SlideShare uma empresa Scribd logo
1 de 56
A. SARANG
INTRODUCTION
TO
SSH & PGP
Agenda
 Dial Up & broadband connections
 Introduction to SSH protocol & applications
 SSH-TRANS
 Client- Server Authentication
 SSH configuration
 Public & Private key pair generation
 Digital Signatures
 Use of SSH in Port Forwarding
 SSH in subversion control
 Introduction to PGP protocol & applications
 Email compatibility of PGP
A few years back ..
 DIAL-UP connection
Dial up connection
 Passwords were sent over
phoneline or LAN.
 Was it secure ?
The present day..
 Broadband connection
Broad band connection
 Passwords go through ISPs/
untrusted networks.
 How can there be a secure way of
sending passwords across the
internet ?
The need for encryption
 This can be solved by encrption of
the data sent over the untrusted
networks .
 This improves the strength of the
authentication mechanism people
use to login.
 We call this mechanism as …
SSH
Secure SHell
protocol & applications
SSH
 Replaces less secure telnet &
rlogin* programs.
 Uses public key cryptography to
authenticate remote PCs.
 *rlogin is a software utility for Unix-like computer operating
systems that allows users to log in on another host via
a network, communicating viaTCP port 513.
SSH can
 Execute commands & transfer files
(like unix rsh & rcp commands).
 Provides strong client/server
authentications
 Message integrity.
SSH can protect against ..
 Manipulation of data at intermediate
elements in the network.
 IP address spoofing where attack
hosts pretends to be trusted host by
sending packets with source address
of trusted hosts
 DNS spoofing.
SSH will not protect against ..
 A compromised root account .
 Insecure home directories
 Eg : if an attacker tries to modify
files in the home directory.
SSH version 2 protocols
 SSH-TRANS , a transport layer
protocol
 SSH-AUTH , an authentication
protocol.
 SSH-CONN , a connection
protocol.
 SSH-AUTH & SSH-TRANS are used for remote
login.
SSH - TRANS
 Provides encrypted channel
between client & server machines.
 Runs on top of TCP connection.
SSH-TRANS mechanism
 Client authenticates server using RSA
algorithm.
 After authentication , it establishes a
session key to encrypt data sent over
the channel.
 Message integrity check is done for
all data exchanged over the channel.
 Public key is owned by the server .
 How come client possesses the
server’s public key?
Step-1 : Client authenticates the server
 The server tells the client its public
key at the connection time.
 During first time , SSH application
warns the client that it has never
connected to the server before .
 The client remembers the server’s
public key.
 From the second time, the client
compares the key with the stored
public key.
Step 2 : Client authenticates itself to the
server
 This can be done in 3 ways :-
 User sends his password to user
directly in the secure channel.
 This is safe as the password is
encrypted.
 Public key is placed on the server
prior to connection .
 HOST BASED AUTHENTICATION
 The server has a set of trusted
hosts.
 Client claims to be a “trusted
host” .
Installing SSH on YOUR PC
 You can download the source code
from
 http://www.openssh.com/
Configuration files
 SSH has 2 different sets of
configuration files :-
 System wide configuration files
 User specific config files
System Wide Configuration Filles
 Stored in /etc/ssh directory
 Ssh_config : client config file.
 Sshd_config : sshd server config
files.
 Sshd.pid : Server’s pid in stored
here.
User specific configuration files ..
 Stored in ~UserName/.ssh
directory.
 Known_hosts : This file contains
host keys of SSH server s accessed
by the user.
 Authorized_keys2 : holds a list of
authorized public keys for users.
 When a client connects to a server
, server authenticates client by
checking the public key stored
here.
Why config files are important :
 Specify authentication methods.
 Specify SSH protocols supported .
 Behavior of server can be
controlled by :-
 Compling time configuration
 Config file
 Command line options
Key management in SSH
 SSH authenticates users using
keypairs :-
 Private key
 Public key
Keypairs
Key management commands
 Ssh-keygen : create key pairs
 Ssh-agent : holds private key in
memory
 Ssh-add : adds key to key agent
Applications of SSH : Port Forwarding
More practical application :
 Subversion control :-
 Github
 Gitorious
 svn
PGP
Pretty Good Privacy
 PGP is a data encryption and
decryption computer program that
provides cryptographic privacy
and authentication for data
communication.
 PGP combines the best available
cryptographic algorithms to achieve
secure e-mail communication.
PGP encryption is a serial combination
of :-
 Hashing
 Data Compression
 Symmetric Key Cryptography
 Public Key Cryptography
Supports
 Message Authentication
 Integrity Checking
(checking if message was altered
since completion ).
Using PGP to create Digital Signatures
 *plaintext : information a sender wishes to transmit to a receiver
 Hash function from plaintext*
 +
 Sender’s private keys
Using PGP in emails
 Authentication
 Confidentiality
 Compression
 Email compatibility using Radix 64
conversion
Alice sends Bob an email , again !
 Ad/Ae = private/public keypair
 m = digitally signed message
 SHA-1 = hashing function
Authentication- Sending
 Alice hashes the message using
SHA-1 to obtain SHA(m).
 Alice encrypts the hash using her
private key Ad to obtain
ciphertext c given by
 c=pk.encryptAd(SHA(m))
 Alice sends Bob the pair (m,c).
Authentication - Receiving
 Bob receives (m,c) .
 Bob decrypts c using Alice's public
key Ae to obtain signature s
 s=pk.decryptAe(c)
 Bob computes hash of m to get
signature s
 If s==m ,
Authenticated !! 
Confidentiality – Added Security
 Process is repeated with session
key sk
 m=sk.decryptk(c)
 NOTE : encryption is done for
session key+public key (same
time)
E-Mail compatibility
 Modern email system can transmit
only blocks of ASCII text.
 Encrypted ciphertext blocks may
not correspond to ASCII characters
.
 This problem is overcome by …
Radix-64 conversion/base 64 encoding
 The binary input is split into blocks of 24 bits
(3 bytes).
 Each 24 block is then split into four sets each
of 6-bits.
 Each 6-bit set will then have a value between
0 and 26-1 (=63).
 This value is encoded into a printable
character.
That’s all folks
THANK YOU !! 

