THE SECURITY ISSUE. Chris J Mitchell
|
|
|
- Shavonne Holmes
- 10 years ago
- Views:
Transcription
1 THE SECURITY ISSUE Chris J Mitchell Foreword This paper is not intended to be a complete overview of its subject area. It is being prepared as a written accompaniment to a talk to be given at the Value Added Network Services for Europe Conference, due to take place on September 12th and 13th 1989 in London. All presenters of papers at this conference have been requested to provide a 1500-word synopsis of their talk for circulation to attendees at the conference. 1. Introduction The purpose of this paper is to describe security in electronic mail applications, with particular reference to the security facilities in the 1988 versions of the CCITT X.400 Recommendations, [2]. The two main objectives of this paper are first to provide tutorial information on the security facilities within the 1988 X.400 Recommendations and second to point out potential shortcomings in the protocols and areas where improvements can be made. We devote the remainder of this introduction to a brief review of the fundamental concepts underlying electronic mail systems. In doing so we use the X.400 model and terminology, which can be applied to a variety of other electronic mail systems. The 1984 version of the X.400 recommendations, [1], defines two basic types of entity in a 'store and forward' mail network, namely User Agents (UAs) and Message Transfer Agents (MTAs). UAs originate and receive messages on behalf of users. All messages are sent via one or more MTAs, which act as 'store and forward' message nodes. The set of all MTAs collectively form what is known as the Message Transfer Service (MTS). X.400 is widely used as a generic term for a collection of related C.C.I.T.T. Recommendations, including X.400 itself, X.402, X.411, X.413 and X.420, [2]. The protocols governing communication between pairs of MTAs and between a UA and the MTS are defined in X.411. The protocol governing MTAÄMTA communications is often referred to as P1, and the UAÄMTA protocol as P3. The entire collection of UAs and MTAs is referred to as the Message Handling System (MHS). In the 1988 version of the X.400 Recommendations, in fact in X.413, a third type of entity is defined, namely a Message Store (MS). Message Stores were not part of the 1984 version of X.400. In some cases it is convenient to only connect a UA to the MTS at very infrequent intervals. However MTAs may only store mail for recipient UAs for a short period of time. The role of a MS is to remedy this problem by acting as an intermediary between a UA and the MTS, with storage of received messages as its primary role. UAs and MSs are in 1-1 correspondence, and an MS enables its corresponding UA to obtain summary information about received messages without actually retrieving them. In practice, an MS is likely to be co-located either with an MTA or with its corresponding UA. The Message Store Access Protocol, governing the retrieval of messages by a UA from its corresponding MS, is defined in Recommendation X.413. Note
2 that UAs and MSs are collectively referred to as MTS-users, in that they are both end-users of the Message Transfer Service. All the protocols so far discussed, namely those in X.411 and X.413, have the role of defining how an object called a message-content is shipped from one UA to another. The form of this content is not constrained by X.411 or X.413, and may be one of a number of different types. Its value is not affected by the MTS. One such type is defined in X.420; this type is defined as suitable for use in Inter-Personal Messaging applications. Other content types will be defined for different applications such as Electronic Data Interchange (EDI). Finally note that the set of parameters defined in X.411 and X.413, which accompany the message content when it is transferred from one MHS entity to another, are often referred to as the message envelope. This is because in many ways these parameters have roles analogous to those of the addressing and franking information to be found on the envelope of a piece of 'conventional' mail. 2. Security services Before describing electronic mail security services in detail, it is useful to consider what threats these services are intended to address. Possible threats to electronic mail systems include: masquerade, message replay/re-sequencing, modification of message information, denial of service, leakage of information and repudiation. It is not possible to address all these threats from within a message handling application. For example information leakage will take place if it is possible to monitor the volumes of traffic going from