Electronic Mail Security

Slides:



Advertisements
Similar presentations
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Advertisements

Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Data & Network Security
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Electronic mail security -- Pretty Good Privacy.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Cryptography and Network Security Chapter 18
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Chap 81 Electronic mail security. Chap 82 Outline Pretty good privacy S/MIME Recommended web sites.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Network Security Essentials Chapter 7 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Electronic mail security Ola Flygt Växjö University, Sweden
Electronic mail security
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Pretty Good Privacy (PGP) Security for Electronic .
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
ECE-8813 / CS Prof. John A. Copeland fax Office:
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Electronic mail security PGP & S/MIME
1 Electronic Mail Security Behzad Akbari Fall 2009 In the Name of the Most High.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Electronic mail security
K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College
Security is one of the most widely used and regarded network services
Chapter 15 – Electronic Mail Security
Security Pretty Good Privacy (PGP)
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
University of Houston Network Security Datacom II Lecture 8
Security at the Application Layer: PGP and S/MIME
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Electronic mail security
Electronic Mail Security
Cryptography and Network Security
….for authentication and confidentiality PGP
Presentation transcript:

Electronic Mail Security By Jason Gratto

Types of electronic mail security Pretty Good Privacy S/Mime

Pretty Good Privacy Developed almost entirely by Phil Zimmerman Free, worldwide, works across a variety of platforms. Based on known algorithms such as RSA

Authentication The steps for authentication are as follows The sender creates a message SHA-1 is used to generate 160-bit hash code Hash code is encrypted with RSA using senders private key Receiver uses RSA to decrypt the hash code Receiver generates a new hash code and compares with the decrypted one

Confidentiality The steps to obtain confidentiality are as follows The sender generates a message and a random 128-bit number called the session key The message is encrypted with CAST-128 The session key is encrypted with recipients’ public key using RSA The recipient uses RSA with its private key to decrypt the session key The session key decrypts the message

Confidentiality and Authentication To have both confidentiality and authentication The sender first signs the message using it’s own private key Then encrypts the message with the session with the session key Then encrypts the session key with the recipient’s private key

Compression PGP compresses files using a ZIP algorithm The signature is generated before compression To store the uncompressed message with the signature Would interfere with compression because of multiple compression algorithms exist. Message encryption is after compression To strengthen cryptographic security, as it reduces redundancy

Compatibility E-mail sends only ASCII characters Because of this PGP converts message to ASCII Converts three octets into four ASCII characters Expands message by 33% After compression, there is a net reduction by a third

Segmentation and Reassembly Some mail providers impose a maximum length of 50,000 octets PGP will automatically subdivide any message too large into small enough segments to send via e-mail This is done after all other processing

Cryptographic Keys PGP uses four types of keys Session keys Public keys Private Keys Passphrase keys

Cryptographic Keys Three requirements for the keys Needs a mean of generating unpredictable session keys Would like a way to allow each user to have multiple public/private key pairs Maintain a file of the public/private key pairs

Session Key Generation Random 128-bit numbers are generated using CAST-128 Input to the number generator takes in is a 128-bit key and two 64-bit blocks of plaintext. Input is determined by keystrokes and the times the keystrokes are made Input is also effected by previous key outputs

Key identifiers With multiple private/public key pairs, there needs to be a way for the receiver to know which to use How this is done is through the combination of a 64 bit key ID, which is unique to a user ID. With this key ID, the receiver can retrieve the correct public key of the sender to decrypt the message. A list of these key ID’s are placed in what is called a key ring.

Key Rings There are both public and private key rings A user needs a passphrase key in order to retrieve a private key, or to encrypt with a private key When creating a private key The user selects the passphrase to be used The system generates a new public/private key pair using RSA, and using SHA-1 a 160-bit hash code is generated from the passphrase The system encrypts the private key using CAST-128 with the 128 bits of the hash code of the key and then the hash code is discarded

Key Ring – Signing the message PGP retrieves sender’s private key using user-id as an index. PGP prompts the user for the passphrase to recover unencrypted private key Constructs signature component of the message

Key Ring – Encrypting the Message PGP generates session key and uses it to encrypt the message PGP retrieves the recipient’s public key from it’s public-key ring using their user ID as an index The session key of the message is constructed

Key Ring – Decrypting the Message PGP retrieves the receiver’s private key from the private-key ring using the key ID in the session key component of the message as an index PGP prompts the user for the passphrase to recover the unencrypted private key PGP recovers the session key and decrypts the message.

Key Ring – Authenticating the Message PGP retrieves the sender’s public key from the public-key ring using the key ID from the signature portion of the message as an index. PGP recovers the transmitted message digest PGP computers the message digest for the received message

The Use of Trust Each public-key ring has a signature and a signature trust entry for each public key This entry indicates the degree the PGP user trusts the signer to certify public keys. Each public-key ring has a owner trust field This entry indicates the degree to which the public key is trusted to sign other public key certificates.

S/MIME Stands for Secure/Multipurpose Internet Mail Extension Security enhancement to the MIME internet e-mail format

MIME – Header Files There are five message header fields MIME-Version Content-Type Content-Transferring Encoding Content-ID Content-Description

MIME – Content Types Text Multipart Plain Enriched Mixed Parallel Alternative Digest

MIME – Content Types Message Image Video Rfc822 Partial External-body Jpeg Gif Video mpeg

Mime – Content Type Audio Basic Application PostScript Octet-stream

MIME – Content Transferring Encoding Two types Quoted printable Used when data consists largely of octets. Limits message lines to 76 characters. Base64 transfer encoding Common for encoding arbitrary binary data.

S/MIME Functionality S/MIME provides the following functions Enveloped Data Consists of encrypted content of any type of encrypted content encryption keys Signed Data Contains a digital signature Clear-signed data Encoded digital signature Signed and enveloped data Encrypted and Signed data

S/MIME – Cryptographic Algorithms Create message digest to form digital signature Must use SHA-1, Should support MD5 Encrypt message digest to form signature Must support DSS, Should support RSA Encrypt session key for transmission Should support Diffie-Hellman, Must support RSA

S/MIME – Cryptographic Algorithms Encrypt message for transmission with one-time session key Must support triple DES, Should support AES, Should support RC2/40 Create a message authentication code Must support HMAC with SHA-1, Should support HMAC with SHA-1

S/MIME – User Agent Role Key generation Generating key with RSA Registration Register a user’s public key must be registered with a certification authority Certificate storage and retrieval Access to a local list of certificates in order to verify incoming signatures and encrypt outgoing

S/MIME – Enhanced Security Services Signed receipts The receiver returns a signed receipt back to the sender to verify the message arrived Security labels Permission, priority or role of message being sent Secure mailing lists Sending to multiple recipients at once securely by using a public key for the whole mailing list