Académique Documents
Professionnel Documents
Culture Documents
MSU
M. Ramkumar
Source A
KRa M H EP || Z
EKRa[H(M)]
Destination B
KUa DP M Compare H KRb DP DC Z-1 M
Z-1
EKUb[Ks]
EKUb[Ks] KRb DP
EKRa[H(M)]
KUa DP
DC
Z-1
Compare H
MSU
M. Ramkumar
X file
Signature required? No
Yes
Confidentiality required? No
Yes
decrypt key, X
K DKRb[EKUb[Ks]] X DK[X]
Compress X Z(X)
Decompress X Z1(X)
Confidentiality required? No
Yes
Signature required? No
Yes
MSU
M. Ramkumar
MSU
M. Ramkumar
Content
Key ID of recipient's public key (KUb) Session key (Ks) Timestamp Signature Key ID of sender's public key (KUa) Leading two octets of message digest Message Digest Filename Timestamp Message Data EKRa EKUb
Operation
R64
ZIP
EKs
MSU
Notation: EKUb = encryption with user b's public key EKRa = encryption with user a's private key EKs = encryption with session key ZIP = Zip compression function R64 = Radix-64 conversion function
M. Ramkumar
MSU
M. Ramkumar
Private Key Ring Timestamp Ti Key ID* KUi mod 264 Public Key KUi Public Key Ring Timestamp Ti Key ID* KUi mod 264 Public Key Kui Owner Trust trust_flagi User ID* User i Key Legitimacy trust_flagi Signature(s) Signature Trust(s) Encrypted Private Key EH(Pi)[KRi] User ID* User i
MSU
M. Ramkumar
Public key ring passphrase Private key ring IDA select encrypted private key Key ID private key KRa message digest RNG public key KUb
IDB
select Key ID
DC
H Message M
EP
||
message
EP
encrypted signature + message
||
Output
EC
Figure 15.5 PGP Message Generation (from User A to User B; no compression or radix 64 conversion)
MSU
M. Ramkumar
H
Public key ring select
DC
private key KRb public key KUa
sender's Key ID Encrypted digest
DP
session key Ks
DP
Compare
DC
message
H
Figure 15.6 PGP Message Reception (from User A to User B; no compression or radix 64 conversion)
MSU
M. Ramkumar
10
You
?
G H
?
X Y
P
= unknown signatory = X is signed by Y = key's owner is trusted by you to sign keys = key's owner is partly trusted by you to sign keys = key is deemed legitimate by you
MSU
M. Ramkumar
11
the brown fox jumped over the brown foxy jumping frog
26 13 5 27
0b26d13d
0b27d5d
ing frog
MSU
M. Ramkumar
12
Shift source text Discard Sliding History Buffer Look-Ahead Buffer Output compressed text (a) General structure Source
jumping frog
ing frog
(b) Example
MSU
M. Ramkumar
13
24 bits
R64
R64
R64
R64
4 characters = 32 bits
MSU
M. Ramkumar
14
dtbuf
E
rseed
rseed
E E
rseed
E E
rseed
E
rbuf
rbuf
rbuf
K[16..23]
K[8..15]
K[0..7]
Figure 15.12 PGP Session Key and IV Generation (steps G2 through G8)
MSU
M. Ramkumar