Security. Why do we have to hide from the police, Daddy? Because we use PGP, son. They use S/MIME
|
|
|
- Maude Brown
- 10 years ago
- Views:
Transcription
1 Security Why do we have to hide from the police, Daddy? Because we use PGP, son. They use S/MIME Security Problems with using for secure communications include Doesn t handle binary data Messages may be modified by the mail transport mechanism Trailing spaces deleted Tabs spaces Character set conversion Lines wrapped/truncated Message headers mutate considerably in transit Data formats have to be carefully designed to avoid these problems
2 Security Requirements Main requirements Confidentiality Authentication Integrity Other requirements Non-repudiation Proof of submission Proof of delivery Anonymity Revocability Resistance to traffic analysis Many of these are difficult or impossible to achieve Security Mechanisms Detached signature Leaves the original message untouched Signature can be transmitted/stored separately Message can still be used without the security software Signed message Signature is always included with the data
3 Security Mechanisms (ctd) Encrypted message Usually implemented using public-key encryption Mailing lists use one public-key encrypted header per recipient Any of the corresponding private keys can decrypt the session key and therefore the message Security Mechanisms (ctd) Countersigned data Encrypted and signed data Always sign first, then encrypt S( E( Pay the signer $1000 ) vs. E( S( Pay the signer $1000 )
4 PEM Privacy Enhanced Mail, 1987 Atempt to add security to SMTP (MIME didn t exist yet) Without MIME to help, this wasn t easy Attempt to build a CA hierarchy along X.500 lines Without X.500 available, this wasn t easy Solved the data formatting problem with base64 encoding Encode 3 binary bytes as 4 ASCII characters The same encoding was later used in PGP, MIME,... PEM Protection Types Unsecured data Integrity-protected (MIC-CLEAR) MIC = message integrity check = digital signature Integrity-protected encoded (MIC-ONLY) Encrypted integrity-protected (ENCRYPTED) General format based on RFC822 messages -----BEGIN PRIVACY-ENHANCED MESSAGE----- Type: Value Encapsulated header Type: Value Type: Value Blank line Data Encapsulated content -----END PRIVACY-ENHANCED MESSAGE-----
5 PEM Protection Types (ctd) MIC-ONLY -----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 4,MIC-ONLY Content-Domain: RFC822 Originator-Certificate: MIIBlTCCAScCAWUwDQYJKoZIhvcNAQECBQAwUTELMAkGA1UEBhMCVVMxIDAeBgNV BAoTF1JTQSDRiNKcOCaCoLAyaXR5LCBJbmMuMQ8wDQYDVQQLEwZCFNOrDDExDzAN... iwlfpun5jj79khfg7asfxskykemjrnzv/hzdzqehtvau7jxfzs2wfx5bymp2x3u/ 5XUXGx7qusDgHQGs7Jk9W8CW1fuSWUgN4w== Issuer-Certificate: MIIB3FNoRDgCAQowDQYJKoZIhvcNAQECBQAwTzEWiGEbLUMenKraFTMxIDAeBgNV BAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMQ8wDQYDVQQLEwZCZXRhIDExDTAL... dd2jmz/3hsywkwgsf0eh/ajb3qr9zosg47pymntf3asy2nbo7cmxpuwrbcxupe+x EREZd9++32ofGBIXaialnOgVUn0OzSYgugiQReSIsTKEYeSCrOWizEs5wUJ35a5h MIC-Info: RSA-MD5,RSA, jv2ofh+nnxfnordl8kpaad/msqltdzlbvuxvzaovrz5q5+ejl5bqvqneqounqjr6 EtE7K2QDeVMCyXsdJlA8fA== LSBBIG1lc3NhZ2UgZm9yIHVzZSBpbiB0ZXN0aW5nLg0KLSBGb2xsb3dpbmcgaXMg YSBibGFuayBsaW5lOg0KDQpUaGlzIGlzIHRoZSBlbmQuDQo= -----END PRIVACY-ENHANCED MESSAGE----- PEM Protection Types (ctd) ENCRYPTED (explicitly includes MIC) -----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 4,ENCRYPTED Content-Domain: RFC822 DEK-Info: DES-CBC,BFF968AA74691AC1 Originator-Certificate: MIIBlTCCAScCAWUwDQYJKoZIhvcNAQECBQAwUTELMAkGA1UEBhMCVVMxIDAeBgNV... 5XUXGx7qusDgHQGs7Jk9W8CW1fuSWUgN4w== Issuer-Certificate: MIIB3DCCAUgCAQowDQYJKoZIhvcNAQECBQAwTzELMAkGA1UEBhMCVVMxIDAeBgNV... EREZd9++32ofGBIXaialnOgVUn0OzSYgugiQ077nJLDUj0hQehCizEs5wUJ35a5h MIC-Info: RSA-MD5,RSA, UdFJR8u/TIGhfH65ieewe2lOW4tooa3vZCvVNGBZirf/7nrgzWDABz8w9NsXSexv AjRFbHoNPzBuxwmOAFeA0HJszL4yBvhG Continues
