Secure Mail. Detailed Technical Information & In Depth of Understanding of Application. SY Chua SYWORKS PROGRAMMING
|
|
|
- Victor Nelson Nash
- 10 years ago
- Views:
Transcription
1 Secure Mail Detailed Technical Information & In Depth of Understanding of Application. SY Chua SYWORKS PROGRAMMING
2 Table of Contents Technical Detail User Account Profile Retrieving & Storing Of Messages Process of retrieving messages Raw Message in it s Original/ Encryption Stage Method of Indexing These Messages (Archive) Re Encryption Of Archives Process of Encrypting For Sending A Secured Mail Process of Decrypting Received Secured Mail Shredding of Files Source Code Hashing Data/File Source Code (Hashing Data & File) Symmetric Encryption Source Code (Generating Key/IV) Source Code (Encrypting/Decrypting File) Asymmetric Encryption Source Code (Generating Keypair & Encrypting Message) Source Code (Sign & Verify Digital Signature) P age
3 Technical Detail Once Secure Mail started, the application will be created the following in your user directory. o C:\Users\<CurrentUserName>\AppData\Local\SecuredMail [Main Storage] o.\securedmail\config [For storing SMTP/POP Mail Server information] o.\securedmail\keys [For storing Public keys] o.\securedmail\<uname> [For storing login file for the user account created] o.\...\<uname>\encryptedmsg [Temporary storage for encrypted attachment to be send] o.\...\<uname>\decryptedmsg[temporary storage for decrypted attachment] o.\...\<uname>\< > [Storing of achieved ] Note: Except for SMTP/POP Mail Server configuration file and public keys of contacts, all information saved in the remaining folders are encrypted. Symmetric Encryption functions that use to encrypt user profile and file attachments is Rijindael 256 Bits algorithm with the function System.Security.Cryptography.SymmetricAlgorithm. File/Data Hashing functions will also be used to hash File for VirusTotal database checking and also for encrypted file attachment with System.Security.Cryptography. HashAlgorithm Asymmetric Encryption is used to encrypt/decrypt key,iv, file hash and digital signature. This encryption is also use to generate the digital signature of the message. Function use is System.Security.Cryptography.AsymmetricAlgorithm. 2 P age
4 1 User Account Profile The user account will be save in a file basing on it login name where a folder will be created basing on it name. Diagram example below refers. The user file usr_bob.cfg will be saved and encrypted using Rijindael algorithm with the login password generated to be used as Key & IV. Original information found on the config file as below. User Config File (usr_bob.cfg) [SECUREDMAIL START] AcctName=Bob Pass=P@ssw0rd LockApp=True IdleMin=10 =bob. [email protected] MailServer=Gmail.com DisplayName=Bob DisplayName Pass=3m@i1P@ss Contact [email protected] KeySent=True Contact [email protected] KeySent=False PrivateKey=<RSAKeyValue><Modulus>. </D></RSAKeyValue> PublicKey=<RSAKeyValue><Modulus> </Exponent></RSAKeyValue> [SECUREDMAIL END] Config Start Person Name Password Screen lock Enabled? Min idle before activated Account Mail Server Display Name Password Contact s Is you Public Key send?.... Your RSA Private Key Your RSA Public Key Config End 3 P age
5 Once the information is saved or loaded, it will be encrypted and below screenshot is the encrypted content. 4 P age
6 2. Retrieving & Storing Of Messages 2.1 Process of retrieving messages All receiving of messages from Inbox will be done via POP3 (Post Office Protocol V3). Diagram below showing the process. 5 P age
