Free Essay

Implementation of Pgp

In:

Submitted By swatigarg01
Words 327
Pages 2
ABSTRACT
Implementation of Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP), is a cryptosystem used for the purpose of secure e-mail message communication over an open network. The main idea behind introducing PGP, introduced is to increase the degree of security and efficiency of e-mail message communication.

1 Introduction

Since the beginning of the era of e-mail message communication over open networks, the security of electronic mail (e-mail) has been a growing concern [1]. There have been several protocols developed and implemented to assure the security of such communication. These protocols provide the security services of message confidentiality and message authentication for an e-mail message, basically.

Some e-mail security protocols that have been developed include: Simple Mail Transfer Protocol (SMTP) [2], Multipurpose Internet Mail Extension (MIME), and its enhancement, known as Secure MIME (S/MIME) [3]. Other protocols are: Certified Exchange of Electronic Mail (CEEM) [4], Secure E-mail Protocol (SEP) [5], Privacy Enhanced Mail (PEM) [6] etc. We will implement PGP(Pretty Good Protocol) which is the most popular protocol used nowadays in order to provide email security over the network.

Pretty Good Privacy (PGP) [7] is an integrated cryptographic system, invented by Phillip Zimmerman in 1991, in order to establish the integrity, authenticity, compactness, confidentiality, and compatibility of e-mail message communication. Since its invention, PGP has been one of the most successful cryptographic systems used for e-mail security [7], because it has come to offer a comprehensive system that covers a wide variety of security issues.

Drawbacks of PGP:-

However, a major drawback of PGP can be seen in its unfair (incomplete) repudiation service, where there is a chance of false repudiation to occur [5]. False repudiation simply means the denial of such e-mailing service by one (or more) parts of e-mail communication [5]. This might be done in order to achieve an illegal benefit or deny a related commitment to such communication service.

Similar Documents

Premium Essay

Comparative Pricing

...Submitted by: Group 10 Vineet Prashant Toppo | PGP/18/116 | Harshada Wasade | PGP/18/119 | Yaman Rai | PGP/18/120 | Avinash J. | PGP/18/000 | Submitted by: Group 10 Vineet Prashant Toppo | PGP/18/116 | Harshada Wasade | PGP/18/119 | Yaman Rai | PGP/18/120 | Avinash J. | PGP/18/000 | Comparative Pricing and associated consumer behaviour Project on Pricing Comparative Pricing and associated consumer behaviour Project on Pricing Contents Executive Summary 2 Introduction 3 Comparative Pricing 3 Objective 4 Research Methodology 4 Literature Review 4 Case Study: Apple’s Pricing Strategy 5 Executive Summary This paper is an attempt to study the correlation between consumer behavior and consumer decision making cycle with pricing of a product or a service. Studies are made on comparative pricing through existing secondary sources. In order to understand the relative variations in consumer behavior across different variety of consumers primary research has been done. The findings have been interesting and the implications of findings have been found. Literature review has been done to identify the gaps in the existing literature. Learnings from literature review has also been incorporated. Case study of apple and the strategies used by them have been elaborately discussed. This insights from our study can be used for further scope of research in this domain. Introduction Pricing is an integral part of the Marketing Mix (4 P’s). Whereas...

Words: 1652 - Pages: 7

Premium Essay

Nt1330 Unit 3 Assignment 3 Encryption Methods

...(TDE) safeguards sensitive data against unauthorized access from outside of the database environment by encrypting data at rest. It prevents privileged and unauthorized operating system users from directly accessing sensitive information by inspecting the contents of database files” (Oracle, 2013).This would affect all the information in the database and would need to be agreed upon by the other businesses sharing this server. Oracle encryption does not allow encryption to be installed for only one schema so it would need to be installed across the server no matter if the other businesses are using it or not. So the cost is much higher due to the full disk encryption but does pose opportunities for other businesses to share the cost of implementation. Adding Oracle encryption would be a huge burden on the company unless they can get the other businesses within the company to share the cost. I discussed this with the database team, which already has a contract with the Oracle Company. They did not have an issue with adding this to the existing environment, but said there is a very high cost in adding this feature. In addition, there is a new license fee that must be purchased for the server because of the new technology being...

