Download presentation
Presentation is loading. Please wait.
Published byLucy Morgan Modified over 8 years ago
1
How Secure Email Works Stephen Smith | November 27, 2013
2
Outline Why Should I Secure My Email? Encryption Authentication Key Exchange Summary Questions
3
Why Should I Secure My Email? AKA “Why should you not?”
4
Why Should I Secure My Email? Email contains some of our most closely guarded secrets What we order from Amazon What newsletters we subscribe to Who we correspond with, and what we say to them It’s perfectly fine to be an open book But why not demand control of who you share with?
5
Why Should I Secure My Email? In business, the case is even more obvious Competitors want your data Subject: Totally Awesome Idea We Sure Hope Nobody Steals Subject: Insider Knowledge That Would Totally Tank Our Stock If It Were Released Today Subject: Current Salary And Benefits Package For Employee Our Competitors Want To Poach
6
Encryption Making sure the message can’t be read
7
Encryption Two different types Symmetric and Public-Key Symmetric What most people think of Password A to encrypt, Password A to decrypt The problem with using this for email Everyone who can encrypt messages to you can also decrypt every message sent to you Bad things.
8
Public-Key Cryptography Message is encrypted with public key Closing the padlock Message is decrypted with private key Literal key to lock Many can encrypt Only one can decrypt
9
Authentication Making sure the message REALLY came from them
10
Authentication Reverse of encryption process Encrypt with private key Decrypt with public key Adds no security But proves you touched the message
11
Key Exchange AKA, “How do you send the keys securely, smart guy?”
12
Key Exchange If encryption depends on keys, how do you send the keys? Encrypt them, of course! Wait…
13
Diffie-Hellman-Merkle Protocol We each buy two jugs of paint from Home Depot One common colour we’ve agreed on One secret colour only we know about We go home, mix the two colours, and send half our mixture to each other We then mix each half together in our own houses We are now guaranteed to have the same colour, without ever communicating it This is why I love crypto. So cool!
14
Summary
15
Message is encrypted with receiver’s public key Message is signed with sender’s private key Message is transmitted Message authenticity and integrity are checked with sender’s public key Message is decrypted with receiver’s private key
16
Questions?
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.