Electronic Mail Security Types of electronic mail security
- Slides: 20
Electronic Mail Security
Types of electronic mail security Pretty Good Privacy S/Mime
Pretty Good Privacy Developed almost entirely by Phil Zimmerman Free, worldwide, works across a variety of platforms. Based on known algorithms such as RSA
Authentication The steps for authentication are as follows – – – The sender creates a message SHA-1 is used to generate 160 -bit hash code Hash code is encrypted with RSA using senders private key Receiver uses RSA to decrypt the hash code Receiver generates a new hash code and compares with the decrypted one
Confidentiality The steps to obtain confidentiality are as follows – – – The sender generates a message and a random 128 -bit number called the session key The message is encrypted with CAST-128 The session key is encrypted with recipients’ public key using RSA The recipient uses RSA with its private key to decrypt the session key The session key decrypts the message
Confidentiality and Authentication To have both confidentiality and authentication – – – The sender first signs the message using it’s own private key Then encrypts the message with the session key Then encrypts the session key with the recipient’s private key
Compression PGP compresses files using a ZIP algorithm – The signature is generated before compression – To store the uncompressed message with the signature Would interfere with compression because of multiple compression algorithms exist. Message encryption is after compression To strengthen cryptographic security, as it reduces redundancy
Compatibility E-mail sends only ASCII characters – Because of this PGP converts message to ASCII Converts three octets into four ASCII characters Expands message by 33% After compression, there is a net reduction by a third
Segmentation and Reassembly Some mail providers impose a maximum length of 50, 000 octets – PGP will automatically subdivide any message too large into small enough segments to send via email This is done after all other processing
Cryptographic Keys PGP uses four types of keys – – Session keys Public keys Private Keys Passphrase keys
S/MIME Stands for Secure/Multipurpose Internet Mail Extension Security enhancement to the MIME internet e -mail format
MIME – Header Files There are five message header fields – – – MIME-Version Content-Type Content-Transferring Encoding Content-ID Content-Description
MIME – Content Types Text Multipart Message Image Video Audio Application
MIME – Content Transferring Encoding Two types – Quoted printable – Used when data consists largely of octets. Limits message lines to 76 characters. Base 64 transfer encoding Common for encoding arbitrary binary data.
S/MIME Functionality S/MIME provides the following functions – Enveloped Data – Signed Data – Contains a digital signature Clear-signed data – Consists of encrypted content of any type of encrypted content encryption keys Encoded digital signature Signed and enveloped data Encrypted and Signed data
S/MIME – Cryptographic Algorithms Create message digest to form digital signature – Encrypt message digest to form signature – Must use SHA-1, Should support MD 5 Must support DSS, Should support RSA Encrypt session key for transmission – Should support Diffie-Hellman, Must support RSA
S/MIME – Cryptographic Algorithms Encrypt message for transmission with onetime session key – Must support triple DES, Should support AES, Should support RC 2/40 Create a message authentication code – Must support HMAC with SHA-1, Should support HMAC with SHA-1
S/MIME – User Agent Role Key generation – Registration – Generating key with RSA Register a user’s public key must be registered with a certification authority Certificate storage and retrieval – Access to a local list of certificates in order to verify incoming signatures and encrypt outgoing
S/MIME – Enhanced Security Services Signed receipts – Security labels – The receiver returns a signed receipt back to the sender to verify the message arrived Permission, priority or role of message being sent Secure mailing lists – Sending to multiple recipients at once securely by using a public key for the whole mailing list
raw="""MIME-Version: 1. 0 Received: by 10. 229. 233. 76 with HTTP; Sat, 2 Jul 2011 04: 30: 31 -0700 (PDT) Date: Sat, 2 Jul 2011 13: 30: 31 +0200 Delivered-To: alain. spineux@gmail. com Message-ID: <CAAJL_=k. PAJZ=fryb 21 w. BOALp 8 -XOEL-h 9 j 84 s 3 Sjp. XYQj. N 3 Z 3 A@mail. gmail. com> Subject: =? ISO-8859 -1? Q? Dr. =20 Pointcarr=E 9? = From: Alain Spineux <alain. spineux@gmail. com> To: =? ISO-8859 -1? Q? Dr=2 E_Pointcarr=E 9? = <alain. spineux@gmail. com> Content-Type: multipart/alternative; boundary=000 e 0 cd 68 f 223 dea 3904 a 714768 b --000 e 0 cd 68 f 223 dea 3904 a 714768 b Content-Type: text/plain; charset=ISO-8859 -1
- Electronic mail security in network security
- Electronic mail security
- Electronic mail security
- Private securit
- Don would always open the mail throw away the junk mail and
- Priority mail vs priority mail express
- Google docshttps://mail.google.com/mail/u/0/#inbox
- Kelebihan email dibanding surat biasa
- Kependekan dari electronic mail adalah .... *
- Mime architecture
- Advantages and disadvantages of email
- Electronic direct
- An electronic is the electronic exchange of money or scrip
- Electronic news gathering and electronic field production
- Sonitrol verified electronic security
- Features of secure electronic transaction
- E commerce security meaning
- Woodward fieser rules for dienes examples
- Electronic spreadsheets
- Eps stands for electronic payment system
- Types of electronic communication