Words: 1011 - Pages: 5

Premium Essay

Report on Hcl Infosystems - Bism

...BUSINESS INFORMATION SYSTEMS (INTERIM REPORT SUBMISS ION) TITLE OF THE PROJECT Study HCL as an Information System vendor and analyze how they manage business partners and alliances in the IS projects GROUP 10 | SECTI ON C Ajinkya Lokare | PGP/16/121 Bahniman Rynjah | PGP/16/137 Bala Meenakshi | PGP/16/138 Saumya Khetarpal | PGP/16/163 Shyam Prasath B | PGP/16/171 SCOPE OF THE PROJECT In HCL technologies, the partners play a big role to drive ecosystem based innovation. They offer world class solutions across different industry verticals which are further strengthened by partnerships with global technology vendors/suppliers, customers and niche solution providers. Their partner ecosystem consists of close to 100 partners in various technology areas, consisting of go-to-market alliances, specialist partners for niche technologies and teaming partnerships for specific customers. The aim of this project is to critically analyze HCL, specifically as an information system vendor and study its partnership with well known international/national companies like SAP, Oracle and IBM to name a few and to perform a stakeholder analysis for understanding the synergies of the partnerships and the future of HCL in this particular segment. SOURCES OF INFORMATION (PRIM ARY/SECONDARY): Primary: Employees/ ex employees of SAP, HCL, IBM and Oracle Secondary: Website: www.hcltech.com Annual reports and other project description as documented by the organization Market reports, white...

Words: 627 - Pages: 3

Free Essay

Pgp Appliance in Email

...through many networks over the internet, there grows a large number of longstanding security shortcomings of email in communication technology and email security becomes one of the most challenging areas in Internet security system. To solve this security concern, Pretty Good Privacy (PGP) protocol is used. PGP will give cryptographic privacy by confidentiality process and message integrity and authentication by creating a digital signature. 1. Aims of the Thesis • To improve email security • To study the operations of PGP protocol • To understand the role of cryptography in computer and network security areas • To propose the effectiveness of applying the hybrid encryption system (i.e., applying the two encryption systems together) 1.2 Pretty Good Privacy (PGP) PGP stands for Pretty Good Privacy protocol, which was originally developed by Philip R.Zimmermann in 1991 [13]. PGP is an electronic mail security program that gives users privacy and authentication. As PGP is based on a distributed network of individuals, it is preferable to email, one of the most widely-used messaging application of the internet services. The two main fundamental services that PGP provide are the authentication of the...

Words: 3766 - Pages: 16

Premium Essay

Organizational Innovation at Sap Labs India

...Organizational Behaviour-II Project On Organizational Innovation at Submitted to Prof. Manish Kumar Submitted by Section C Group: 6 PGP/16/128- Anand Ganesh Patil PGP/16/149- Irshad Anwar PGP/16/150- Mohamed Anas PGP/16/155- Prabhu P PGP/16/159- Ram Kumar Venkatesh PGP/16/171- Shyam Prasath B Organizational Behaviour-II Acknowledgement We would like to thank our Organizational Behaviour-II Professor Prof Manish Kumar for guiding us throughout the project and providing valuable inputs. We would also like to thank the employees and management of SAP Labs India Pvt. Ltd., Bangalore for extending their help to understand the organization and providing us valuable insights about the innovation and change process in SAP. 1|Page Organizational Behaviour-II Table of Contents 1. 2. 3. 4. 5. 6. 7. 8. 10. 11. 12. 13. An Overview of the Company ............................................................................................ 3 The Dilemma ...................................................................................................................... 3 Need for Innovation ............................................................................................................ 4 Organizational Innovation .................................................................................................. 4 Technological Changes....................................................................................................... 5 Products & Services...

