SlideShare a Scribd company logo
Design and Analyze
Secure Networked Systems
5
Prof. Edward Chow @ Colorado Univ.
Note by waegaein@github.com
Software Signing
• Provide ways to verify authenticity and integrity of software
which are distributed via web.
• GPG
GNU Privacy Guard (GnuPG or GPG) is a tool for secure
communication. It can be used to generate public/private key pair.
• PGP
Pretty Good Privacy (PGP) is encryption program that follows
OpenPGP standard for encyption/decryption of data.
Sign Software
1. Finish a version for release.
2. Generate MD5 and SHA1 message digest of the software.
3. Generate PGP signature of the digest, using private key.
4. Distribute the software with the signature.
5. Distribute the public key, which pairs with the private key
used for signing, to key servers.
Sign Software
Key server
Version
for release
Mirror site
Software Author
Sign Software
Key server
Version
for release
Message
DigestHash
e.g.
SHA-256
Mirror site
Software Author
Sign Software
Key server
Version
for release
Message
DigestHash
e.g.
SHA-256
(private key) Mirror site
Software Author
Encrypt
Sign Software
Key server
Version
for release
Message
DigestHash
e.g.
SHA-256
(private key)
Software
Distribution
Mirror site
Software Author
Encrypt
Sign Software
Key server
Upload distribution
Version
for release
Message
DigestHash
e.g.
SHA-256
(private key)
Software
Distribution
Mirror site
Software Author
Encrypt
Sign Software
Software Author Key server
Upload public key
Upload distribution
Version
for release
Message
DigestHash
e.g.
SHA-256
Encrypt
(private key)
Software
Distribution
Mirror site
Verify Software
1. Download software and its signature.
2. Retrieve public key from key server.
3. Decrypt the signature into a digest.
4. Generate a digest by hashing the software.
5. If the two digests are identical, the software is verified.
6. If different, the software or signature is considered to be
altered.
Verify Software
Software User
Key server
Mirror site
Verify Software
Software User
Retrieve public key
Download distribution
Key server
Mirror site
Verify Software
Software User
Retrieve public key
Download distribution
Key server
Mirror site
Verify Software
Software User
Decrypt
(public key)
Retrieve public key
Download distribution
Key server
Mirror site
Verify Software
Software User
Hash
Decrypt
(public key)
Retrieve public key
Download distribution
Key server
Mirror site
Verify Software
Software User
Hash
Decrypt
(public key)
=
Verified / Altered
Retrieve public key
Download distribution
Key server
Mirror site
Mirror Sites
• Voluntarily distribute software releases of other organizations
to provide faster access.
• Not managed by the original author organizations.
• Encouraged to download bundle from mirrors.
• Encouraged to download hash and signatures only from the
original.
PKI vs PGP
• PKI
• uses CA to vet and bind public
keys to user ID.
• takes longer to register/verify
• is centralized thus have SPOF.
• costs fee from CA.
• PGP
• uses Web of Trust (Key servers)
to vet and bind public key to
user ID.
• is hard to revoke keys
• is distributed.
• is free.
Misc. How much is encryption safe?
• SHA-1 was cracked by Google 2017.
• … This took the equivalent processing power as 6,500 years of single-CPU computations and
110 years of single-GPU computations …
• 110 years of single-GPU
== 1 year of 110 GPUs
== 24 hours of 40,150 GPUs
== 1 hour of 963,600 GPUs
== 1 minute of 57,816,000 GPUs
== 10 seconds of 346,896,000 GPUs (== 9,435,571,200,000 KRW for only GPUs…)

More Related Content

PDF
Design and Analyze Secure Networked Systems - 4
PDF
Secure Software Distribution in an Adversarial World
PDF
How to Build a Custom Plugin in Rundeck
PDF
HashiTalks 2020 - Chef Tools & Terraform: Better Together
PPTX
Pwning the Enterprise With PowerShell
PPTX
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
ODP
Kali linux and some features [view in Full screen mode]
Design and Analyze Secure Networked Systems - 4
Secure Software Distribution in an Adversarial World
How to Build a Custom Plugin in Rundeck
HashiTalks 2020 - Chef Tools & Terraform: Better Together
Pwning the Enterprise With PowerShell
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
Kali linux and some features [view in Full screen mode]