6 PEM Protection Types (ctd) Continued Recipient-ID-Asymmetric: MFExCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5j LjEPMA0GA1UECxMGQmV0YSAxMQ8wDQYDVQQLEwZOT1RBUlk=,66 Key-Info: RSA, O6BS1ww9CTyHPtS3bMLD+L0hejdvX6Qv1HK2ds2sQPEaXhX8EhvVphHYTjwekdWv 7x0Z3Jx2vTAhOYHMcqqCjA== qewlj/yj2uf5ng9yznpbtd0myloswiuv9fryx+gzy+8ixd/nqrxhfi6/mhpfpf3d jiqcjaxvld2xgqqimuzos1a4r7kqq5c/iua4lqkeq3cifzev/mbzha== -----END PRIVACY-ENHANCED MESSAGE----- PEM CA Hierarchy Single grand unified hierarchy No choice of alternate CAs, policies, Although PEM itself failed, the PEM CA terminology still crops up in various products
7 PEM CA Hierarchy (ctd) Policy CA s guarantee certain things such as uniquenes of names High-assurance policies (secure hardware, drug tests for users, etc) Can t isue certificates to anything other than other highasurance CA s Standard CA s No-asurance CA s (persona CA s) Certificate vending machines Clown suit certificates Why PEM Failed Why the CA s failed The Internet uses addresses, not X.500 names Actually, no-one uses X.500 names CA s for commercial organisations and universities can t meet the same requirements as government defence contractors for high-asurance CA s Later versions of PEM added lower-assurance CA hierarchies to fix this CA hardware was always just a few months away When it arrived, it was hideously expensive CA s job was made so onerous no-one wanted it Later versions made it easier
8 Why PEM Failed (ctd) Hierarchy enshrined the RSADSI monopoly CA hardware acted as a billing mechanism for RSA signatures People were reluctant to trust RSADSI (or any one party) with the security of the entire system The required X.500 support infrastructure never materialised Why PEM Failed (ctd) Why the message format failed The PEM format was ugly and intrusive PEM successors bundled everything into a single blob and tried to hide it somewhere out of the way No ability to just send encrypted messages ENCRYPTED requires use of MIC Most users wanted encryption, not signing The S/MIME standards group decided several years ago that it wasn t worth signing its mesages RSA patent problems Pieces of PEM live on in a few European initiatives MailTrusT, SecuDE, modified for MIME-like content types
9 PGP Pretty Good Privacy Hastily released in June 1991 by Phil Zimmerman (PRZ) in response to S.266 MD4 + RSA signatures and key exchange Bass-O-Matic encryption LZH data compression uuencoding ASCII armour Data format based on a 1986 paper by PRZ PGP was immediately distributed worldwide via a Usenet post PGP (ctd) PGP 1.0 lead to an international effort to develope 2.0 Bass-O-Matic was weak, replaced by the recently-developed IDEA MD4 " " " " MD5 LZH replaced by the newly-developed InfoZip (now zlib) uuencoding replaced with the then-new base64 encoding Ports for Unix, Amiga, Atari, VMS added Internationalisation support added