Words: 2762 - Pages: 12

Premium Essay

Pretty Good Privacy

...demand for secure web services grows. There are two types of threats to the web services : 1.1 Passive attacks : It is eavesdropping on network traffic between browser and server and gaining access to information on a web site that is supposed to be restricted. 1.2 Active attack : It includes impersonating another user, altering messages in transit between client and server and altering information on a web site. In all distributed environment electronic mail is the most heavily used network based application. It is the only application that is widely used across all architecture and vendor platforms. Users expect to be able to and do, send mail to others who are connected directly or indirectly to the internet. PGP(Pretty Good Privacy) is an open-source freely available software for E-Mail security. It provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption, compression using the ZIP algorithm, E-Mail compatibility using the radix-64 encoding scheme and segmentation and reassembly to accommodate long e-mails. Chapter 2 Review of literature tells the need and appraisal of e-mail security Software. E-mail is well established as a prime means of communication for business purposes that is quicker and cheaper than more traditional methods. Thus is necessary to make one’s corporate messaging system as secure as...

Words: 27771 - Pages: 112

Premium Essay

Isb Essays Abhinav

...Essay #1: Attitude, skills and knowledge differentiate people. Elaborate with two examples on how you would differentiate yourself from other applicants to the PGP. (300 words max) “Abhinav is the role model of dedication and sincerity”, said my Project Manager during my farewell at Wipro. I have a very strong work ethic – deadlines, promises and targets hold great meaning for me. Starting off my career as a technical consultant for client Bacardi, I quickly ramped up and started handling complex deliverables. A month before the project completion, I had a road accident, injuring my right hand and foot badly. Since the project was running on tight deadlines, I was concerned that my absence would burden my colleagues. So, though I could barely move my hand and foot, I resumed work within 2 days. Seeing my condition, my managers asked me to take leave. Yet, because I knew the team needed me, I continued to work so that we could deliver the project on time. Over the next few weeks, I even supported the team on weekends, and together, we successfully met the deadline. The feeling of satisfaction this gave me is indescribable. The other attribute that differentiates me is self-discipline. I consider fitness an important part of my life. Till last year, I had a BMI of 26.8 and weighed 86kgs. Knowing that this could affect my health badly, I started a regular intensive workout regime. In 6 weeks, I reduced 16kilos, and started feeling fitter! Since then, I workout religiously and...

Words: 1284 - Pages: 6

Premium Essay

Logical vs Physical Topology

...Abstract E-commerce has presented a new way of doing business all over the world using internet. Organizations have changed their way of doing business from a traditional approach to embrace ecommerce processes. As individuals and businesses increase information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an e-commerce transaction. The purpose of this paper is to present a token based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm that is capable of satisfying security objectives by using token based secure Keywords: Trusted Third Party (TTP), Pretty Good Privacy (PGP), Secure Socket layer (SSL), Secure Electronic Transaction (SET). 1. INTRODUCTION E-commerce refers to a wide range of online business activities for products and services. Security is the basic need to secure information on internet. It also pertains to any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact. A security objective is the contribution to security that a system or a product is intended to achieve. E-commerce has become a dynamic force, changing all kinds of business operations world-wide. E-commerce is conducted on global network i.e. Internet which is un-trusted. So confidentiality is required during transmission and it must be kept secure against all type of threats The related...

Words: 2757 - Pages: 12

Free Essay

Analysis, Recommendations of Decrease in Box Office Hits in Film Industry

...Business Research Methods (2014) Decreasing number of box office hits per year in Telugu film industry (Tollywood) - analysis and recommendations Business Research Methods Submitted to Dr Arun Abraham Elias Victoria Management School Victoria University of Wellington New Zealand Submitted by M Rohit PGP/17/151 – Section C Indian Institute of Management, Kozhikode India M Rohit (PGP/17/151) Page 1 Business Research Methods (2014) Abstract This paper talks about the emergence of Telugu films and subsequent growth and development of Telugu film industry (Tollywood). Indian film industry on a whole is facing serious issue in the decrease in number of hits per year. An attempt has been made to study this trend in Tollywood. Entertainment industry is a major source of income in the Indian GDP. Hence this topic of research has been chosen. The industry has seen transformation from Puranas to mass folklore to technological breakthroughs in the form of colour films and many more innovations. Tollywood holds a special place in Indian film industry in terms of quality of films, number of films released, box office collections and cultural and political impacts on India. This paper approaches the industry with behaviour over time analysis and then identifies various stakeholders involved in this complex network. The paper gives a brief idea of the effects of various parties on the industry. An attempt has been made to address various issues relating to technology,...

