Exam Papers Encryption Project PGP Universal Server Trial Progress Report

Size: px
Start display at page:

Download "Exam Papers Encryption Project PGP Universal Server Trial Progress Report"

Transcription

1 Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well recognised encryption algorithms may 'solve' the problem of appropriately securing files in storage and in transit, the use of encryption itself does not imply complete security or confidence. Rather one problem is solved, but a number of others created, and it is dealing with these challenges that provides the overall level of security for the cryptographic system. Furthermore, there is no such thing as a 100% secure system and 'security' should be thought of as being appropriate (or not) for the task in hand. There will always be some trade-off between security and usability and this will usually be determined by user requirements and risks. For the purpose of this trial we can think of the encryption used by PGP as public-key (or asymmetric) encryption (PKE). The main requirement for the management of keys used with public key algorithms is that the private key remains secret, the integrity of the public key is guaranteed and that their use is controlled. Other issues to consider in order to securely implement public key cryptography include: key generation & storage key lifetime key usage key distribution key revocation and destruction Some of these issues were highlighted in previous trials of both PGP and GPG. In particular mistakes were made when it came to key generation and distribution (e.g users disclosing their private keys). It was also suggested that other requirements might include certain culture training (e.g. the need for general good security practices, strong passphrases, etc.), key escrow (to mitigate against the risk of 'losing' an encrypted document), and the need for some sort of Public Key Infrastructure (PKI). PGP Universal Server was identified as one product that would allow central management of keys, policies and software and possibly offer some of the benefits of PKI. This report aims to summarise the progress of the subsequent trial of PGP Universal Server and raises a number of issues which need to be addressed. PGP Universal Server Findings So Far PGP representatives initially came to OUCS on 11/09/2007 in order to help install PGP Universal Server, roll out a small number of test desktop installations, and set up an example mail policy that would allow users to invoke encryption via the subject line. Progress was halted until the turn of the year due to the discovery of a bug in PGP Universal Server's enrolment process for PGP Desktop. Following a new release of the software, the project was resumed on 10/01/2008 when a PGP representative again visited Oxford. The server was updated and the bug in the enrolment process had been dealt with to the extent that progress was possible. Installation of one Windows based client was successful. Since then PGP offered two places on a training course at PGP's headquarters in Offenbach, Germany. This was attended by myself and Tony Brett, who both returned as PGP Certified Technicians. Time since then has been spent testing the software and setting up policies. A number of 'problems' have been found with the software resulting in multiple support calls to PGP. Two of these are ongoing and include a issue relating to the original enrolment process problem (although we do have an acceptable work around). Two other calls turned out to be the result of questionable functionality, and have prompted the submission of feature requests. More issues are anticipated - initial testing of OSX installations, for example, have highlighted a number of potential problems, the extent of which should become apparent when the trial is extended to include other end users. Currently there are a number of issues that need resolving in order for the trial to progress, and these are discussed below.

2 Key Generation and Storage There are a several factors to consider when it comes to key generation and storage, and PGP Universal offers a number or options. The 'best' solution will depend on the specific user requirements. In terms of key generation PGP Universal's default settings consist of an RSA keypair with a key size of 2048 bits. RSA is common, well trusted algorithm used widely in PKE and is compatible with GPG. In today's current computing environment (i.e. in terms of processing power etc.) 2048 bits is considered a secure length for RSA keys. In terms of this project, and the options PGP Universal offers, there are two possible solutions to consider for where keys should be stored. These are Client Key Mode (CKM) and Guarded Key Mode (GKM). In CKM the keys are stored on locally on the user's machine only, whereas GKM keeps a backup copy of the user's private key (encrypted) on the server. Some of the issues with each key mode are described below. Key Type Risk Possible Mitigation Advantages CKM 1) User loses private key (e.g. disk failure) and is unable to decrypt documents. i) Documents are always encrypted to another key (see Key Escrow & ADK below) ii) Key Reconstruction is enabled (see below) User is solely in possession and charge of their own private key. This may be particularly important where non-repudiation is a requirement. GKM 2) Exposure of a user's private key. i) Key is stored encrypted on the server protected by a passphrase therefore enforce the use of strong passphrases. Backup copy of key readily available in case of loss, or in the case of a user installing further copies of PGP Desktop. Key Management and Usage Key management proved to be one of the main areas for concern following the testing of the PGP Desktop standalone client. Notably a number of users failed to keep their private keys secure, and struggled with the distribution of keys. PGP Universal Server was therefore considered for its ability to manage encryption keys and policies, with the intention of making encryption as transparent to the end user as possible. Specifically it was decided to test the possibility that an end user could invoke encryption of an via, for example, the subject line of the . The centrally controlled policy would then decide what to do with that (e.g. send encrypted, send in plaintext, reject, etc.). There are, however, a number of considerations to be made regarding this approach. These are discussed below. Encryption PGP Desktop acts as a proxy between a user's mail client and the mail server. Therefore encryption happens once an is sent. The process is simplified as follows: Sending 1) User creates message to be encrypted and clicks 'send'. 2) PGP Desktop 'intercepts' the message on the client machine and chooses whether to encrypt and send or not based on a centrally managed policy. 3) Message is sent either encrypted or in plaintext via the outbound mail server. Receiving

