
 
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Frédéric Harper
 
GOTO Paris | @see Gopher
GOTO Paris | @see GopherGOTO Paris | @see Gopher
GOTO Paris | @see GopherJan Klat
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxnull - The Open Security Community
 
When a robot is smart enough?
When a robot is smart enough?When a robot is smart enough?
When a robot is smart enough?Tomáš Jukin
 
38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet 38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet APNIC
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Stéphane M. Grueso
 
Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08sung young son
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataAPNIC
 
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeSecurity of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeDeep Datta
 
Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Deep Datta
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksGreg Foss
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensionsZoltan Balazs
 
WebRTC: A front-end perspective
WebRTC: A front-end perspectiveWebRTC: A front-end perspective
WebRTC: A front-end perspectiveshwetank
 

Semelhante a Public Key Cryptography: A Practical Approach (20)

OSINT tools for security auditing with python
OSINT tools for security auditing with pythonOSINT tools for security auditing with python
OSINT tools for security auditing with python
 
MNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
 
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...Observations from the APNIC Community Honeynet Project, presentation by Adli ...
Observations from the APNIC Community Honeynet Project, presentation by Adli ...
 
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
Open Operating Systems and Mozilla´s vision on the future - Movistar Move - 2...
 
GOTO Paris | @see Gopher
GOTO Paris | @see GopherGOTO Paris | @see Gopher
GOTO Paris | @see Gopher
 
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptxDemystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
Demystifying Cyber Threat Intelligence -Debraj Dey Null_OWASP kolkata .pptx
 
Preso fcul
Preso fculPreso fcul
Preso fcul
 
When a robot is smart enough?
When a robot is smart enough?When a robot is smart enough?
When a robot is smart enough?
 
38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet 38th TWNIC OPM: Observations and mitigation of Mozi botnet
38th TWNIC OPM: Observations and mitigation of Mozi botnet
 
Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)Manual de autodefensa digital (INGLÉS)
Manual de autodefensa digital (INGLÉS)
 
Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08Webrtc 동향과 이슈 2016.08
Webrtc 동향과 이슈 2016.08
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
 
Encode polkadot club
Encode polkadot club  Encode polkadot club
Encode polkadot club
 
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCodeSecurity of Go Modules and Vulnerability Scanning in GoCenter and VSCode
Security of Go Modules and Vulnerability Scanning in GoCenter and VSCode
 
Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)Security of go modules and vulnerability scanning in go center (1)
Security of go modules and vulnerability scanning in go center (1)
 
Wi-Fi Hotspot Attacks
Wi-Fi Hotspot AttacksWi-Fi Hotspot Attacks
Wi-Fi Hotspot Attacks
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
儲かるドキュメント
儲かるドキュメント儲かるドキュメント
儲かるドキュメント
 
WebRTC: A front-end perspective
WebRTC: A front-end perspectiveWebRTC: A front-end perspective
WebRTC: A front-end perspective
 

Mais de Israel Herraiz

intensive metrics software evolution
intensive metrics software evolutionintensive metrics software evolution
intensive metrics software evolutionIsrael Herraiz
 
Statistical Distribution of Metrics
Statistical Distribution of MetricsStatistical Distribution of Metrics
Statistical Distribution of MetricsIsrael Herraiz
 
¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPMIsrael Herraiz
 
The Ultimate Debian Database
The Ultimate Debian DatabaseThe Ultimate Debian Database
The Ultimate Debian DatabaseIsrael Herraiz
 
Evaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsEvaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsIsrael Herraiz
 
Software size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costSoftware size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costIsrael Herraiz
 
The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011Israel Herraiz
 
Mining Software Repositories
Mining Software RepositoriesMining Software Repositories
Mining Software RepositoriesIsrael Herraiz
 

Mais de Israel Herraiz (8)

intensive metrics software evolution
intensive metrics software evolutionintensive metrics software evolution
intensive metrics software evolution
 
Statistical Distribution of Metrics
Statistical Distribution of MetricsStatistical Distribution of Metrics
Statistical Distribution of Metrics
 
¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM¿MATLAB? Yo uso Octave UPM
¿MATLAB? Yo uso Octave UPM
 
The Ultimate Debian Database
The Ultimate Debian DatabaseThe Ultimate Debian Database
The Ultimate Debian Database
 
Evaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasetsEvaluating the presence and impact of bias in bug-fix datasets
Evaluating the presence and impact of bias in bug-fix datasets
 
Software size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software costSoftware size distribution - Why we always underestimate software cost
Software size distribution - Why we always underestimate software cost
 
The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011The dynamics of software evolution - EVOLUMONS 2011
The dynamics of software evolution - EVOLUMONS 2011
 
Mining Software Repositories
Mining Software RepositoriesMining Software Repositories
Mining Software Repositories
 

Último

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Public Key Cryptography: A Practical Approach