7 2.2 Raw Message in it s Original/ Encryption Stage Information received from mail server would be in plain text format as example shown below. Original Message Source MIME Version: 1.0 Received: by with HTTP; Mon, 10 Nov :19: (PST) Date: Mon, 10 Nov :19: Delivered To: [email protected] Message ID: <CA+g2nAuYTpf3hbYy5fgWJYBr=7MQj4t=uPZFS7U4dkn8uKv5cg@mail.gmail.com> Subject: From: Bob <[email protected]> To: Bob <[email protected]> Content Type: multipart/mixed; boundary=f46d d3e d842 f46d d3e d842 Content Type: multipart/alternative; boundary=f46d d3df050781d840 f46d d3df050781d840 Content Type: text/plain; charset=utf 8 f46d d3df050781d840 Content Type: text/html; charset=utf 8 <div dir="ltr"><br></div> f46d d3df050781d840 f46d d3e d842 Content Type: text/x python; charset=us ASCII; name="test.py" Content Disposition: attachment; filename="test.py" Content Transfer Encoding: base64 X Attachment Id: f_i29a0be50 IyEgL3Vzci9iaW4vcHl0aG9uCiMjCiMjIFRoaXMgd2FzIHdyaXR0ZW4gZm9yIGVkdWNhdGlvbmFs IHB1cnBvc2Ugb25seS4gVXNlIGl0IGF0IHlvdXIgb3duIHJpc2suCiMjIEF1dGhvciB3aWxsIGJl IG5vdCByZXNwb25zaWJsZSBmb3IgYW55IGRhbWFnZSEKIyMgV3JpdHRlbiBCeSBTWSBDaHVhLCBz IHByaW50ICdcbiAoXkMpIGludGVycnVwdGVkXG4nCiAgICBleGNlcHQgRU9GRXJyb3I6ICAgICAg ICAgIHByaW50ICdcbiAoXkQpIGludGVycnVwdGVkXG4nCiAgICBleGl0X2dyYWNlZnVsbHkoMCkK CQo= f46d d3e d842 Basing on the unique field Message ID the data will be hashed with SHA256 and returned with c937ad223cf274df110ffae2be2bc0efb99e8e97a2bba4f09bc86fb20a6a98da. The hashed value will be search in the folder C:\Users\<Win.Username>\AppData\Local\SecuredMail\Bob\bob@gmail\ to see if the file c937ad223cf274df110ffae2be2bc0efb99e8e97a2bba4f09bc86fb20a6a98da.enc exist, if not, it will write the raw message source to the file and encrypted it with user login passwords. 6 P age
8 Although as seen on the previous page, the raw message information are in plain text. It will encrypted using Rijindael Algorithm with user login password as Key & IV and look like screenshot shown below. It was only one user click on the message, it will decrypt it to display the information and re encrypt it. 7 P age
9 2.3 Method of Indexing These Messages (Archive) Similar technique is also being used to encrypt the Archive index file (Archive.Enc). Below are example of what the original Archive index file will looks like and what it will be shown when encrypted. Information found in the Achieve Index file include: Message Hash ID Message Subject Message Date Any Attachment Message Size Message Status From Server Message Read Status Achieve Index File (Original clear text) <MsgIDHash>CE3D53ABBA720AFA0600C0DE88997BED99F7A3829FEB1CE2A275A552CAB86D10< /MsgIDHash><MsgSubject>SECURED MAIL : My Secured Mail Subject Title</MsgSubject><MsgFrom>"Gmail Person Two" <[email protected]></msgfrom><msgdate>sat, 03 Jan :58: (PST)</MsgDate><MsgAttach>1</MsgAttach><MsgSize>101560</MsgSize><MsgStatus>+OK</M sgstatus><msgread>yes</msgread> <MsgIDHash>8EA6D9585D9F1934A4F7A018F652D9EE D99CA13089E9351A54ECA9227</ MsgIDHash><MsgSubject>My Secured Mail Subject Title</MsgSubject><MsgFrom>"Gmail Person Two" <[email protected]></msgfrom><msgdate>sat, 03 Jan :45: (PST)</MsgDate><MsgAttach>1</MsgAttach><MsgSize>101539</MsgSize><MsgStatus>+OK</Ms gstatus><msgread>yes</msgread> Screenshot of encrypted Archive.enc 8 P age
10 2.4 Re Encryption Of Archives As mentioned that the messages and archive index files were all encrypted using user login passwords, once the user password is changed, application will re encrypt these files with the new login password in order to make these files still readable after password changes. 9 P age
