Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Why does pgp generate a signature before applying compression

29/04/2021 Client: muhammad11 Deadline: 2 Day

Network Security Essentials Fifth Edition by William Stallings Chapter 8 Electronic Mail Security “Despite the refusal of VADM Poindexter and LtCol North to appear, the Board's access to other sources of information filled much of this gap. The FBI provided documents taken from the files of the National Security Advisor and relevant NSC staff members, including messages from the PROF system between VADM Poindexter and LtCol North. The PROF messages were conversations by computer, written at the time events occurred and presumed by the writers to be protected from disclosure. In this sense, they provide a firsthand, contemporaneous account of events.” —The Tower Commission Report to President Reagan on the Iran-Contra Affair, 1987 Pretty Good Privacy (PGP) • Provides a confidentiality and authentication service that can be used for electronic mail and file storage applications • Developed by Phil Zimmermann • Selected the best available cryptographic algorithms as building blocks • Integrated these algorithms into a general-purpose application that is independent of operating system and processor and that is based on a small set of easy-to-use commands • Made the package and its documentation, including the source code, freely available via the Internet, bulletin boards, and commercial networks • Entered into an agreement with a company to provide a fully compatible, low-cost commercial version of PGP PGP Growth It is available free worldwide in versions that run on a variety of platforms The commercial version satisfies users who want a product that comes with vendor support It is based on algorithms that have survived extensive public review and are considered extremely secure It has a wide range of applicability It was not developed by, nor is it controlled by, any governmental or standards organization Is now on an Internet standards track, however it still has an aura of an antiestablishment endeavor Table 8.1 Summary of PGP Services PGP Authentication • Combination of SHA-1 and RSA provides an effective digital signature scheme • Because of the strength of RSA the recipient is assured that only the possessor of the matching private key can generate the signature • Because of the strength of SHA-1 the recipient is assured that no one else could generate a new message that matches the hash code • As an alternative, signatures can be generated using DSS/SHA-1 • Detached signatures are supported • Each person’s signature is independent and therefore applied only to the document PGP Confidentiality • Provided by encrypting messages to be transmitted or to be stored locally as files • In both cases the symmetric encryption algorithm CAST-128 may be used • Alternatively IDEA or 3DES may be used • The 64-bit cipher feedback (CFB) mode is used In PGP each symmetric key is used only once • Although referred to as a session key, it is in reality a one-time key • Session key is bound to the message and transmitted with it • To protect the key, it is encrypted with the receiver’s public key • As an alternative to the use of RSA for key encryption, PGP uses ElGamal, a variant of Diffie-Hellman that provides encryption/decryption PGP Confidentiality and Authentication • Both services may be used for the same message • First a signature is generated for the plaintext message and prepended to the message • Then the plaintext message plus signature is encrypted using CAST-128 (or IDEA or 3DES) and the session key is encrypted using RSA (or ElGamal) • When both services are used: The sender first signs the message with its own private key Then encrypts the message with a session key And finally encrypts the session key with the recipient’s public key PGP Compression • As a default, PGP compresses the message after applying the signature but before encryption • This has the benefit of saving space both for e-mail transmission and for file storage • The placement of the compression algorithm is critical • Applying the hash function and signature after compression would constrain all PGP implementations to the same version of the compression algorithm • Message encryption is applied after compression to strengthen cryptographic security • The compression algorithm used is ZIP PGP E-mail Compatibility • Many electronic mail systems only permit the use of blocks consisting of ASCII text • To accommodate this restriction, PGP provides the service of converting the raw 8-bit binary stream to a stream of printable ASCII characters • The scheme used for this purpose is radix-64 conversion • Each group of three octets of binary data is mapped into four ASCII characters • This format also appends a CRC to detect transmission errors Secure/Multipurpose Internet Mail Extension (S/MIME) • A security enhancement to the MIME Internet e-mail format standard based on technology from RSA Data Security • Defined in: • RFCs 3370, 3850, 3851, 3852 RFC 5322 • Defines a format for text messages that are sent using electronic mail • Messages are viewed as having an envelope and contents • The envelope contains whatever information is needed to accomplish transmission and delivery • The contents compose the object to be delivered to the recipient • RFC 5322 standard applies only to the contents •

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Grade Tutor
Accounting & Finance Mentor
Maths Master
Custom Coursework Service
A Grade Exams
Homework Master
Writer Writer Name Offer Chat
Top Grade Tutor

ONLINE

Top Grade Tutor

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$39 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I have read and understood all your initial requirements, and I am very professional in this task.

