Email Security Flashcards
1
Q
What are the steps for the sender to achieve authentication and digital signature security using PGP?
A
- Apply hash function to plaintext
- Encrypt the hash output using the private key of user A
- Append encrypted hash code with plaintext message
- Apply zip
2
Q
What are the steps for the receiver to achieve authentication and digital signature security using PGP?
A
- Unzip data to obtain message and encrypted hash code
- Decrypt encrypted hash code using public key of user A
- Apply hash code on message
- Compare between hashed message and decrypted hash code
3
Q
What are the steps for the sender to achieve confidentiality using PGP?
A
- Apply zip to plaintext
- Apply symmetric encryption using secret key to zipped plaintext
- Encrypt the secret key using the public key of user A
- Append 2. with 3.
4
Q
What are the steps for the receiver to achieve confidentiality using PGP?
A
- Decrypt secret key with private key of user A
- Using secret key, decrypt the encrypted zipped plaintext
- Unzip plaintext
5
Q
Why is PGP originally incompatible with email protocols?
A
Encryption works with 8-bit octets but most emails use ASCII text
6
Q
How does Radix-64 fix compatibility problems with PGP?
A
Radix 64 encodes binary characters to ASCII characters. Every 24 bits (6+6+6+6) is 4 ASCII characters.