one point in the network to another, even if all the message contents are encrypted. To prevent this requires the provision of security services in the lower layers of the OSI stack, which is beyond the scope of application services. There are a considerable number of different security services that could be provided within an electronic mail system. Such services may conveniently be divided into two classes, namely MTS-user to MTS-user services and MTS services. Note that this is non-standard terminology. MTS-user to MTS-user services are those provided from one MTSÄuser (i.e. a UA or an MS) to another, without active intervention by the MTS. Such services include: Message origin authentication, Proof of delivery, Content confidentiality, Content integrity, Message sequence integrity and Non-repudiation services. MTS security services are those provided which involve active intervention by the MTS. Such services include: Secure access control, Report origin authentication, Probe origin authentication, Proof of submission, Non-repudiation of submission and Message security labelling. The service names used here are those given in the X.400 Recommendations which do not correspond precisely with the names used in ISO , the OSI security architecture, [3]. This is partly because the OSI security architecture does not mention all the services relevant to electronic mail, and partly because the documents were developed in parallel. 3. Approaches to providing security
3 In order to provide security services for the message content it is normally necessary to transmit with the message a number of 'security parameters', e.g. encrypted keys and authentication checks. These security parameters can either be transmitted in the message envelope or as part of a (specially formatted) message content, or both. The choice of location for the security parameters not only has important system ramifications, but can also affect the type of security service which may be provided. If security services are required for X , or other electronic mail systems without built in security facilities, then there is no alternative but to put the security parameters in the message content. The same is true for any heterogeneous mail systems, even if they individually incorporate security features. Examples of electronic mail systems in which all the security parameters are in the message content are provided by the SDNS and IAB Internet mail security proposals. However, security parameters within the message content cannot be used to provide MTS security services. On the other hand, the 1988 X.400 Recommendations use the message envelope to transfer security parameters, and not the message content. The inclusion of the security parameters in the message envelope enables the provision of MTS security services. However, it does make the provision of certain MTS-user to MTS-user services rather problematical, especially if Message Stores are used. 4. Security mechanisms Before we consider the security mechanisms described in the X.400 Recommendations, we need to consider the provision of cryptographic key management, a fundamental requirement for the provision of communications security services. Key management for the X.400 security facilities is provided by use of the directory authentication service specified in C.C.I.T.T. Recommendation X.509. This key management system is based on the use of public key cryptosystems for digital signature and data encryption. Recommendation X.509 allows public keys to be stored in user directory entries. Since the directory service (and communications with it) may not be trusted, means need to be provided for users to verify public keys read from the directory. This is provided for by the use of data structures called certificates, which we now briefly describe. In order to set up a key management system for X.400, every user who wants to use security services must first exchange public keys with an off-line entity called a Certification Authority (CA). Each user must trust the CA which they appoint to act on their behalf. The CA gives the user a copy of its public key (each CA has its own public key/secret key pair), and is given in return a copy of the user's public key (each user must also equip themselves with a key pair). The CA then signs a copy of the user's public key, together with the user's name and the period of validity of the key, using the CA's secret key. This forms a certificate and is actually what is put in the directory. Any other user which has a trusted copy of this CA's public key can then check the validity of the certificate, and thereby obtain a verified copy of the user's public key.