$20 Chat With Writer
Maths Master

ONLINE

Maths Master

I have read your project details. I can do this within your deadline.

$24 Chat With Writer
Custom Coursework Service

ONLINE

Custom Coursework Service

I have read your project details. I can do this within your deadline.

$34 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$40 Chat With Writer
Homework Master

ONLINE

Homework Master

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$30 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Paul klee around the fish - Caboolture hospital mental health - Justification recommendation report - Why do elephants have ivory tusks worksheet answers - In a multifactor apt model, the coefficients on the macro factors are often called - Review workplace sustainability policy implementation - Is a5 paper bigger than a4 - Greek mythology research project ideas - Jb hi fi returns policy change of mind - Quiz - How to merge fluorescent images in photoshop - Strengths and limitations of visually interpreting histograms - Du4 - The latest available data showed health expenditures - What is neis allowance - West end osteopathic clinic - How do the us marines socialize their recruits - Marissa toma (is taking) ____ en la universidad. - Basic wildlife licence application form - Case problem 1 pelican stores managerial report - University of warwick grading system - Dell sc420 spec sheetdell sc420 spec sheet - I need 400 words to edit and proofread my 4 medical cases - Mexican restaurants near cumberland mall - 501c1 - Ivanhoe grammar general excellence scholarship - An electron with an initial velocity - Administration and Supervision in Criminal Justice - Chapter 7 - United states corporation agents inc legalzoom - Hot air balloon hanging planter - What is more important and why, the preservation of civil liberties or the preservation of civil right. - Oh my darling clementine history - Henley and grange rsl - Help with HW ASAP - Unintended consequence crossword - Ocr f322 june 2013 mark scheme - Exam paper generator software free download - Bill nye heat transfer conduction convection and radiation - Aisha bint abu bakr contribution to islam - Properties of operations worksheet - Complete Every Individual Project in my HR class - Power point - End of day checklist - The handsomest drowned man in the world plot - Daniel radcliffe raps periodic table - Carrying capacity and demographics lab - Rabbit proof fence gracie - Broadmeadows library trading hours - Discussion - Gibbs reflective model journal - Southern commerce bank tampa fl - Introduction to health care management buchbinder pdf - Library lessons for autistic students - Discussion question 500 words - Using effective communication to identify client needs and expectations - Rogerian speech discussion - Aafia siddiqui background - Abercrombie and fitch case study pdf - 4a bastille close padstow heights - Long term goals for nurse practitioner student - Information - Should parents let their child play football argumentative essay - MGT312T Week 4 Knowledge Check SCORE 100 PERCENT - Immigrants in our own land questions and answers - Gas forming reactions worksheet - What is an anticipatory set in a lesson plan - Service output demand template - Humble oil field map - Business & corporate law AUSTRALIA - Adverse Impact - Supplier power tends to be low when - The mask you live in discussion questions - Question 5 (a) and (b) - Investment banking cover letter - Child observation paper for child development - Gnomeo and juliet google docs - Biome activity high school - Accessdata registry viewer download - 300 words story in english - Unbowed a memoir chapter 1 summary - A bipartisan agenda for change - What is culture shock in sociology - Keratinized stratified squamous epithelium - Mlc masterkey personal super - Snhu fin 320 final project part 3 - Health Behavior Discussion - Audit staffing memo - Toby groves sentenced - Discussion responses x 10 - Arrived at fedex location hagerstown md - Nourish your little piggies foot mask - Mres developmental neuroscience and psychopathology - What is the difference between hindustani and carnatic music - I need 2 pages on International Sales and Marketing . - 25 50 75 a dollar song - Using the data information knowledge wisdom continuum essay - Cost accounting chapter 3 solutions - Becky frankiewicz net worth - Heuristic optimization of query trees examples - Please stop calling my zebra in class she grunts