  • 1. Public key cryptography: a practical approach Israel Herraiz <isra@herraiz.org> <israel.herraiz@upm.es> KeyID FE0A7AF3 Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF3 Slides and additional info at http://mat.caminos.upm.es/~iht/pkc/ 1 http://herraiz.org
  • 2. Privacy in electronic communicatios Can we ensure privacy in electronic communications? 2 http://herraiz.org
  • 3. Reaching Google 1 10.8.0.1 (10.8.0.1) 2 192.168.1.1 (192.168.1.1) 3 62.81.125.179.static.user.ono.com (62.81.125.179) 4 10.115.49.217 (10.115.49.217) 5 10.127.151.49 (10.127.151.49) 6 10.127.10.137 (10.127.10.137) 7 10.127.10.133 (10.127.10.133) 8 10.127.3.82 (10.127.3.82) 9 213.242.71.21 (213.242.71.21) 10 ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42) 11 ae-45-45.ebr1.London1.Level3.net (4.69.143.101) 12 ae-1-51.edge3.London1.Level3.net (4.69.139.73) 13 unknown.Level3.net (212.113.15.186) 14 209.85.255.78 (209.85.255.78) 15 66.249.95.173 (66.249.95.173) 16 216.239.49.45 (216.239.49.45) 17 * * * 18 ww-in-f147.1e100.net (209.85.229.147) 3 http://herraiz.org
  • 4. Reaching Google 1 10.8.0.1 (10.8.0.1) 2 192.168.1.1 (192.168.1.1) Getafe 3 62.81.125.179.static.user.ono.com (62.81.125.179) 4 10.115.49.217 (10.115.49.217) 5 10.127.151.49 (10.127.151.49) Barcelona 6 10.127.10.137 (10.127.10.137) 7 10.127.10.133 (10.127.10.133) 8 10.127.3.82 (10.127.3.82) 9 213.242.71.21 (213.242.71.21) Minneapolis 10 ae-5-5.ebr1.Paris1.Level3.net (4.69.141.42) Paris 11 ae-45-45.ebr1.London1.Level3.net (4.69.143.101) 12 ae-1-51.edge3.London1.Level3.net (4.69.139.73) London 13 unknown.Level3.net (212.113.15.186) 14 209.85.255.78 (209.85.255.78) Atlanta 15 66.249.95.173 (66.249.95.173) New York 16 216.239.49.45 (216.239.49.45) Los Angeles 17 * * * 18 ww-in-f147.1e100.net (209.85.229.147) Atlanta 4 http://herraiz.org
  • 5. Hops while attempting to reach Google 5 http://herraiz.org
  • 6. Is it that bad? What kind of private Information can be captured? 6 http://herraiz.org
  • 7. Non-cyphered information ● Geolocalization ● Using your IP address ● Web browser and operating system ● Any info written in a form ● Including passwords ● Cookies ● Have a look and take care – http://www.youtube.com/watch?v=yyLdxO6xvh8 – http://www.youtube.com/watch?v=1FgKL2ywrX0 7 http://herraiz.org
  • 8. Is it important? ● Strong PK crypto illegal in France up to 2004 ● PK implementations in software considered weapons in the US ● Software export restrictions in EU and US http://en.wikipedia.org/wiki/Cryptography_law http://en.wikipedia.org/wiki/Key_disclosure_law http://en.wikipedia.org/wiki/Phil_Zimmermann http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States#History 8 http://herraiz.org
  • 9. Solution Enforce cyphering using public key cryptography 9 http://herraiz.org
  • 10. Cryptography ● Traditionally, cyphering was done using a password and an algorithm ● Symmetric approach ● Password shared by both peers ● Public key cryptography ● Insecure channel ● Private and secure communication without any previous physical contact 10 http://herraiz.org
  • 11. Public key cryptography (PKP) Pub Pri Pub Pri 11 http://herraiz.org
  • 12. Public key cryptography Pub Pri Pub Pri Keyserver Pub Pub 12 http://herraiz.org
  • 13. Criptografía de clave pública Hi there! Pub Pri Pub Pri Keyserver Pub Pub 13 http://herraiz.org
  • 14. Public key cryptography Pub 0F231A5 Pub Pri Pub Pri Keyserver Pub Pub 14 http://herraiz.org
  • 15. Public key cryptography Pub 0F231A5 Pub Pri Pub Pri Keyserver Pub Pub 15 http://herraiz.org
  • 16. Public key cryptography Hi there! Pub Pri Pub Pri Keyserver Pub Pub 16 http://herraiz.org
  • 17. How does it work? ● PKP Algorithms ● Prime number factorization ● From a mathematical point of view, all messages can be decrypted ● From a computational point of view, decrypting a message without the private key takes too long – Key length is a crucial property 17 http://herraiz.org