11 3. Process of Encrypting For Sending A Secured Mail Below is diagram of the process from drafting of & attachment of files to encrypting it into a container for sending to the recipient. Process are divided into Yellow Colour (1 3) ~ Content Blue Colour (1 2) ~ File Attachment Green Colour (1 2) ~ Randomize Key & IV Red Colour (1 2) ~ Encryption before sending 10 P age
12 Yellow Colour ( Content Processing) 1) The subject and message content are divided into 2 files Subject.txt stores the Subject Content.txt stores the content 2) Message content of Content.txt will be hashed using SHA1 and using the sender s RSA private key, it will be signed to create a digital signature of the content. The digital signature will be in Base64 format which will subsequently inserted into Hash.txt (Red 1) 3) Both Subject.txt & Content.txt will be compressed into Attachment.zip and subsequently encrypted to Attachment.enc (Green 2) Blue Colour (File Attachment Process) 1) The selected files will be hashed using SHA256 algorithm and check against the VirusTotal Database and revert with detection result. 2) The selected files will compressed and added together with Subject.txt & Content.txt which will subsequently encrypted to Attachment.enc (Green 2) Green Colour (Randomize Key & IV) 1) Rijindael algorithm will be used for generating randomize Key & IV for Symmetric encryption. The Key & IV will be converted into Base64 format which will be inserted into Hash.txt (Red 1) 2) These Key & IV will be used to encrypt the compressed file Attachment.zip into Attachment.Enc 3) The encrypted Attachment.Enc will be hashed using SHA512 and the hashed value will be stored in Hash.txt (Red 1) Red Colour (Final Encryption before sending) 1) The file Hash.txt which stored a. Digital Signature of message content b. Encryption/Decryption Key & IV for Attachment.Enc c. SHA512 Hashed value of Attachment.Enc (For file integrity check) Hash.txt will be using Asymmetric Encryption method to encrypt (i.e using recipient s RSA Public Key to encrypt) and saved as Hash.enc 2) Both Attachment.Enc (Encrypted using Symmetric) and Hash.enc (Encrypted using Asymmetric) will be compressed into EncryptedData.zip and then send to recipient. Note: All these files that were processed are stored in C:\Users\<Win.Username>\AppData\Local\SecuredMail\Bob\EncryptedMsg folder which will be removed after the secured mail is sent. 11 P age
13 4. Process of Decrypting Received Secured Mail Decryption process are quite similar to the process of encryption but in reverse order and having integrity checks performed. Below is diagram of the process of decryption. Process are divided into Red Colour (1 2) ~ Decryption of encrypted files Blue Colour (1 3) ~ Extraction of key information & integrity checks Yellow Colour (1 3) ~ Extraction of attachment files & content 12 P age
14 Red Colour (Decryption of Encrypted Files) Prior to the decryption, the attachment EncryptedData.Zip will be downloaded from the message and extracted the 2 files (Hash.Enc & Attachment.Enc) to the directory C:\Users\<Win.Username>\AppData\Local\SecuredMail\Bob\DecryptedMsg 1) Hash.Enc will be decrypted with Asymmetric decryption using the recipient s Private Key and saved as Hash.txt. The file contains the digital signature of the message content, decryption key & IV which is in Base64 format for Attachment.enc and also the SHA512 hash value of Attachment.enc 2) Attachment.Enc will be decrypted with Symmetric decryption using the Key & IV found in Hash.txt and saved as Attachment.zip Blue Colour (Extraction of key information & integrity checks) 1) Hash.txt was decrypted from Hash.Enc using the recipient s Private Key. It contain digital signature of the message content, decryption key & IV and file hash value for Attachment.enc. 2) The SHA512 Hash value found in Hash.txt will be check against the downloaded Attachment.enc for file integrity checks. 