4 The scheme so far described does not cover the situation where two users are served by different CAs. To cover this possibility, one CA may generate a certificate for another CA's public key; such certificates are called 'cross-certificates'. If user A has CA X, and user B has CA Y, then if A is given a cross-certificate containing Y's public key signed by X, then A can obtain a verified copy of Y's public key. A can then check B's certificate. Such cross-certificates can be made into chains called 'certification paths'. Virtually all the security services built into the X.400 Recommendations make use of a cryptographic construct called a token. Tokens are always formed for a single recipient. A token consists of a series of data fields with a digital signature appended, this signature being computed as a function of all the data fields in the token (using the originator's secret key). These data fields include: recipient-name, date/time of generation, a field called 'signed-data' and a field called 'encrypteddata'. The information within the encrypted-data field is enciphered using the public key of the intended recipient of the token (prior to computation of the signature). One form of token is called a message-token, and is used in the provision of all the MTS-user to MTS-user security services. Hence, if a message requires such services, then a message-token is sent as one parameter within the message envelope. The precise contents of the signed-data and encrypted-data fields within the message-token depend on which selection of security services is required. However, whichever services are required, the presence of these data within the token prevents them from being changed and/or repudiated. In a message-token, the encrypted-data field may be used to contain any of the following items: a cryptographic key (used to encrypt the message content if content confidentiality is required), a content integrity check (used in the provision of content integrity), a message security label, a content integrity key (used to compute the content integrity check) and a message sequence number (used in the provision of message sequence integrity). The signed-data field may be used to contain any of the following items: a content integrity check (used in the provision of content integrity), a message security label, a message sequence number (used in the provision of message sequence integrity) and a proof of delivery request. The proof of delivery and non-repudiation of delivery services are slightly different from other MTS-user to MTS-user services in that they are provided by the message recipient to the message originator. If a message is received containing a proof of delivery request (in the signed-data field of the message token) then the recipient computes a signed version of the (unencrypted) message content together with other delivery related parameters. This signature, computed using the recipient's secret key, is returned to the message originator within the delivery report. The message originator then uses this signature to provide the required service(s). Means are also provided within X.411 and X.413 for a pair of MHS entities to perform peer-entity-authentication prior to opening a connection for the exchange of messages. This protocol exchange again involves the use of tokens. For systems providing Mandatory Access Control services, all messages and entities can be assigned security labels. These labels can be tied to message contents by their inclusion in either the encrypted-
5 data or signed-data fields of the message token (depending on whether or not the label itself is confidential). Inter-entity connections can also be assigned security-labels using the tokens exchanged in the peerentity-authentication process. 5. Limitations of security in X We conclude this paper by very briefly mentioning three important limitations of the current X.400 Recommendations. First, proof of delivery to a UA is not available when an MS is used. Because of the way the protocols operate, the proof of delivery must be generated at the time the message is delivered by the MTS to the MTSuser. If this MTS-user is an MS, then it must generate and sign the delivery proof, and not the end user. The message originator then has no proof that the message was ever delivered to the recipient UA, only to the MS belonging to the recipient UA. Second, proof of delivery by an MS is not possible if the message content is encrypted. The proof of delivery must be computed using the unencrypted message content, which will not be available to the MS (unless the MS is equipped with the UA's secret key). Third, the specified form of token may allow the 'theft' of message content by third parties. This arises because the signature on the token is computed after the secret data (in the encrypted-data field) is enciphered. The problem would not arise if the order of these two operations was reversed. References [1] C.C.I.T.T. Recommendations X.400, X.401, X.408, X.409, X.410, X.411, X.420, X.430, C.C.I.T.T. VIIIth Plenary Assembly, October [2] C.C.I.T.T. Recommendations X.400, X.402, X.407, X.411, X.413, X.419, X.420, C.C.I.T.T. IXth Plenary Assembly, October [3] ISO , Information processing systems - Open systems interconnection - Reference Model - Part 2: Security Architecture, International Organization for Standardization, 1988.
How To Choose Security Class S0 For An Extended Ats Message Service
ATNP/WG3 WP/15-38 17/01/99 AERONAUTICAL TELECOMMUNICATIONS NETWORK PANEL(ATNP) WORKING GROUP 3 - APPLICATIONS AND UPPER LAYERS Honolulu, 19-22 January 1999 (fifteenth meeting) Agenda Item 5.4 : Ground-Ground
Common Security Protocol (CSP) ACP 120. June 1998
Common Security Protocol (CSP) ACP 120 June 1998 UNCLASSIFIED I ORIGINAL (Reverse Blank) Foreword 1. ACP120, COMMON SECURITY PROTOCOL, is an UNCLASSIFIED publication. Periodic accounting is not required.