10 Legal Problems PGP was the centre of an ongoing legal dispute with RSADSI over patents RSADSI released the free RSAREF implementation for (noncommercial) PEM use PGP 2.6 was altered to use RSAREF in the US Commercial versions were sold by Viacrypt, who had an RSA license Later versions deprecated RSA in favour of the nonpatented Elgamal Elgamal was referred to in the documentation as Diffie- Hellman for no known reason Both are DLP algorithms, but DH!= Elgamal Government Problems In early 1993, someone apparently told US Customs that PRZ was exporting misappropriated crypto code US Customs investigation escalated into a Federal Grand Jury (US Attorney) in September 1993 They were pretty serious, e.g.: 26 February 1995: San Francisco Examiner and SF Chronicle publish an article criticising the government s stand on encryption and the PGP investigation 27 February 1995: Author of the article wassubpoena dto appear before the Grand Jury Investigation was dropped in January 1996 with no charges laid
11 PGP Message Formats Unsecured Compressed Signed/clearsigned Encrypted + optional encoding General format -----BEGIN PGP message type----- data -----END PGP message type----- PGP Message Formats (ctd) Clearsigned message -----BEGIN PGP SIGNED MESSAGE----- We've got into Peter's presentation. Yours is next. Resistance is useless BEGIN PGP SIGNATURE----- Version: 2.3 iqcvagubk9ial2v14asak9pnaqevxgqaoxrviaggvpvrdlwzchbnqo6yhunuj8my cvpx2zvkhhjzkfs5luw6z63rrwejvhxegv79ex4xzssswvuzblvyqukgs08sz2eq blsuij9afxalv5gj4jb/hu40qvu6i7gkkrvgtlxeypkvxfd+tfc4n9hovumvnruc ve5zy8988py= =NOcG -----END PGP SIGNATURE----- Remember that all this predates MIME Also had to work with things like Fidonet
12 PGP Message Formats (ctd) Anything else -----BEGIN PGP MESSAGE----- Version: 2.3 hqemalkhsm216bqraqf/f938a6hglx51/hwa42ocdrqdrgw6hjd+5oqqx/58jb8y UAlrYBHYZ5md46ety62phvbwfsNuF9igSx2943CHrnuIVtkSXZRpKogtSE1oMfab 5ivD4I+h3Xk0Jpkn5SXYAzC6/cjAZAZSJjoqy28LBIwzlfNNqrzIuEW8lbLPWAt1 eqds18ukiouvnqai1qfjipgug+db1knpqjp7whul/4rg1qi50p3bcdispc8jzq/y GsKFlckA132dMx6b80vsUZga/tmJOwrgBjSbnOJ8UzLrNe+GjFRyBS+qGuKgLd9M ymygmynoqo/lxalsllic/dr1nkc0cac01a/rz00w4kyaafrxx9a1bqq1nb40/osb CgrPqi61jBks2NW2EPoIC7nV5xLjflZwlRjY/V5sZS6XDycJ9YOf6fOclNwCoBsB HRshmNtMHH2tq2//OozKZ8/GHGNysN8QQWNQYElgRCgH3ou1E+CJoyoPwrMqjSYC ogp4fezqpii83ve/qmmv276knttflrpq2h+lldvx9wfjg1+xtw== =ZuOF -----END PGP MESSAGE----- PGP Key Formats Unlike PEM, PGP also defined public/private key formats OpenSSL s PEM format is a homebrew invention Key trust = how much the key is trusted to sign things (set by the user) userid trust = how much the userid is trusted to belong to this key Signing trust = copy of the signing key s trust PGP calculates userid trust = sum of signing trusts
13 PGP Trust UserID trust = trust of binding between userid and key Key trust = trust of key owner Example: UserID = Politician UserID trust = High Key trust = Low Trust levels Unknown None Casual Heavy-duty PGP Trust (ctd) Each key can contain multiple userids with their own trust levels userid = Peter Gutmann, trust = high userid = University Vice-Chancellor, trust = none Keys are revoked with a signed revocation (suicide note) that PGP adds to the key Unlike X.509, you don t need to go to an external agency to cancel your key PGP philosophy: Scram switch, in case of an emergency shut down as quickly as possible X.509 philosophy: DoS, make it as difficult as possible to revoke a key