3) The Digital Signature which is found in Hash.txt will be decrypted using sender s public key and verify with the SHA1 hash value of the extracted content found in Content.txt Yellow Colour ( Content Processing) 1) Attachment.zip contains Content.txt, Subject.txt and other attached files will be extracted to C:\Users\<Win.Username>\AppData\Local\SecuredMail\Bob\DecryptedMsg 2) The message content found in Content.txt will be extracted and display together with the Subject and attached files to user s screen. 3) The message content will also hashed with SHA1 algorithm and thereafter compare the value with the decrypted digital signature found in Hash.txt. 13 P age
15 Below screenshots of the main attachment EncrytedData.Zip, the encrypted Attachment.Enc, the content of Hash.Enc and also the screenshot on how the Secure Mail looks like using web based. Screenshot of EncryptedData.Zip Screenshot of encrypted Attachment.Enc in Binary 14 P age
16 Screenshot of encrypted Hash.Enc in Base64 Format 15 P age
17 Screenshot of the Secure Mail looks like in web browser. 16 P age
18 5. Shredding of Files Instead of deleting file through the function System.IO.File.Delete( FileToDelete ) which can be easily recovered using Undelete software available in the market, SecuredMail use the method of overwriting the existing file with null 5 times before deleting it. Although there may be some advanced ways of recovering original data that were overwritten on a harddisk as presented on a paper by computer scientist, Peter Gutmann by recovering these data through the use of magnetic force microscope (MFM), SecuredMail had done the minimal of securing overwriting the existing data with null before deleting It as although Gutmann's theory may be correct, there is no practical evidence that overwritten data can be recovered, while research has shown to support that overwritten data cannot be recovered. 5.1 Source Code Public Function DeleteFile(strFileName As String) As Boolean Dim ByteArray() As Byte If File.Exists(strFileName) = True Then Dim inforeader As System.IO.FileInfo inforeader = My.Computer.FileSystem.GetFileInfo(strFileName) Dim writebye(inforeader.length) As Byte Dim writesize As Long = (inforeader.length * 2) + 3 ReDim ByteArray(CInt(writesize)) For I As Long = 0 To (writesize) ByteArray(CInt(I)) = &H0 Next Try For i = 0 To 5 Dim sw As New StreamWriter(strFileName) sw.write(unicodebytestostring(bytearray)) sw.flush():sw.close() For l As Long = 0 To (writesize) ByteArray(CInt(l)) = &H0 + 1 Next Next Catch ex As Exception End Try Try File.Delete(strFileName) Catch ex As Exception End Try Return True Else Return False End Function References : [Secure Deletion of Data from Magnetic and Solid State Memory] [Overwriting Hard Drive Data: The Great Wiping Controversy] [Overwriting Hard Drive Data] forensics.sans.org/blog/2009/01/15/overwriting hard drive data/ 17 P age
19 6. Hashing Data/File Hash mainly using in the application are SHA512 and SHA256 in the case for hashing file as to check on VirusTotal Database. 