Words: 4198 - Pages: 17

Free Essay

Towards a Pragmatic Land Acquisition Policy for Industrial Use

...Towards a Pragmatic Land Acquisition Policy for Industrial Use - Indian Economy Project Report Group 8 Isha Mani Ganesh Jithin CR PGP/15/283 Manju Nair PGP/15/288 Manish Govindan PGP/15/287 Prem Sarath 1|P ag e PGP/15/280 PGP/15/304 Contents 1. Introduction................................ ................................ ................................ ............................... 3 2. Land Acquisition Act, 1894 ................................ ................................ ................................ ......... 3 The Process ................................ ................................ ................................ ............................... 3 Definition of Public Purpose................................ ................................ ................................ ....... 4 Compensation and Valuation ................................ ................................ ................................ ..... 4 3. Land Acquisition and Rehabilitation and Resettlement Bill 2011 ................................ ................ 4 4. Land Acquisition across the Globe................................ ................................ .............................. 8 5. Case Studies of Land Acquisition in India ................................ ................................ .................... 9 6. Reforms and Recommendations ................................ ................................ ..........................

Words: 2811 - Pages: 12

Premium Essay

Microeconomic Scenario of the Crude Oil Industry

...MICROECONOMICS TERM PAPER: AN OVERVIEW OF THE CRUDE OIL INDUSTRY Group 3: ASEEM ROHATGI | PGP 14 -010 | DHEER VORA | PGP 14 -015 | KARANVIR SIDANA | PGP 14 -025 | PURBASHISH GANGULY | PGP 14-046 | SIDDHI AGARWAL | PGP 14 -067 | SPREHA KANIKA | PGP 14 -069 | THE CRUDE OIL INDUSTRY Crude oil industry is the largest industry in the world in terms of dollar value. Crude oil or petroleum satisfies almost 33.6% of the world energy needs. It is also the most traded energy resource in the world. The demand side factors are guided by the energy needs of the world which is still dependent on non-renewable sources, while supply is determined by oil rich countries. The prices are fluctuating owing to influence of the spot market. Trends in Demand An above average GDP growth in non OECD countries has significantly pushed the demand for all types of energy in an upward direction. Where the consumption of energy by OECD countries has remained steady with the growth rate of 0.9%, the non-OECD nation’s growth rate reached 5.5% in 2010. Even though there has been a significant upsurge in all types of energy, oil still remains the world’s leading fuel. In the current scenario, where the global oil consumption is surging, the production is unable to match such high growth. In the year 2011, the demand grew by 3.1% whereas the increase in supply was only for 2.1%, attributing to the implementation of OPEC production interruptions since late 2008. Therefore the unmatched demand and...

Words: 2386 - Pages: 10

Premium Essay

Rohan

...Indian Institute of Management Bangalore Customer Relationship Management Faculty: Prof. G. Shainesh Term VI PGP (2008-09) 3 Credit Course Background – The primary purpose of any business is to win and keep customers. Its competitors also seek to do the same. Most successful firms have developed capabilities for attracting customers through their marketing programs. But they have shown mixed results when it comes to retaining these customers. Customer Relationship Management helps businesses in successfully implementing strategies aimed at winning and retaining customers profitably. It is also helping businesses shift from a short-term transaction based mode of operation in their interactions with customers to a long-term relationship mode. Objectives – The objective of this course is to help students understand the concept and practice of CRM derived from research and applications across businesses. These concepts and applications from real life case studies will help identify opportunities, which can be successfully implemented for long term profitability. Pedagogy – The teaching methodology will include a mix of lectures, discussions of pre-readings, presentations by practitioners, exercises and case analysis. The cases are integrative in nature but will also help develop an appreciation of specific elements of CRM. Group Project – Option 1 - Identify any organisation which is practicing some form of CRM. Start working with them to understand...