3 1) Incoming messages are 'intercepted' by PGP Desktop. 2) PGP Desktop will decrypt, if necessary/possible, and deliver the message. Given the requirements for this trial, the main advantage of this approach is the fact that the data is protected on the communication channel and the key management is handled by PGP Universal Server, where policies are centrally managed. All the user has to worry about when sending a message is "does this message need to be encrypted", and remembering their passphrase. Similarly the user does not need to worry about whether or not they can 'trust' incoming messages that are encrypted to them. The only thing they may need to do is enter their passphrase to be able to decrypt messages. One disadvantage with this approach, however, is that messages are stored in plaintext (i.e. not encrypted) on the client machine and encryption/decryption of messages only happens when the message is proxied by PGP Desktop. There are two main issues to be considered with the current implementation of PGP Desktop: 1) Used in this way alone PGP Desktop only protects data in transit, not in storage. 2) PGP Desktop does not proxy messages when they are copied to other folders, the most obvious example being the sent-mail folder. In the case that these folders reside on a server (e.g. an IMAP server), those messages will be transmitted and stored remotely in plaintext. There are therefore a number of possible mitigations: Mitigation Reason Disadvantage Do Nothing Do not copy messages to remote folders. Encrypt files first and send as attachments. All connections to Oxford Mail Servers are already encrypted via SSL/TLS Prevents messages being 'sent' across the network in plaintext Sensitive files stored/distributed encrypted - regardless of medium - until they are actively decrypted. i) Messages stored remotely in plaintext. ii) Other mail accounts ( and therefore servers) which allow non SSL/TLS traffic may be used. i) Users will need to store 'sentitems' folder locally - may be inconvenient. ii) Needs to be policy to say that users must only store messages in local folders. iii) May be inconvenient to the user, easily forgotten and difficult to enforce. i) Additional requirement to be able to encrypt files prior to sending. ii) Need for public key distribution - introduces traditional PKI problems (see below). Public Key Infrastructure (PKI) Should it be a requirement that users are able to encrypt files to the public encryption key of other users a few traditional PKI problems begin to appear. As already mentioned, apart from keeping private keys secure, the other main requirement for PKE is that the integrity of public keys are guaranteed and that their use is controlled. Some of the reasons behind this are briefly explained below from the point of view of the sender and recipient of encrypted communications. The sender needs to be able to: 1) Obtain the public encryption key of the intended recipient. 2) Trust that the public key they are going to use actually belongs to the intended recipient. 3) Have some assurance that the key is still valid for use.

4 The recipient needs to: 1) Make sure that their own public encryption key is available for use by others. 2) Trust the source of incoming encrypted communications. In terms of using PGP Desktop/Universal Server for this project, there are a number of available approaches. Put simply, they are to use PGP Universal Server as a key server for distribution of public keys and/or allowing users to manage their own keys. Taking the sole option of allowing users to manage their own keys takes us back to the original problems faced before the trial of PGP Universal Server so this will not be discussed here. What follows, therefore, is based on using PGP Universal Server as a key server, with the additional option of allowing users to manage their own keys. PGP Universal Key Server PGP Universal Server offers the option of running as a key server. This, basically, allows users to query the server to search for, and download, other public encryption keys. One potential drawback is that this may allow non-trusted users to obtain public keys for encryption. While public keys are supposed to be published for use by others, some authentication of the source of any correspondence is needed, as encrypted communications could be used to obfuscate malicious content such as malware. Access to the key server can be restricted by IP address and so one mitigation against this risk would be restrict access to Oxford IP addresses only. Further testing is also required to ascertain the extent to which PGP Universal Server's mail policy allows for vetting of the source of any encrypted /content. Key management As mentioned, allowing users to manage their own keyrings is an additional possibility. Some of the pros and cons are discussed below: Key Management Pros Cons Risks Possible Mitigations Users able to manage keys locally Users prevented from managing keys locally 1) Ability to download keys from server and store on local keyrings. 2) No need to look up public keys on the server every time. 3) Introduces the possibility of key expiry and revocation. 4) Users free to export their own keys either for distribution or backup purposes. 5) Users can search external key servers. 1) Reduced risk of users mismanaging their own keys (e.g. exporting private keys). 2) With the use of a closed PKI, access to users' public keys can be restricted to 1) Users could mismanage their own keys (e.g. export and distribute their private key as seen in the original trial of PGP Desktop) 2) Users could be fooled into accepting and using 'nontrusted' keys on their own keyring. 3) Users can search external key servers and possibly download/use untrusted keys. 1) Users required to query the key sever every time a public key is needed. 2) Key revocation and expiry not available. 3) Restricted key servers could a) Risk of user's private key being compromised. b) User could send encrypted files to a non-trusted destination. a) No way for other users to tell that a public key they posses should no longer be used. Therefore: i) They could encrypt sensitive files to that i) User education. i) Implement some form of PKI. ii) User education. iii) Use of PGP Universal Server policy to restrict key search (only effective for controlled via policy). i) Delete keys from the Universal Server in the case that keys should no longer be used.