6.1 Source Code (Hashing Data & File) Public Enum HashingUse 'Define the enumeration for AlgorithmUse. MD5 = 0 RIPEMD160 = 1 SHA1 = 2 SHA256 = 3 SHA384 = 4 SHA512 = 5 End Enum Public Function HashData(ByVal strdata As String, ByVal UseHash As HashingUse, _ Optional Spaces As Boolean = False) As String Dim HashIndex As Integer = UseHash Dim ha As HashAlgorithm = HashAlgorithm.Create(HashUse(HashIndex)) Dim hashvalue() As Byte hashvalue = ha.computehash(unicodestringtobytes(strdata)) Dim info As Byte() = New UTF8Encoding(True).GetBytes(PrintByteArray(hashValue)) HashData = PrintByteArray(hashValue) If Spaces = True Then HashData = AddSpaceToString(HashData, 2) Return HashData End Function Public Function HashFile(ByVal sfile As String, ByVal UseHash As HashingUse, _ Optional Spaces As Boolean = False) As String Try If File.Exists(sfile) = False Then MsgBox("File [" & sfile & "] not found!", vbinformation, _ "File Not Found") Return "" Dim HashIndex As Integer = UseHash Dim ha As HashAlgorithm = HashAlgorithm.Create(HashUse(HashIndex)) Dim hashvalue() As Byte Dim filestream As FileStream = File.Open(sfile, FileMode.Open) filestream.position = 0 hashvalue = ha.computehash(filestream) Dim info As Byte() = New UTF8Encoding(True).GetBytes(PrintByteArray(hashValue)) filestream.close() HashFile = PrintByteArray(hashValue) If Spaces = True Then HashFile = AddSpaceToString(HashFile, 2) Return HashFile Catch ex As Exception MsgBox("Error in hashing [" & sfile & "].", vbinformation, "Hashing Error") Return "" End Try End Function 18 P age
20 7. Symmetric Encryption Although the Encryption s algorithm that is use in the application are mainly Rijindael, we coded it to be able to use other algorithm to allow us to easily change or add in other algorithm if required. Below are the source codes for generating symmetric Key/IV and encrypting/decrypting files. 7.1 Source Code (Generating Key/IV) Dim AlgoUse() As String = {"Rijndael", "AES", "TripleDES", "RC2", "DES"} Dim AlgoKeySize() As String = {"256", "256", "192", "128", "64"} Dim AlgoBlockSize() As String = {"256", "128", "64", "64", "64"} Public Function GenerateKeyOrIV(ByVal UseAlgorithm As AlgorithmUse, _ ByVal ActionKeyOrIV As KeyOrIV, _ Optional ByVal strpassword As String = "", _ Optional ByVal Rotation As Integer = 0) As Byte() GenerateKeyOrIV = UnicodeStringToBytes("") Try 'Setting of Algorithm and Blocksize Dim AlgoIndex As Integer = UseAlgorithm Dim sa As SymmetricAlgorithm = SymmetricAlgorithm.Create(AlgoUse(AlgoIndex)) sa.blocksize = AlgoBlockSize(AlgoIndex) sa.keysize = AlgoKeySize(AlgoIndex) 'Process to Randomize Key/IV basing on user selection If strpassword = "" Then If ActionKeyOrIV = KeyOrIV.KeyGenerate Then sa.generatekey() Return sa.key If ActionKeyOrIV = KeyOrIV.IVGenerate Then sa.generateiv() Return sa.iv Else 'Process of using Password to generate Key/IV instead of Randomize Dim chrdata() As Char = strpassword.tochararray Dim intlength As Integer = chrdata.getupperbound(0) Dim bytdatatohash(intlength) As Byte For i As Integer = 0 To chrdata.getupperbound(0) bytdatatohash(i) = CByte(Asc(chrData(i))) Next 'Key/IV will generate base on SHA512 hash of the password Dim SHA512 As New System.Security.Cryptography.SHA512Managed Dim bytresult As Byte() bytresult = bytdatatohash For i = 0 To Rotation ' bytresult = SHA512.ComputeHash(bytResult) Next Dim AKS As Integer Dim ABS As Integer 'Basing on user s selection (Key or IV) then return result If ActionKeyOrIV = KeyOrIV.KeyGenerate Then AKS = Int(AlgoKeySize(AlgoIndex) / 8) 1 Dim bytekey(aks) As Byte For i As Integer = 0 To AKS bytekey(i) = bytresult(i) Next Return bytekey Else ABS = Int(AlgoBlockSize(AlgoIndex) / 8) 1 19 P age