14 PGP Trust Computation Trust levels are automatically computed by PGP User can define the required trust levels (e.g. 3 casuals = 1 high) In practice, the web of trust doesn t realy deliver It can also be used hierarchically, like X.509 PGP Keyrings One or more keys stored together constitute a keyring Keys are looked up by userid (freeform name) keyid (64-bit value derived from the public key) The owner s key is ultimately trusted and can convey this to other keys
15 Key Distribution Key distribution doesn t rely on an existing infrastructure Personal contact Keysigning services Keys on web pages PGP keyservers /http interface to a PGP keyring HKP = undocumented protocol based on variations of a student project Verification by various out-of-band means (personal contact, phone, mail) PGP key fingerprint was specifically designed for this purpose Advantages of PGP over PEM You can pick your own name(s) You don t have to register with an authority PGP requires no support infrastructure The trust mechanism more closely matches real life Key/certificate distribution can be manual or automatic (just include it with the message)
16 MIME-based Security Multipurpose Internet Mail Extensions Provides a convenient mechanism for transferring composite data Security-related information is sent as sections of a multipart message multipart/signed multipart/encrypted Binary data is handled via base64 encoding MIME-aware mailers can automatically process the security information (or at least hide it from the user) MIME-based Security (ctd) General format Content-Type: multipart/type; boundary="boundary" Content-Transfer-Encoding: base64 --Boundary encryption info --Boundary message --Boundary signature --Boundary-- Both PEM and PGP were adapted to fit into the MIME framework
17 MOSS MIME Object Security Services PEM shoehorned into MIME MOSS support was added to MIME types via application/moss-signature and application/moss-keys MOSS (ctd) MOSS Signed Content-Type: multipart/signed; protocol="application/mosssignature"; micalg="rsa-md5"; boundary="signed Message" --Signed Message Content-Type: text/plain Support PGP: Show MOSS to your friends. --Signed Message Content-Type: application/moss-signature Version: 5 Originator-ID: jv2ofh+nnxhu8bnl8kpaad/msqltdzlbvuxvzaovrz5q5+ejl5bqvqneqounqjr6 EtE7K2QDeVMCyXsdJlA8fA== MIC-Info: RSA-MD5,RSA, UdFJR8u/TIGhfH65ieewe2lOW4tooa3vZCvVNGBZirf/7nrgzWDABz8w9NsXSexv AjRFbHoNPzBuxwmOAFeA0HJszL4yBvhG --Signed Message--
18 MOSS (ctd) MOSS Encrypted Content-Type: multipart/encrypted; protocol="application/moss-keys"; boundary="encrypted Message" --Encrypted Message Content-Type: application/moss-keys Version: 5 DEK-Info: DES-CBC,BFF968AA74691AC1 Recipient-ID: MFExCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0EgRGF0YSBTZWN1cml0eSwgSW5j LjEPMA0GA1UECxMGQmV0YSAxMQ8wDQYDVQQLEwZOT1RBUlk=,66 Key-Info: RSA, O6BS1ww9CTyHPtS3bMLD+L0hejdvX6Qv1HK2ds2sQPEaXhX8EhvVphHYTjwekdWv 7x0Z3Jx2vTAhOYHMcqqCjA== --Encrypted Message Content-Type: application/octet-stream qewlj/yj2uf5ng9yznpbtd0myloswiuv9fryx+gzy+8ixd/nqrxhfi6/mhpfpf3d jiqcjaxvld2xgqqimuzos1a4r7kqq5c/iua4lqkeq3cifzev/mbzha== --Encrypted Message-- PGP/MIME PGP shoehorned into MIME PGP support added to MIME types via application/pgpsignature and application/pgp-encrypted PGP already uses -- so PGP/MIME escapes this with BEGIN PGP MESSAGE----- becomes BEGIN PGP MESSAGE-----