  • 18. Public key sample -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.19 (GNU/Linux) JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8 bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3 5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t 2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv -----END PGP PUBLIC KEY BLOCK----- 18 http://herraiz.org
  • 19. Private key sample -----BEGIN PGP PRIVATE KEY BLOCK----- Version: GnuPG v2.0.19 (GNU/Linux) mQINBEtUTeQBEACejdGQhscmsDXM7xG2/ZYFpMQg/GmPlJ85uJJUkLr2T+5Rw8Xv JeP5F/eRS9G8EE1fObRRW6mRf+bGSeluFEMiOi3UB/5P0GBx8iM0QIjezR0R+2n8 VfZjNZkMwsq94BGFrBxu477tKhQ5wiUBBz/jJ01a39Wrazgp21fvEon2T0Vay45t 2BYbU4AF815UL6o74YlW5SLdAofwylZS8pX4CKjGAB0T+fDiwkAepQl45nzX0ulv bMjuJmWHTjvEeplnx9iual4J4BT/9FznFs7o4tFVVfYBacFrhWjQyAf2xoP3gyn3 5OlV55VHVB+oidXUVNSNHZbXwrd1sH42x7x8o17PDFJrWjiq4kAb2EfSOIuSS6na K9Y06bqh3yRbVtRdZOuCLcY8QJwt/mx//uQqG6NuSvYhx1QyC6g==XuDESOIuSSa -----END PGP PRIVATE KEY BLOCK----- 19 http://herraiz.org
  • 20. Keyservers ● Internet hosts that contain public keys ● Federated services ● All servers contain all the public keys in the world ● Public keyserver in Spain thanks to RedIRIS ● URL: pgp.rediris.es 20 http://herraiz.org
  • 21. Message signing Hi there! Pub Pri Pub Pri Keyserver Pub Pub 21 http://herraiz.org
  • 22. Message signing Created with the private key Hi there! Pub Pri Pub Pri Keyserver Pub Pub 22 http://herraiz.org
  • 23. Message signing Hi there! Pub Pri Pub Pri Keyserver Pub Pub 23 http://herraiz.org
  • 24. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 24 http://herraiz.org
  • 25. Signing and encrypting Pub FAD43A Pub Pri Pub Pri Keyserver Pub Pub 25 http://herraiz.org
  • 26. Signing and encrypting Pub FAD43A Pub Pri Pub Pri Keyserver Pub Pub 26 http://herraiz.org
  • 27. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 27 http://herraiz.org
  • 28. Signing and encrypting Hi there! Pub Pri Pub Pri Keyserver Pub Pub 28 http://herraiz.org
  • 29. Identity certification How do you know that public keys belong to their legitimate owners? Public key Can we ensure that the Barack Obama key does belong to Barack Obama? 29 http://herraiz.org
  • 30. Identity certification Certificate Authorities Trust chain 30 http://herraiz.org
  • 31. Public key signing ● Public keys are plain text documents that can be cryptographically signed ● Mutual public signing adds identity certification to PKP schemes 31 http://herraiz.org
  • 32. Public key signing Barack Obama Pub Pri Pub Pri Keyserver Pub Pub 32 http://herraiz.org
  • 33. Public key signing Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 33 http://herraiz.org
  • 34. Public key signing Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 34 http://herraiz.org
  • 35. Public key signing Show me your passport Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Pub Pri Keyserver Pub Pub 35 http://herraiz.org
  • 36. Public key signing Show me your passport Barack Obama Key FE0A7AF2 Name Barack Obama Fingerprint Passport D0DA E915 BFDD E5CD 8BA0 Barack B159 7E97 2ACB FE0A 7AF2 Obama Pub Pri Pub Pri Keyserver Pub Pub 36 http://herraiz.org
  • 37. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Download key FE0A7AF2 Pub Pri Keyserver Pub Pub 37 http://herraiz.org
  • 38. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Keyserver Pub Pub 38 http://herraiz.org
  • 39. Public key signing Pub Key FE0A7AF2 Barack Obama Name Barack Obama D0DA E915 BFDD E5CD 8BA0 Fingerprint B159 7E97 2ACB FE0A 7AF2 D0DA E915 BFDD E5CD 8BA0 B159 7E97 2ACB FE0A 7AF2 Pub Pri Keyserver Pub Pub 39 http://herraiz.org
  • 40. Public key signing Barack Obama Key signing is often mutual Pub Pri Pub Pri Keyserver Pub Pub 40 http://herraiz.org
  • 41. Public key signing Barack Obama Trust chain Pub Pub Is he Barack Pub Obama? 41 http://herraiz.org
  • 42. Signing party 42 http://herraiz.org
  • 43. Take away PK Cryptog. Each user creates Secure comms. a public-private through key pair insec. channels Trust chain Keyservers Identity cert. contain every through key in the world public key signing 43 http://herraiz.org