5 'trusted' sources. 3) Key searches are restricted to certain key servers. possibly hamper a user's key search. key which could be decrypted by an attacker. ii) An attacker could potentially create 'trusted' digital signatures and impersonate the legitimate key holder. Lost Keys and Key Lifetime One final issue, with regards to PKE, is that of what happens when a user loses their private decryption key. Clearly once a private key is lost it is no longer possible to decrypt any ciphertext that has been encrypted using the corresponding public key. Therefore there is a risk of the documents themselves being 'lost'. PGP Universal, again provides a number of possible mitigations against such a risk which are as follows: 1) When sending files to other users, always encrypt to your own key as well as theirs. It is possible to set this functionality via user policies defined centrally on PGP Universal Server and it makes sense to do this as users would probably want to be able to decrypt the files themselves. While this means there is less chance of a file being lost it is not a very satisfactory solution on its own. 2) Backup the user's Private Key. The user could keep their own backup copies of keys if they are allowed to manage their own keyrings, or backups could be kept on the server in the case of GKM. Both of these options have already been discussed in depth. 3) Key Reconstruction. PGP Universal Server allows the option to set up key reconstruction as part of the enrolment process. If selected, a backup of the user's private key is split into a number of components during the key generation phase. When enrolling, the user selects and answers a number of pre-defined security questions. If a user then loses their key, they must answer those questions correctly in order to 'reconstruct' their private key. This option could also be used if a user needs an additional copy of their private key (for example if they are installing a second copy of PGP Desktop). This gives the user the chance to rescue their key themselves, though there may be good reason for not allowing this. For example, if a user's key is compromised in some way, then it may not be desirable to allow them to carry on using that key. It is also possible that a user could forget the answer to the security questions (which happens frequently in the case of Oxford SSO security questions), or worse that someone else could easily guess, or work out, the answers to those questions. 4) Additional Decryption Key (ADK). This is basically the concept of key escrow. In other words all files/communications that are encrypted, are also encrypted to a master key. Clearly there are privacy issues with such a solution and key escrow is a controversial and strongly debated topic. In order to maintain the privacy of users then no one person should have access to the ADK and PGP allows you to split the key into components - each of which can be weighted. When the ADK needs to be used it is therefore 'reconstructed' and can only be used when a certain pre-defined 'weight' has been reached. Therefore if ADK is deemed necessary/desirable, who has access to the components, and the relative weight of those components will need to be decided. Clearly there will also need to be some agreed policy/process to define the use of the ADK. There are also also possible