Mais conteúdo relacionado

Mais procurados

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)Mehedi Farazi
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And RloginSourav Roy
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configFLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configdmp1304
 
SSH.ppt
SSH.pptSSH.ppt
SSH.pptjoekr1
 
Ssh
SshSsh
Sshgh02
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006Nate Lawson
 

Mais procurados (19)

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
SSH
SSHSSH
SSH
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Intro to SSH
Intro to SSHIntro to SSH
Intro to SSH
 
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configFLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
 
OpenSSH tricks
OpenSSH tricksOpenSSH tricks
OpenSSH tricks
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Ssh
SshSsh
Ssh
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Reverse shell
Reverse shellReverse shell
Reverse shell
 
Tunneling
TunnelingTunneling
Tunneling
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 

Semelhante a Introduction to SSH & PGP

CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21jemtallon
 
Client Server Security with Flask and iOS
Client Server Security with Flask and iOSClient Server Security with Flask and iOS
Client Server Security with Flask and iOSMake School
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.pptImXaib
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security PrimerVenkatesh Iyer
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network clientroot_fibo
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptxsandyBS
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfameerandsons
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfinfo145003
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 

Semelhante a Introduction to SSH & PGP (20)

Lecture17
Lecture17Lecture17
Lecture17
 
SSH.pdf
SSH.pdfSSH.pdf
SSH.pdf
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
 
Client Server Security with Flask and iOS
Client Server Security with Flask and iOSClient Server Security with Flask and iOS
Client Server Security with Flask and iOS
 
SSL.ppt
SSL.pptSSL.ppt
SSL.ppt
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Security
SecuritySecurity
Security
 
Ch15
Ch15Ch15
Ch15
 
crypto2ssh
crypto2sshcrypto2ssh
crypto2ssh
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network client
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 

Mais de Sarang Ananda Rao

Reducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial MarketsReducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial MarketsSarang Ananda Rao
 
