PGP Desktop Basics By  Qaisar Ayub [email_address] 2
PGP Product Components Product Components PGP desktop users are known as managed users as all settings, configurations, policies available in their PGP desktop software .
PGP Product Components PGP Whole Disk Encryption PGP NetShare PGP Virtual Disk volumes : PGP Zip PGP Messaging
Achievement We have understand the Products of PGP desktop
Terms used in PGP 01100101 00000011 01101000 Encryption Code Input in PGP Data ENCRYPTION
Decryption 01101000 Decryption Communication Media 01101000 Encrypted data Terms used in PGP
Signing 01101000 Decryption Communication Media 01101000 Encrypted data Terms used in PGP 1. The sender apply a signature using his private key 2. Data signed by private key can be verified by using sender Public key
Terms used in PGP Private key:  The key you keep very, very private. Only your private key can decrypt  data that was  encrypted using your public key. Also, only your private key can create a digital signature  that your public key can verify. Public key:  The key you distribute to others so that they can send protected messages to you (messages that can only be decrypted by your private key) and so they can verify your digital signature. Public keys are meant to be widely distributed . Key server: A repository for keys. Some companies host keyservers for the public keys of their employees, so other employees can find their public keys and send them protected messages.
Achievement We have understand the Terminologies of PGP
Cryptography Conventional Cryptography Use the same key to encrypt and decrypt the data Advantage Fast working Drawback Not suited when data need to be send some one else you don’t know. Solution PUBLIC KEY CRYPTOGRAPHY
Cryptography Public key cryptography Use the two keys Public Key (Bank account number) Private Key  (PIN/CODE) Working Public key Private key Private key Public key (keyserver.pgp.com Sender Receiver Public key Public key Send message by encrypting using private key Can view message using sender public key

More Related Content

PPTX
Key Management and Distribution
PDF
Essential Guide to Protect Your Data [Key Management Techniques]
PPTX
Key management
PPT
DOCX
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
PPT
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
PDF
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
Key Management and Distribution
Essential Guide to Protect Your Data [Key Management Techniques]
Key management
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
What is SSL ? The Secure Sockets Layer (SSL) Protocol
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB

Similar to PGP desk top basis lecture 002 (20)

PPT
PGP keys Configuration
PPTX
Pgp pretty good privacy
PPT
Phil Zimmerman Netiva Caftori Pgp
PPTX
E mail security
PDF
PBU-Intro_to_PGP
PPT
OpenPGP/GnuPG Encryption
PDF
Introduction PGP-GPG Subkey Management
PDF
Email Security Pretty Good Privacy (PGP),Services Provided by PGP.pdf
PPTX
Pretty good privacy
PPT
Cryptography
PPT
Lecture 8 mail security
PPT
PGP managing Key Lecture 007
PPT
electronic mail security for authent.ppt
PPTX
Pretty_Good_Privacy_Method_Cryptography .pptx
PDF
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
PPTX
Introduction to Cryptography & PGP
PGP keys Configuration
Pgp pretty good privacy
Phil Zimmerman Netiva Caftori Pgp
E mail security
PBU-Intro_to_PGP
OpenPGP/GnuPG Encryption
Introduction PGP-GPG Subkey Management
Email Security Pretty Good Privacy (PGP),Services Provided by PGP.pdf
Pretty good privacy
Cryptography
Lecture 8 mail security
PGP managing Key Lecture 007
electronic mail security for authent.ppt
Pretty_Good_Privacy_Method_Cryptography .pptx
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
Introduction to Cryptography & PGP
Ad

Recently uploaded (20)

PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
advance database management system book.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Trump Administration's workforce development strategy
PDF
Empowerment Technology for Senior High School Guide
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Virtual and Augmented Reality in Current Scenario
LDMMIA Reiki Yoga Finals Review Spring Summer
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
advance database management system book.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
What if we spent less time fighting change, and more time building what’s rig...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
FORM 1 BIOLOGY MIND MAPS and their schemes
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Trump Administration's workforce development strategy
Empowerment Technology for Senior High School Guide
TNA_Presentation-1-Final(SAVE)) (1).pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Ad

PGP desk top basis lecture 002

  • 1. PGP Desktop Basics By Qaisar Ayub [email_address] 2
  • 2. PGP Product Components Product Components PGP desktop users are known as managed users as all settings, configurations, policies available in their PGP desktop software .
  • 3. PGP Product Components PGP Whole Disk Encryption PGP NetShare PGP Virtual Disk volumes : PGP Zip PGP Messaging
  • 4. Achievement We have understand the Products of PGP desktop
  • 5. Terms used in PGP 01100101 00000011 01101000 Encryption Code Input in PGP Data ENCRYPTION
  • 6. Decryption 01101000 Decryption Communication Media 01101000 Encrypted data Terms used in PGP
  • 7. Signing 01101000 Decryption Communication Media 01101000 Encrypted data Terms used in PGP 1. The sender apply a signature using his private key 2. Data signed by private key can be verified by using sender Public key
  • 8. Terms used in PGP Private key: The key you keep very, very private. Only your private key can decrypt data that was encrypted using your public key. Also, only your private key can create a digital signature that your public key can verify. Public key: The key you distribute to others so that they can send protected messages to you (messages that can only be decrypted by your private key) and so they can verify your digital signature. Public keys are meant to be widely distributed . Key server: A repository for keys. Some companies host keyservers for the public keys of their employees, so other employees can find their public keys and send them protected messages.
  • 9. Achievement We have understand the Terminologies of PGP
  • 10. Cryptography Conventional Cryptography Use the same key to encrypt and decrypt the data Advantage Fast working Drawback Not suited when data need to be send some one else you don’t know. Solution PUBLIC KEY CRYPTOGRAPHY
  • 11. Cryptography Public key cryptography Use the two keys Public Key (Bank account number) Private Key (PIN/CODE) Working Public key Private key Private key Public key (keyserver.pgp.com Sender Receiver Public key Public key Send message by encrypting using private key Can view message using sender public key