6 legal/regulatory issues that will need to be taken into consideration which are discussed briefly below. Of course, when keys are lost it should be taken into consideration whether the integrity of the key has been compromised before a key is restored. Similarly keys could be known to be compromised, or have reached a stage where they should no longer be used (e.g. no longer secure, no longer required by user, etc.). At the end of their lifetime, keys should be revoked and securely destroyed. Key revocation has already been mentioned throughout this report so will not be discussed in depth here, but should be taken into consideration when deciding on a number of the above solutions. Encrypting Stored Data Perhaps the greatest risk to data being stored on a computer is how the data is actually stored. While data encrypted in transit can still be intercepted it should remain confidential, however that does not protect the files when they are stored on the local machine. Clearly, networked machines are at risk from unauthorised access, but similarly hardware can be stolen, computers shared etc. While the requirement for this project was that data should be protected during transmission, this does not satisfy the recommendation that files should be encrypted at the point of creation. The notion of allowing users to encrypt files to public keys has already been mentioned. PGP Universal/PGP Desktop also allows the option to create an encrypted virtual disk. While this wouldn't protect the data when the disk was mounted (i.e. being accessed) it should provide some protection when the disk is not mounted and also in the event of the hardware being stolen/lost. While PGP Universal/Desktop gives protection to data in transit it should be re-enforced that this does not protect data in storage and so some consideration should be given as to whether or not this is acceptable. Passphrase Policies and Good Practice Of course encryption on its own is not the answer to all security problems associated with electronically communicating and storing exam papers. As well as strong key management, general good security practice should be followed and all users made aware of their responsibilities. If an attacker has control over a user's machine, or is able to access information in some other way (e.g. social engineering, shoulder surfing), encryption offers no protection at all. One obvious weakness when using keys for encryption is how users are able to access and use those keys. In PGP keys are stored encrypted, but there must be a means for legitimate users to access those keys, and this is done by way of a passphrase. This means that any decryption key (no matter what algorithm or key length is used) is, at best, only as as strong as the passphrase used to protect it. If a passphrase can be easily guessed or 'brute-forced' then the 'strength' of the key is irrelevant. The minimum recommendation, given the options available using PGP Universal Server is therefore that the passphrase should be a minimum of 8 characters long AND have a 'strength' of 65% (meaning the passphrase has approximately 83 bits of entropy). One problem often encountered with setting strong passphrase policies is that users a) complain about having to remember another password, b) forget their passwords and c) end up writing them down. In the case of encryption, enforcing strong password/passphrase policies is paramount to the overall security and integrity of the system. Users may therefore require awareness (or 'culture') training in the reasons for, and use of, strong passphrases. Equally, other general good practice should be promoted to end users (e.g. keeping AV up to date, patching, reporting of incidents, safe browsing habits) and all users of the system, from administrators, down to end users should be made aware of their responsibilities towards security. Legal Issues It should be noted that this is not legal advice and is not written from the point of view of a legal expert. However there should be some awareness that there are certain legal issues that may affect certain policy decisions, and that may need to be dealt with via policies themselves. For example different countries have legal restrictions on the import, export and use of cryptographic technologies. Perhaps more immediately relevant is the the new powers of law enforcement in the UK to require that decryption keys (or the relevant plaintext) should be presented under certain sections of the Regulation of Investigatory Powers Act (RIPA). Thought needs to be given to who would be responsible for providing keys and/or plaintext if such a request was made.

7 Summary In summary, PGP Universal along with PGP Desktop has the potential to solve some issues surrounding the communication of exam papers in preparation (and other confidential documents) via electronic means. So far a number of 'bugs' have been found in the software and certain features (or the lack of them) could be questioned, from a security perspective. However this really depends on the requirements of the system and what is considered an appropriate level of security and usability. The solution on its own is, potentially, the most seamless approach from a user's point of view. However there are notable weaknesses such as the fact that messages that are not proxied (e.g. 'sent-items') are not encrypted, and that data is not protected end-to-end from the point of creation. There are a number of additional measures that can be used to provide a 'more secure' solution, but then some familiar problems (which were trying to be avoided) begin to appear. Ultimately decisions need to be made on what is an appropriate level of security. Additionally, for the suitability of the product, and the success of the trial to be measured, the requirements for the system need to be clearly defined.

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

Overview Keys. Overview

Overview Keys. Overview Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister

More information

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2 CS 161 Computer Security Spring 2010 Paxson/Wagner MT2 PRINT your name:, (last) SIGN your name: (first) PRINT your class account login: cs161- Your T s name: Your section time: Name of the person sitting

More information

1.2 Using the GPG Gen key Command

1.2 Using the GPG Gen key Command Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to

More information

Why Johnny Can't Encrypt: A Usability Study of PGP

Why Johnny Can't Encrypt: A Usability Study of PGP Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security jan.sousedek@seznam.cz Abstract Interfaces

More information

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10. Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web

More information

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................