Words: 1490 - Pages: 6

Premium Essay

Salesoft

...Case Study – SaleSoft Section C – Group 11 Consumer Behaviour Section - C Group – 11 Name Aman Srivastava Deepak Sudhakar Krishna Bajaj Prasanna Patange Richa Singh Saikiran Pollamarasetty Vivek Gupta PGP 2011-13 Roll Number PGP2011532 PGP2011617 PGP2011696 PGP2011770 PGP2011823 PGP2011843 PGP2011944 Page 1 Case Study – SaleSoft Section C – Group 11 EXECUTIVE SUMMARY SaleSoft, Inc. is a 2 year old company in the Software Automation industry. It was founded by Gregory Miller in 1993, who is the CEO. The company currently markets a product called PROCEED which is a Comprehensive Sales Automation System (CSAS). It integrates and automates various functions across the organization which helps in bringing down order cycle time and improving efficiency. However, the product is still incomplete and will take around 8 months and USD 1 million dollars to be completed. SaleSoft also recognizes that a portion of its consumer base wants a product that is based on the completed part of PROCEED (Sales System) but offers greater functionality (Sales Forecasting). This product, called Trojan Horse (TH), if developed will take 3 months and USD 200000 to be completed. It is much cheaper than PROCEED. However, SaleSoft doesn’t have the resources to either develop or market the 2 products simultaneously. Further, it has already spent a substantial amount of money on the development of PROCEED. But the sales of PROCEED are not satisfactory and...

Words: 2639 - Pages: 11

Premium Essay

Sale Soft Case Study Analysis

...Case Study – SaleSoft Section C – Group 11 Consumer Behaviour Section - C Group – 11 Name Aman Srivastava Deepak Sudhakar Krishna Bajaj Prasanna Patange Richa Singh Saikiran Pollamarasetty Vivek Gupta Roll Number PGP2011532 PGP2011617 PGP2011696 PGP2011770 PGP2011823 PGP2011843 PGP2011944 PGP 2011-13 Page 1 Case Study – SaleSoft EXECUTIVE SUMMARY Section C – Group 11 SaleSoft, Inc. is a 2 year old company in the Software Automation industry. It was founded by Gregory Miller in 1993, who is the CEO. The company currently markets a product called PROCEED which is a Comprehensive Sales Automation System (CSAS). It integrates and automates various functions across the organization which helps in bringing down order cycle time and improving efficiency. However, the product is still incomplete and will take around 8 months and USD 1 million dollars to be completed. SaleSoft also recognizes that a portion of its consumer base wants a product that is based on the completed part of PROCEED (Sales System) but offers greater functionality (Sales Forecasting). This product, called Trojan Horse (TH), if developed will take 3 months and USD 200000 to be completed. It is much cheaper than PROCEED. However, SaleSoft doesn’t have the resources to either develop or market the 2 products simultaneously. Further, it has already spent a substantial amount of money on the development of PROCEED. But the sales of PROCEED are not satisfactory and customers are demanding a complete product. SaleSoft...

Words: 2639 - Pages: 11

Premium Essay

Cost-Quality Trade Off

...Expert Systems with Applications 41 (2014) 1830–1846 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa A new multi-objective multi-mode model for solving preemptive time–cost–quality trade-off project scheduling problems Madjid Tavana a,b,⇑, Amir-Reza Abtahi c, Kaveh Khalili-Damghani d a Business Systems and Analytics Department, Lindback Distinguished Chair of Information Systems and Decision Sciences, La Salle University, Philadelphia, PA 19141, USA Business Information Systems Department, Faculty of Business Administration and Economics, University of Paderborn, D-33098 Paderborn, Germany c Department of Knowledge Engineering and Decision Sciences, University of Economic Sciences, Tehran, Iran d Department of Industrial Engineering, South-Tehran Branch, Islamic Azad University, Tehran, Iran b a r t i c l e i n f o a b s t r a c t Considering the trade-offs between conflicting objectives in project scheduling problems (PSPs) is a difficult task. We propose a new multi-objective multi-mode model for solving discrete time–cost–quality trade-off problems (DTCQTPs) with preemption and generalized precedence relations. The proposed model has three unique features: (1) preemption of activities (with some restrictions as a minimum time before the first interruption, a maximum number of interruptions for each activity, and a maximum time between interruption and restarting); (2) simultaneous...

Words: 11435 - Pages: 46