21 Dim byteiv(abs) As Byte For i As Integer = 32 To 32 + ABS byteiv(i 32) = bytresult(i) Next Return byteiv s 'Display error message if found. Catch ex As Exception MsgBox("Error generating Key/IV!", vbexclamation, "Key/IV Generation Error") End Try Return GenerateKeyOrIV End Function 7.2 Source Code (Encrypting/Decrypting File) Public Function EncryptDecryptFile(ByVal UseAlgorithm As AlgorithmUse, _ Direction As CryptoAction, srcfile As String, DstFile As String, _ ReplaceWithoutPrompt As Boolean, bytekey() As Byte, byteiv() As Byte, _ pbstatus As ToolStripProgressBar, Optional DontPrompt As Boolean = False) As Boolean ' Check Existance for file before processing If DontPrompt = False Then If File.Exists(srcFile) = False Then MsgBox("The specified source file [" & srcfile & "] is not found!" & _ vbcr & "Process aborted.", vbexclamation, "File Not Found") Return False If ReplaceWithoutPrompt = False Then If File.Exists(DstFile) = True Then Dim Qus As Integer = MsgBox("The specified destination file [" & _ DstFile & "] is exist!" & vbcr & vbcr & _ "Do you want to replace?.", vbquestion + vbyesno + _ vbdefaultbutton2, "Replace File?") If Qus = vbyes Then DeleteFile(DstFile) Else MsgBox("Process Aborted by user", vbinformation, "Aborted") Return False Try 'Set Read & Write file for SrcFile & DstFile fsinput = New System.IO.FileStream(srcFile, FileMode.Open, FileAccess.Read) fsoutput = New System.IO.FileStream(DstFile, FileMode.OpenOrCreate, FileAccess.Write) 'Setup algorithm basing on user selection Dim AlgoIndex As Integer = UseAlgorithm Dim sa As SymmetricAlgorithm = SymmetricAlgorithm.Create(AlgoUse(AlgoIndex)) Try ' Setting up the block and key size basing on the algorithm sa.blocksize = AlgoBlockSize(AlgoIndex) sa.keysize = AlgoKeySize(AlgoIndex) Catch ex As Exception MsgBox("There could be some problem with the Block/Key size!", _ vbcritical, "Encryption/Decryption Error") 20 P age
22 Return False End Try 'Declare variables for encrypt/decrypt process. Dim bytbuffer(4096) As Byte 'holds a block of bytes for processing Dim lngbytesprocessed As Long = 0 'running count of bytes processed Dim lngfilelength As Long = fsinput.length 'the input file's length Dim intbytesincurrentblock As Integer 'current bytes being processed Dim cscryptostream As CryptoStream 'Determine if encryption or decryption and setup CryptoStream. Select Case Direction Case CryptoAction.ActionEncrypt cscryptostream = New CryptoStream(fsOutput, _ sa.createencryptor(bytekey, byteiv), CryptoStreamMode.Write) Case CryptoAction.ActionDecrypt cscryptostream = New CryptoStream(fsOutput, _ sa.createdecryptor(bytekey, byteiv), CryptoStreamMode.Write) End Select 'Loop until encryption/decryption until source file read the end While lngbytesprocessed < lngfilelength intbytesincurrentblock = fsinput.read(bytbuffer, 0, 4096) cscryptostream.write(bytbuffer, 0, intbytesincurrentblock) lngbytesprocessed = lngbytesprocessed + CLng(intBytesInCurrentBlock) End While 'Close FileStreams and CryptoStream. cscryptostream.close() fsinput.close() fsoutput.close() Return True 'Catch file not found error. Catch When Err.Number = 53 'if file not found If DontPrompt = False Then MsgBox("The specified file is not found!",_ vbexclamation, "File Not Found") DeleteFile(DstFile) 'Catch all other errors. And delete partial files. Catch fsinput.close() fsoutput.close() If Direction = CryptoAction.ActionDecrypt Then DeleteFile(DstFile) If DontPrompt = False Then MsgBox("Invalid Password Entered!!",_ vbexclamation, "Invalid Password") Else If DontPrompt = False Then MsgBox("Error: This file cannot be _ encrypted!", vbexclamation, "Invalid File") End Try Return False End Function 21 P age