Partners Healthcare Case Analysis
Partners Healthcare Case AnalysisPartners Healthcare Case Analysis
Partners Healthcare Case AnalysisSarang Ananda Rao
 
Auction analysis from Kaggle
Auction analysis from KaggleAuction analysis from Kaggle
Auction analysis from KaggleSarang Ananda Rao
 
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance MeasurePersonal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance MeasureSarang Ananda Rao
 
ACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra SecuritiesACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra SecuritiesSarang Ananda Rao
 
Ticketing platform for cinemalls
Ticketing platform for cinemallsTicketing platform for cinemalls
Ticketing platform for cinemallsSarang Ananda Rao
 
Redundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systemsRedundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systemsSarang Ananda Rao
 
CMS & Chrome Extension Development
CMS & Chrome Extension DevelopmentCMS & Chrome Extension Development
CMS & Chrome Extension DevelopmentSarang Ananda Rao
 

Mais de Sarang Ananda Rao (10)

Reducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial MarketsReducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial Markets
 
Partners Healthcare Case Analysis
Partners Healthcare Case AnalysisPartners Healthcare Case Analysis
Partners Healthcare Case Analysis
 
Auction analysis from Kaggle
Auction analysis from KaggleAuction analysis from Kaggle
Auction analysis from Kaggle
 
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance MeasurePersonal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
 
ACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra SecuritiesACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra Securities
 
Ticketing platform for cinemalls
Ticketing platform for cinemallsTicketing platform for cinemalls
Ticketing platform for cinemalls
 
Redundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systemsRedundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systems
 
Musicperk - Developro 2012
Musicperk - Developro 2012Musicperk - Developro 2012
Musicperk - Developro 2012
 
CMS & Chrome Extension Development
CMS & Chrome Extension DevelopmentCMS & Chrome Extension Development
CMS & Chrome Extension Development
 
Ui disk & terminal drivers
Ui disk & terminal driversUi disk & terminal drivers
Ui disk & terminal drivers
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Introduction to SSH & PGP