More information

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder

More information

Information Security

Information Security Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004 BRIEF INTRODUCTION TO CRYPTOGRAPHY By PAGVAC February 8, 2004 What will I learn from this file? What cryptography is How encryption and decryption works Cryptography terms Symmetric cryptography Asymmetric

More information

Is your data safe out there? -A white Paper on Online Security

Is your data safe out there? -A white Paper on Online Security Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

7 Key Management and PKIs

7 Key Management and PKIs CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

Skoot Secure File Transfer

Skoot Secure File Transfer Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,

More information

Secure Client Applications

Secure Client Applications Secure Client Applications Networking Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 26 June 2014 Common/Reports/secure-client-apps.tex, r900 1/26 Acronyms

More information

EXAM - ST0-153. Symantec PGP Universal Server 3.2 Technical Assessment. Buy Full Product. http://www.examskey.com/st0-153.html

EXAM - ST0-153. Symantec PGP Universal Server 3.2 Technical Assessment. Buy Full Product. http://www.examskey.com/st0-153.html Symantec EXAM - ST0-153 Symantec PGP Universal Server 3.2 Technical Assessment Buy Full Product http://www.examskey.com/st0-153.html Examskey Symantec ST0-153 exam demo product is here for you to test

More information

Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3

Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3 A Tumbleweed Whitepaper Secure Email Inside the Corporate Network: Providing Encryption at the Internal Desktop INDEX INDEX 1 INTRODUCTION 2 Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR

More information

Internet Programming. Security

Internet Programming. Security Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

The GlobalCerts TM SecureMail Gateway TM

The GlobalCerts TM SecureMail Gateway TM Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network

More information

Deploying EFS: Part 1

Deploying EFS: Part 1 Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular

More information

Encryption Policy (ISP03)

Encryption Policy (ISP03) Encryption Policy (ISP03) Issue Date: December 2014 Version 1.0 DOCUMENT CONTROL...3 1 INTRODUCTION...4 2 DEFINITION...4 3 WHEN TO USE ENCRYPTION...4 4 MANAGEMENT....4 5 ENCRYPTION STANDARDS...4 6 UK LAW...4

More information

cipher: the algorithm or function used for encryption and decryption

cipher: the algorithm or function used for encryption and decryption ! "# $ %& %'()! *,+ & -.! % %- / 0-1 2+ 34 576!! 8 9! ": ;

More information

GlobalSign Enterprise Solutions

GlobalSign Enterprise Solutions GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...

More information

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014) Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Email Security Solutions

Email Security Solutions TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS

More information

Why you need secure email

Why you need secure email Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se

More information

Adobe Systems Software Ireland Ltd

Adobe Systems Software Ireland Ltd Adobe Systems Software Ireland Ltd Own motion investigation report 13/00007 Timothy Pilgrim, Australian Privacy Commissioner Contents Overview... 2 Background... 3 Relevant provisions of the Privacy Act...

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Management of Hardware Passwords in Think PCs.

Management of Hardware Passwords in Think PCs. Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam. CS 161 Computer Security Spring 2010 Paxson/Wagner MT2 Solns Midterm 2 exam solutions Please do not read or discuss these solutions in the exam room while others are still taking the exam. CS 161, Spring

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

White paper. Why Encrypt? Securing email without compromising communications

White paper. Why Encrypt? Securing email without compromising communications White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many In the world of secure email, there are many options from which to choose from to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many cryptographical concepts to achieve a supposedly

More information

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using

More information

April 2005. PGP White Paper. PGP Universal 2.0 Technical Overview

April 2005. PGP White Paper. PGP Universal 2.0 Technical Overview April 2005 PGP White Paper PGP Universal 2.0 Technical Overview 1 Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 3 THE PGP ECOSYSTEM... 4 WHAT IS THE PGP ECOSYSTEM?... 4 PGP Global Directory...

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

The Case For Secure Email

The Case For Secure Email The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication

More information

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Pretty Good Privacy with GnuPG

Pretty Good Privacy with GnuPG Pretty Good Privacy with GnuPG Steve Revilak Cabot House Sep. 24, 2013 1 / 16 Encryption and Signing Encryption The purpose is to ensure that a message is readable only by someone possessing a specific

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

GPG installation and configuration

GPG installation and configuration Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Authentication Application

Authentication Application Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

WS_FTP Professional 12. Security Guide

WS_FTP Professional 12. Security Guide WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Encryption and Digital Signatures

Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Securing Data at Rest ViSolve IT Security Team

Securing Data at Rest ViSolve IT Security Team Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

PGP Desktop for Mac OS X Quick Start Guide Version 10.0

PGP Desktop for Mac OS X Quick Start Guide Version 10.0 PGP Desktop for Mac OS X Quick Start Guide Version 10.0 What is PGP Desktop? PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals

More information

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database

More information

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo) EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...

More information

PGP Desktop Email Quick Start Guide Version 10.2

PGP Desktop Email Quick Start Guide Version 10.2 PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

GT 6.0 GSI C Security: Key Concepts

GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the

More information

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and

More information