23 8. Asymmetric Encryption The asymmetric encryption use in the application are for encrypting/decrypting key, IV, hashes and digital signature for the secure mail. 8.1 Source Code (Generating Keypair & Encrypting Message) 'Generating new keypair using RSACryptoServiceProvider Public Shared Function CreateNewKeys() As Keypair Try Using RSA As New RSACryptoServiceProvider RSA.KeySize = 2048 Dim Keys As New Keypair 'Output Private & Public will be in XML Format Keys.Privatekey = RSA.ToXmlString(True) Keys.Publickey = RSA.ToXmlString(False) Return Keys End Using Catch ex As Exception Throw New Exception("Keypair.CreateNewKeys():" & ex.message, ex) End Try End Function 'Encrypting Message (Sub class will be called) Private Function EncryptMessage(sDataToEncrypt As String, spublickey As String) As String Dim CombineTxt As String = "" Try Dim ln As Integer = Len(sDataToEncrypt) Dim md As Integer = ln / 50 Dim rmd As Integer = ln Mod 50 Dim a As Integer = 1 For i = 0 To md Dim EncryptedMessage As SecuredMail.RSAResult = SecuredMail.RSA.Encrypt _ (Mid(sDataToEncrypt, a, 50), spublickey) CombineTxt += EncryptedMessage.AsBase64String & vblf a = a + 50 Next If rmd > 0 Then Dim EncryptedMessage As SecuredMail.RSAResult = SecuredMail.RSA.Encrypt _ (Mid(sDataToEncrypt, a, rmd), spublickey) CombineTxt += EncryptedMessage.AsBase64String & vblf DisplayStatus("Encrypted..") Catch ex As Exception MsgBox(Err.Description) DisplayStatus("RSA Encryption Error : " + ex.message) End Try Return CombineTxt End Function 22 P age
24 8.2 Source Code (Sign & Verify Digital Signature) Private Function HashAndSignData(ByVal sdata As String, PrivateKey As String) As String Dim rsaprivateparams As RSAParameters Dim RSA As New RSACryptoServiceProvider Try RSA.FromXmlString(PrivateKey) rsaprivateparams = RSA.ExportParameters(True) Dim Hash As New SHA1Managed 'import private key params into instance of RSACryptoServiceProvider RSA.ImportParameters(rsaPrivateParams) 'compute hash with algorithm specified as here we have SHA! Dim HashedData() As Byte = Hash.ComputeHash(UnicodeStringToBytes(sData)) Dim HashedDataHex As String = Bytes_To_String2(HashedData) ' Sign Data using private key & OID is simple name of the algorithm for which to get the object identifier (OID) Return HashedDataHex & vblf & ByteToBase64(RSA.SignHash(HashedData, _ CryptoConfig.MapNameToOID("SHA1"))) Catch ex As Exception Return "" End Try Return "" End Function Private Function VerifySignature(ByVal sdata As String, ByVal Base64Signature As String,_ PublicKey As String) As String Dim RSA As New RSACryptoServiceProvider Dim rsapubparams As RSAParameters Dim DigitalSignature As Byte() = Base64ToByte(Base64Signature) Try RSA.FromXmlString(PublicKey) rsapubparams = RSA.ExportParameters(False) 'create new instance of SHA1 hash algorithm to compute hash Dim Hash As New SHA1Managed 'a byte array to store hash value Dim HashedData() As Byte 'import public key params into instance of RSACryptoServiceProvider RSA.ImportParameters(rsaPubParams) 'compute hash with algorithm specified as here we have SHA1 HashedData = Hash.ComputeHash(UnicodeStringToBytes(sData)) Dim HashedDataHex As String = Bytes_To_String2(HashedData) ' Sign Data using public key and OID is simple name of the algorithm for which _ to get the object identifier (OID) Dim PassOrFail As Boolean = RSA.VerifyHash(HashedData, _ CryptoConfig.MapNameToOID("SHA1"), DigitalSignature) Dim ValidOrNot As String = "" If PassOrFail = True Then ValidOrNot = "Digital Signature Is Valid" Else ValidOrNot = "Digital Signature Is Invalid" Return HashedDataHex & vblf & ValidOrNot Catch ex As Exception Return "" & vblf & "Error: Unable To Verify Digital Signature" End Try Return "" & vblf & "Error: Unable To Verify Digital Signature" End Function 23 P age
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
How to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
SafeGuard PrivateCrypto 2.40 help
SafeGuard PrivateCrypto 2.40 help Document date: September 2009 Contents 1 Introduction... 2 2 Installation... 4 3 SafeGuard PrivateCrypto User Application... 5 4 SafeGuard PrivateCrypto Explorer extensions...