What's hot (20)

PDF
Secrets as Code
PPTX
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
PDF
Integrating Icinga 2 and ntopng - Icinga Camp Milan 2019
PDF
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
PDF
New Products Overview: Use Cases and Demos
PDF
Building security into the pipelines
PPT
Major project presentation
PPTX
Network Intelligence for a secured Network (2014-03-12)
PDF
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
PDF
Practical Guide to Securing Kubernetes
PDF
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
PPTX
An Adversarial View of SaaS Malware Sandboxes
PDF
CNIT 128 3. Attacking iOS Applications (Part 1)
PPTX
Prowler: BlackHat Europe Arsenal 2018
PDF
Building layers of defense for your application
PDF
Shamoon
PDF
Compliance as Code Everywhere
PPTX
Pentest Apocalypse
PDF
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
PPTX
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Secrets as Code
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
Integrating Icinga 2 and ntopng - Icinga Camp Milan 2019
[muCon2017]DevSecOps: How to Continuously Integrate Security into DevOps
New Products Overview: Use Cases and Demos
Building security into the pipelines
Major project presentation
Network Intelligence for a secured Network (2014-03-12)
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Practical Guide to Securing Kubernetes
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
An Adversarial View of SaaS Malware Sandboxes
CNIT 128 3. Attacking iOS Applications (Part 1)
Prowler: BlackHat Europe Arsenal 2018
Building layers of defense for your application
Shamoon
Compliance as Code Everywhere
Pentest Apocalypse
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ad

Similar to Design and Analyze Secure Networked Systems - 5 (20)

PDF
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
PDF
Securing Source Code on Endpoints
PDF
Oh The Places You'll Sign.pdf
PPT
Network security-primer-9544
PDF
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
PPT
Open source technology
PPTX
Node.js Module: I Choose You!
PPTX
Password Pusher Media Resources
PPTX
presentation_finals
PDF
Implementing Microservices Security Patterns & Protocols with Spring
PPT
BlackDuck Suite
PPTX
CryptoGraphy Module in Mulesoft
PDF
Abusing bleeding edge web standards for appsec glory
PDF
Open source software governance with DejaCode
PPTX
Open source technologies
PDF
ZKorum: Building the Next Generation eAgora powered by SSI
PDF
Cyanogen Platform SDK
PDF
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
PDF
Open Source & What It Means For Self-Sovereign Identity (SSI)
PDF
Safeguarding artifact integrity in your Software Supply Chain
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
Securing Source Code on Endpoints
Oh The Places You'll Sign.pdf
Network security-primer-9544
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
Open source technology
Node.js Module: I Choose You!
Password Pusher Media Resources
presentation_finals
Implementing Microservices Security Patterns & Protocols with Spring
BlackDuck Suite
CryptoGraphy Module in Mulesoft
Abusing bleeding edge web standards for appsec glory
Open source software governance with DejaCode
Open source technologies
ZKorum: Building the Next Generation eAgora powered by SSI
Cyanogen Platform SDK
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
Open Source & What It Means For Self-Sovereign Identity (SSI)
Safeguarding artifact integrity in your Software Supply Chain
Ad

More from Don Kim (10)

PDF
Clean Code - 5
PDF
Clean Code - 4
PDF
Clean Code - 3
PDF
Clean Code - 2
PDF
Clean Code - 1
PDF
Design and Analyze Secure Networked Systems - 7
PDF
Design and Analyze Secure Networked Systems - 6
PDF
Design and Analyze Secure Networked Systems - 3
PDF
Design and Analyze Secure Networked Systems - 2
PPTX
Design and Analyze Secure Networked Systems - 1
Clean Code - 5
Clean Code - 4
Clean Code - 3
Clean Code - 2
Clean Code - 1
Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 6
Design and Analyze Secure Networked Systems - 3
Design and Analyze Secure Networked Systems - 2
Design and Analyze Secure Networked Systems - 1

Recently uploaded (20)

PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Website Design Services for Small Businesses.pdf
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
Cost to Outsource Software Development in 2025
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
Salesforce Agentforce AI Implementation.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Why Generative AI is the Future of Content, Code & Creativity?
Patient Appointment Booking in Odoo with online payment
iTop VPN Crack Latest Version Full Key 2025
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Operating system designcfffgfgggggggvggggggggg
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
17 Powerful Integrations Your Next-Gen MLM Software Needs
Digital Systems & Binary Numbers (comprehensive )
Design an Analysis of Algorithms I-SECS-1021-03
Reimagine Home Health with the Power of Agentic AI​
Oracle Fusion HCM Cloud Demo for Beginners
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Advanced SystemCare Ultimate Crack + Portable (2025)
Website Design Services for Small Businesses.pdf
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Cost to Outsource Software Development in 2025
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025

Design and Analyze Secure Networked Systems - 5

  • 1. Design and Analyze Secure Networked Systems 5 Prof. Edward Chow @ Colorado Univ. Note by waegaein@github.com
  • 2. Software Signing • Provide ways to verify authenticity and integrity of software which are distributed via web. • GPG GNU Privacy Guard (GnuPG or GPG) is a tool for secure communication. It can be used to generate public/private key pair. • PGP Pretty Good Privacy (PGP) is encryption program that follows OpenPGP standard for encyption/decryption of data.
  • 3. Sign Software 1. Finish a version for release. 2. Generate MD5 and SHA1 message digest of the software. 3. Generate PGP signature of the digest, using private key. 4. Distribute the software with the signature. 5. Distribute the public key, which pairs with the private key used for signing, to key servers.
  • 4. Sign Software Key server Version for release Mirror site Software Author
  • 5. Sign Software Key server Version for release Message DigestHash e.g. SHA-256 Mirror site Software Author
  • 6. Sign Software Key server Version for release Message DigestHash e.g. SHA-256 (private key) Mirror site Software Author Encrypt
  • 7. Sign Software Key server Version for release Message DigestHash e.g. SHA-256 (private key) Software Distribution Mirror site Software Author Encrypt
  • 8. Sign Software Key server Upload distribution Version for release Message DigestHash e.g. SHA-256 (private key) Software Distribution Mirror site Software Author Encrypt
  • 9. Sign Software Software Author Key server Upload public key Upload distribution Version for release Message DigestHash e.g. SHA-256 Encrypt (private key) Software Distribution Mirror site
  • 10. Verify Software 1. Download software and its signature. 2. Retrieve public key from key server. 3. Decrypt the signature into a digest. 4. Generate a digest by hashing the software. 5. If the two digests are identical, the software is verified. 6. If different, the software or signature is considered to be altered.
  • 11. Verify Software Software User Key server Mirror site
  • 12. Verify Software Software User Retrieve public key Download distribution Key server Mirror site
  • 13. Verify Software Software User Retrieve public key Download distribution Key server Mirror site
  • 14. Verify Software Software User Decrypt (public key) Retrieve public key Download distribution Key server Mirror site
  • 15. Verify Software Software User Hash Decrypt (public key) Retrieve public key Download distribution Key server Mirror site
  • 16. Verify Software Software User Hash Decrypt (public key) = Verified / Altered Retrieve public key Download distribution Key server Mirror site
  • 17. Mirror Sites • Voluntarily distribute software releases of other organizations to provide faster access. • Not managed by the original author organizations. • Encouraged to download bundle from mirrors. • Encouraged to download hash and signatures only from the original.
  • 18. PKI vs PGP • PKI • uses CA to vet and bind public keys to user ID. • takes longer to register/verify • is centralized thus have SPOF. • costs fee from CA. • PGP • uses Web of Trust (Key servers) to vet and bind public key to user ID. • is hard to revoke keys • is distributed. • is free.
  • 19. Misc. How much is encryption safe? • SHA-1 was cracked by Google 2017. • … This took the equivalent processing power as 6,500 years of single-CPU computations and 110 years of single-GPU computations … • 110 years of single-GPU == 1 year of 110 GPUs == 24 hours of 40,150 GPUs == 1 hour of 963,600 GPUs == 1 minute of 57,816,000 GPUs == 10 seconds of 346,896,000 GPUs (== 9,435,571,200,000 KRW for only GPUs…)