Electronic Mail Security Types of electronic mail security

  • Slides: 20
Download presentation
Electronic Mail Security

Electronic Mail Security

Types of electronic mail security Pretty Good Privacy S/Mime

Types of electronic mail security Pretty Good Privacy S/Mime

Pretty Good Privacy Developed almost entirely by Phil Zimmerman Free, worldwide, works across a

Pretty Good Privacy Developed almost entirely by Phil Zimmerman Free, worldwide, works across a variety of platforms. Based on known algorithms such as RSA

Authentication The steps for authentication are as follows – – – The sender creates

Authentication The steps for authentication are as follows – – – The sender creates a message SHA-1 is used to generate 160 -bit hash code Hash code is encrypted with RSA using senders private key Receiver uses RSA to decrypt the hash code Receiver generates a new hash code and compares with the decrypted one

Confidentiality The steps to obtain confidentiality are as follows – – – The sender

Confidentiality The steps to obtain confidentiality are as follows – – – The sender generates a message and a random 128 -bit number called the session key The message is encrypted with CAST-128 The session key is encrypted with recipients’ public key using RSA The recipient uses RSA with its private key to decrypt the session key The session key decrypts the message

Confidentiality and Authentication To have both confidentiality and authentication – – – The sender

Confidentiality and Authentication To have both confidentiality and authentication – – – The sender first signs the message using it’s own private key Then encrypts the message with the session key Then encrypts the session key with the recipient’s private key

Compression PGP compresses files using a ZIP algorithm – The signature is generated before

Compression PGP compresses files using a ZIP algorithm – The signature is generated before compression – To store the uncompressed message with the signature Would interfere with compression because of multiple compression algorithms exist. Message encryption is after compression To strengthen cryptographic security, as it reduces redundancy

Compatibility E-mail sends only ASCII characters – Because of this PGP converts message to

Compatibility E-mail sends only ASCII characters – Because of this PGP converts message to ASCII Converts three octets into four ASCII characters Expands message by 33% After compression, there is a net reduction by a third

Segmentation and Reassembly Some mail providers impose a maximum length of 50, 000 octets

Segmentation and Reassembly Some mail providers impose a maximum length of 50, 000 octets – PGP will automatically subdivide any message too large into small enough segments to send via email This is done after all other processing

Cryptographic Keys PGP uses four types of keys – – Session keys Public keys

Cryptographic Keys PGP uses four types of keys – – Session keys Public keys Private Keys Passphrase keys

S/MIME Stands for Secure/Multipurpose Internet Mail Extension Security enhancement to the MIME internet e

S/MIME Stands for Secure/Multipurpose Internet Mail Extension Security enhancement to the MIME internet e -mail format

MIME – Header Files There are five message header fields – – – MIME-Version

MIME – Header Files There are five message header fields – – – MIME-Version Content-Type Content-Transferring Encoding Content-ID Content-Description

MIME – Content Types Text Multipart Message Image Video Audio Application

MIME – Content Types Text Multipart Message Image Video Audio Application

MIME – Content Transferring Encoding Two types – Quoted printable – Used when data

MIME – Content Transferring Encoding Two types – Quoted printable – Used when data consists largely of octets. Limits message lines to 76 characters. Base 64 transfer encoding Common for encoding arbitrary binary data.

S/MIME Functionality S/MIME provides the following functions – Enveloped Data – Signed Data –

S/MIME Functionality S/MIME provides the following functions – Enveloped Data – Signed Data – Contains a digital signature Clear-signed data – Consists of encrypted content of any type of encrypted content encryption keys Encoded digital signature Signed and enveloped data Encrypted and Signed data

S/MIME – Cryptographic Algorithms Create message digest to form digital signature – Encrypt message

S/MIME – Cryptographic Algorithms Create message digest to form digital signature – Encrypt message digest to form signature – Must use SHA-1, Should support MD 5 Must support DSS, Should support RSA Encrypt session key for transmission – Should support Diffie-Hellman, Must support RSA

S/MIME – Cryptographic Algorithms Encrypt message for transmission with onetime session key – Must

S/MIME – Cryptographic Algorithms Encrypt message for transmission with onetime session key – Must support triple DES, Should support AES, Should support RC 2/40 Create a message authentication code – Must support HMAC with SHA-1, Should support HMAC with SHA-1

S/MIME – User Agent Role Key generation – Registration – Generating key with RSA

S/MIME – User Agent Role Key generation – Registration – Generating key with RSA Register a user’s public key must be registered with a certification authority Certificate storage and retrieval – Access to a local list of certificates in order to verify incoming signatures and encrypt outgoing

S/MIME – Enhanced Security Services Signed receipts – Security labels – The receiver returns

S/MIME – Enhanced Security Services Signed receipts – Security labels – The receiver returns a signed receipt back to the sender to verify the message arrived Permission, priority or role of message being sent Secure mailing lists – Sending to multiple recipients at once securely by using a public key for the whole mailing list

raw="""MIME-Version: 1. 0 Received: by 10. 229. 233. 76 with HTTP; Sat, 2 Jul

raw="""MIME-Version: 1. 0 Received: by 10. 229. 233. 76 with HTTP; Sat, 2 Jul 2011 04: 30: 31 -0700 (PDT) Date: Sat, 2 Jul 2011 13: 30: 31 +0200 Delivered-To: alain. spineux@gmail. com Message-ID: <CAAJL_=k. PAJZ=fryb 21 w. BOALp 8 -XOEL-h 9 j 84 s 3 Sjp. XYQj. N 3 Z 3 A@mail. gmail. com> Subject: =? ISO-8859 -1? Q? Dr. =20 Pointcarr=E 9? = From: Alain Spineux <alain. spineux@gmail. com> To: =? ISO-8859 -1? Q? Dr=2 E_Pointcarr=E 9? = <alain. spineux@gmail. com> Content-Type: multipart/alternative; boundary=000 e 0 cd 68 f 223 dea 3904 a 714768 b --000 e 0 cd 68 f 223 dea 3904 a 714768 b Content-Type: text/plain; charset=ISO-8859 -1