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.
User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
File Share Service User guide
File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Cryptography & X.509 Certificates. Dominick Baier
Cryptography & X.509 Certificates Dominick Baier Dominick Baier Solution architect and security consultant at thinktecture Focus on security in distributed applications identity management Windows/.NET
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Pre-configured AS2 Host Quick-Start Guide
Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
Microsoft SQL Server Integration Guide
Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks
PKZIP 6.0. Command Line for Windows Getting Started Manual
PKZIP 6.0 Command Line for Windows Getting Started Manual Copyright 2000-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Installing your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Email. MIME is the protocol that was devised to allow non-ascii encoded content in an email and attached files to an email.
Email Basics: Email protocols were developed even before there was an Internet, at a time when no one was anticipating widespread use of digital graphics or even rich text format (fonts, colors, etc.),
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
How to use Certificate in Outlook Express
How to use Certificate in Outlook Express Macau Post esigntrust Version. 2006-01.01p Agenda Configure Outlook Express for using esigntrust Certificate Use certificate to sign email Use Outlook Express
WildFire Features. Palo Alto Networks. PAN-OS New Features Guide Version 6.1. Copyright 2007-2015 Palo Alto Networks
WildFire Features Palo Alto Networks PAN-OS New Features Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Project #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
SafeNet MSSQL EKM Provider User Guide
SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All
WebApp S/MIME Manual. Release 7.2.1. Zarafa BV
WebApp S/MIME Manual Release 7.2.1 Zarafa BV January 06, 2016 Contents 1 Introduction 2 2 Installation 3 2.1 RPM based distributions............................................. 3 2.2 DEB based distributions.............................................
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
A Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
IBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
User Guide. Description of method for setting up secure communication with CDS using Outlook Express
User Guide Description of method for setting up secure communication with CDS using Outlook Express Version: C 23.10.2007 CDS D4_Instalace_OutlookExpressSettings_Eng.doc Page 1 / 11 CONTENTS 1 Introduction
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
Zarafa S/MIME Webaccess Plugin User Manual. Client side configuration and usage.
Zarafa S/MIME Webaccess Plugin User Manual Client side configuration and usage. Zarafa S/MIME Webaccess plugin provides S/MIME functionality, for receiving and sending encrypted and / or sign messages
Pentagon Message Exchange Setup Guide: All Devices
Pentagon Message Exchange Setup Guide: All Devices This guide has been sent to you to help you set up Pentagon Message Exchange on your equipment. In this guide, you will find the details required for
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Ciphermail for BlackBerry Reference Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Reference Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 BlackBerry add-on 3 2.1
Encrypting and signing e-mail
Encrypting and signing e-mail V1.0 Developed by Gunnar Kreitz at CSC, KTH. V2.0 Developed by Pehr Söderman at ICT, KTH ([email protected]) V3.0 Includes experiences from the 2009 course V3.1 Adaptation for
2. Cryptography 2.4 Digital Signatures
DI-FCT-UNL Computer and Network Systems Security Segurança de Sistemas e Redes de Computadores 2010-2011 2. Cryptography 2.4 Digital Signatures 2010, Henrique J. Domingos, DI/FCT/UNL 2.4 Digital Signatures
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Electronic mail security. MHS (Message Handling System)
Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15
DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD Unify Data Management Platform 2012/2013 Software Build 5.15 April 2015 Proprietary and Confidential Property of Truven Health Analytics Inc.
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