  • 2. Agenda  Dial Up & broadband connections  Introduction to SSH protocol & applications  SSH-TRANS  Client- Server Authentication  SSH configuration  Public & Private key pair generation  Digital Signatures  Use of SSH in Port Forwarding
  • 3.  SSH in subversion control  Introduction to PGP protocol & applications  Email compatibility of PGP
  • 4. A few years back ..  DIAL-UP connection
  • 5. Dial up connection  Passwords were sent over phoneline or LAN.  Was it secure ?
  • 6. The present day..  Broadband connection
  • 7. Broad band connection  Passwords go through ISPs/ untrusted networks.  How can there be a secure way of sending passwords across the internet ?
  • 8. The need for encryption  This can be solved by encrption of the data sent over the untrusted networks .  This improves the strength of the authentication mechanism people use to login.  We call this mechanism as …
  • 10.
  • 11. SSH  Replaces less secure telnet & rlogin* programs.  Uses public key cryptography to authenticate remote PCs.  *rlogin is a software utility for Unix-like computer operating systems that allows users to log in on another host via a network, communicating viaTCP port 513.
  • 12. SSH can  Execute commands & transfer files (like unix rsh & rcp commands).  Provides strong client/server authentications  Message integrity.
  • 13.
  • 14. SSH can protect against ..  Manipulation of data at intermediate elements in the network.  IP address spoofing where attack hosts pretends to be trusted host by sending packets with source address of trusted hosts  DNS spoofing.
  • 15. SSH will not protect against ..  A compromised root account .  Insecure home directories  Eg : if an attacker tries to modify files in the home directory.
  • 16. SSH version 2 protocols  SSH-TRANS , a transport layer protocol  SSH-AUTH , an authentication protocol.  SSH-CONN , a connection protocol.  SSH-AUTH & SSH-TRANS are used for remote login.
  • 17. SSH - TRANS  Provides encrypted channel between client & server machines.  Runs on top of TCP connection.
  • 18. SSH-TRANS mechanism  Client authenticates server using RSA algorithm.  After authentication , it establishes a session key to encrypt data sent over the channel.  Message integrity check is done for all data exchanged over the channel.
  • 19.  Public key is owned by the server .  How come client possesses the server’s public key?
  • 20. Step-1 : Client authenticates the server  The server tells the client its public key at the connection time.  During first time , SSH application warns the client that it has never connected to the server before .
  • 21.  The client remembers the server’s public key.  From the second time, the client compares the key with the stored public key.
  • 22. Step 2 : Client authenticates itself to the server  This can be done in 3 ways :-  User sends his password to user directly in the secure channel.  This is safe as the password is encrypted.
  • 23.  Public key is placed on the server prior to connection .  HOST BASED AUTHENTICATION  The server has a set of trusted hosts.  Client claims to be a “trusted host” .
  • 24. Installing SSH on YOUR PC  You can download the source code from  http://www.openssh.com/
  • 25. Configuration files  SSH has 2 different sets of configuration files :-  System wide configuration files  User specific config files
  • 26. System Wide Configuration Filles  Stored in /etc/ssh directory  Ssh_config : client config file.  Sshd_config : sshd server config files.  Sshd.pid : Server’s pid in stored here.
  • 27. User specific configuration files ..  Stored in ~UserName/.ssh directory.  Known_hosts : This file contains host keys of SSH server s accessed by the user.
  • 28.  Authorized_keys2 : holds a list of authorized public keys for users.  When a client connects to a server , server authenticates client by checking the public key stored here.
  • 29. Why config files are important :  Specify authentication methods.  Specify SSH protocols supported .  Behavior of server can be controlled by :-  Compling time configuration  Config file  Command line options
  • 30. Key management in SSH  SSH authenticates users using keypairs :-  Private key  Public key
  • 32.
  • 33.
  • 34.
  • 35. Key management commands  Ssh-keygen : create key pairs  Ssh-agent : holds private key in memory  Ssh-add : adds key to key agent
  • 36.
  • 37.
  • 38. Applications of SSH : Port Forwarding
  • 39. More practical application :  Subversion control :-  Github  Gitorious  svn
  • 40.
  • 42.  PGP is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.  PGP combines the best available cryptographic algorithms to achieve secure e-mail communication.
  • 43. PGP encryption is a serial combination of :-  Hashing  Data Compression  Symmetric Key Cryptography  Public Key Cryptography
  • 44. Supports  Message Authentication  Integrity Checking (checking if message was altered since completion ).
  • 45. Using PGP to create Digital Signatures  *plaintext : information a sender wishes to transmit to a receiver  Hash function from plaintext*  +  Sender’s private keys
  • 46.
  • 47. Using PGP in emails  Authentication  Confidentiality  Compression  Email compatibility using Radix 64 conversion
  • 48. Alice sends Bob an email , again !  Ad/Ae = private/public keypair  m = digitally signed message  SHA-1 = hashing function
  • 49. Authentication- Sending  Alice hashes the message using SHA-1 to obtain SHA(m).  Alice encrypts the hash using her private key Ad to obtain ciphertext c given by  c=pk.encryptAd(SHA(m))  Alice sends Bob the pair (m,c).
  • 50. Authentication - Receiving  Bob receives (m,c) .  Bob decrypts c using Alice's public key Ae to obtain signature s  s=pk.decryptAe(c)
  • 51.  Bob computes hash of m to get signature s  If s==m , Authenticated !! 
  • 52. Confidentiality – Added Security  Process is repeated with session key sk  m=sk.decryptk(c)  NOTE : encryption is done for session key+public key (same time)
  • 53. E-Mail compatibility  Modern email system can transmit only blocks of ASCII text.  Encrypted ciphertext blocks may not correspond to ASCII characters .  This problem is overcome by …
  • 54. Radix-64 conversion/base 64 encoding  The binary input is split into blocks of 24 bits (3 bytes).  Each 24 block is then split into four sets each of 6-bits.  Each 6-bit set will then have a value between 0 and 26-1 (=63).  This value is encoded into a printable character.
  • 55.