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Electronic Data Interchange (EDI) Messaging Security
Essay 18 Electronic Data Interchange (EDI) Messaging Security Ted Humphreys The modern economy and the future wealth and prosperity of industry and commerce rely increasingly on the exchange of data and
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1
MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1 Chris J. Mitchell Computer Science Department Royal Holloway and Bedford New College University of London Egham Hill Egham Surrey TW20 0EX England
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Defense Message System Messaging, Directory Services, and Security Services
Defense Message System Messaging, Directory Services, and Security Services Abstract Wayne DeLoria, DMS Integration Manager, DISA, D24 Alex Sharpe, Susan May, and Chris Bonatti, Booz Allen & Hamilton Inc.
Table: Security Services (X.800)
SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
544 Computer and Network Security
544 Computer and Network Security Section 1: Introduction Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Background Information Security requirements have changed in recent times
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS
INTERNATIONAL TELECOMMUNICATION UNION CCITT X.800 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
The Concept of Trust in Network Security
En White Paper Date: August 2000 Version: 1.2 En is a registered trademark of En, Inc. in the United States and certain other countries. En is a registered trademark of En Limited in Canada. All other
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia
Miscellaneous Publication Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia SAA MP75 1996 STRATEGIES FOR THE IMPLEMENTATION OF A PUBLIC KEY AUTHENTICATION FRAMEWORK
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
Medium Grade Features For Military Messaging
Medium Grade Features For Military Messaging Christopher D. Bonatti IECA, Inc. 15309 Turkey Foot Road Darnestown, MD 20878-3640 Abstract Two grades of messaging service have evolved independently in two
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52)49 3425#452%!.$!00,)#!4)/.
INTERNATIONAL TELECOMMUNICATION UNION ##)44 8 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52)49 3425#452%!.$!00,)#!4)/.3
Security and Privacy in Cloud Computing
Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file
1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
CSCI 4541/6541: NETWORK SECURITY
1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Encryption of E-Mail Traffic
Encryption of E-Mail Traffic White Paper Version 1.1 Date: 2009-06-08 Foreword On the initiative of some German automotive manufacturers work has started on a series of white papers on the subject of e-mail
Certificate Policies and Certification Practice Statements
Entrust White Paper Certificate Policies and Certification Practice Statements Author: Sharon Boeyen Date: February 1997 Version: 1.0 Copyright 2003 Entrust. All rights reserved. Certificate Policies and
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
KAZAKHSTAN STOCK EXCHANGE
KAZAKHSTAN STOCK EXCHANGE A p p r o v e d by Kazakhstan Stock Exchange Board of Directors decision (minutes No. 15 of November 6, 2002) Effective from November 7, 2002 N O T I C E Rules have been translated
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Email Security. Issues:
Email Security Email Security Issues: Not real time, can afford to use public key cryptosystems more. Certification of keys is much harder because anyone can send anyone else some mail Strictly end to
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
EG 201 057 V1.1.2 (1997-07)
ETSI Guide Telecommunications Security; Trusted Third Parties (TTP); Requirements for TTP services European Telecommunications Standards Institute 2 Reference DEG/SEC-003000 (9sc00ide.PDF) Keywords ISDN,
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network
Introduction to Network Security, Authentication Applications Information: is defined as knowledge obtained from investigation, Study or Instruction, Intelligence, news, facts, data, a Signature or Character
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED
Midterm Solutions ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED Name: 1) Alice wants to send Bob a digitally-signed piece of email from her desktop computer to his.
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Using EMV Cards to Protect E-commerce Transactions
Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Secure Automated Document Delivery
Secure Automated Document Delivery Tom Casey Michael Roe Bill Tuck Steve Wilbur Department of Computer Science University College London Abstract 1 Background A document retrieval system is a specific
Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
OSI Seven Layers Model Explained with Examples
OSI Layer Model describes how information is transmitted between networking devices. In this tutorial I will provide a brief introduction of OSI Layer model including its advantage and services. OSI model
Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.
Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
Cryptography and Network Security: Overview
Cryptography and Network Security: Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Lesson 4: Introduction to network security
Lesson 4: Introduction to network security Dr. Justo Carracedo Gallardo [email protected] Technical University of Madrid University Professor at the Telecommunication School (EUITT) What is Network
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