19 PGP/MIME (ctd) PGP/MIME Signed: Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg=pgp-md5; boundary=signed --Signed Content-Type: text/plain Our message format is uglier than your message format! --Signed Content-Type: application/pgp-signature BEGIN PGP MESSAGE----- Version: iqcvawubmjrrf2n9owbghpdjaqe9uqqatl7lurvndbjrk4eqybib3h5qxix/lc// jjv5bnvkzigpicemi5ifd9boegvpirhtireeqlqrkynobactfbzmh9gc3c041wgq umbrbxc+nis1tikla08rvi9ig/2yh7lfrk5ein57u/w72vgsxlhe/zhdfolt9brn HOxEa44b+EI= =ndaj END PGP MESSAGE Signed-- PGP/MIME (ctd) PGP/MIME Encrypted Content-Type: multipart/encrypted; protocol="application/pgpencrypted"; boundary=encrypted --Encrypted Content-Type: application/pgp-encrypted Version: 1 --Encrypted Content-Type: application/octet-stream -----BEGIN PGP MESSAGE----- Version: hiwdy32hygce8mkba/wou7d45auxf4q0rkjprd3v5z9k1ycrj2fve87lmldlx4oj g9vgqxfegqzykzmyku6a26msmexr4apeeon6xzzwfo+0yoqaq6lb46wsvldz96ya AABH78hyX7YX4uT1tNCWEIIBoqqvCeIMpp7UQ2IzBrXg6GtukS8NxbukLeamqVW3 1yt21DYOjuLzcMNe/JNsD9vDVCvOOG3OCi8= =zzaa -----END PGP MESSAGE Encrypted--
20 MOSS and PGP/MIME MOSS never took off PGP/MIME never took off either S/MIME Originally based on proprietary RSADSI standards wrapped in MIME PKCS, Public Key Cryptography Standards RC2, RC4 for data encryption PKCS #1, RSA encryption, for key exchange PKCS #7, cryptographic message syntax, for message formatting Newer versions added non-proprietary and non-patented ciphers Widely-supported, little-used Every Windows box and many Unix boxes have this built in Outlook makes it (moderately) easy to use
21 CMS Cryptographic Message Syntax Type-and-value format Data content types Data Signed data Encrypted data (conventional encryption) Enveloped data (PKC-encrypted) Authenticated (MAC d) data Compressed data CMS (ctd) Other content types possible Key management messages Protocol-specific message data Content can be arbitrarily nested
22 Signed Data Format Digest (hash) algorithm(s) Encapsulated data Signer certificate chain(s) Signature(s) Presence of hash algorithm information before the data and certificates before the signatures allows one-pass processing Streaming implementations can generate and verify messages on the fly Signature Format Signing certificate ID Authenticated attributes Signature Unauthenticatedattributes Authenticated attributes are signed along with the encapsulated content Signing time Signature type I agree completely I agree in principle I disagree but can t be bothered going into the details A flunky handed me this to sign
23 Signature Format (ctd) Receipt request Security label Mailing list information Unauthenticated attributes provide a means of adding further information without breaking the original signature Countersignature Countersigns an existing signature Signs the signature on the content rather than the content itself, so the other content doesn t have to be present Countersignatures can contain further countersignatures Enveloped Data Format Per-recipient information Decryption key certificate ID Encryptedcontent-encr.key Newer versions added support for further mechanisms like previously distributed shared content-encryption keys Makes mailing-list support easier
24 CMS S/MIME Wrap each individual CMS layer in MIME base64 encode + wrap content Encode as CMS data base64 encode + wrap content Encode as CMS signed data base64 encode + wrap content Encode as CMS enveloped data base64 encode + wrap content Result is 2:1 message expansion S/MIME Problems Earlier versions used mostly crippled crypto Only way to interoperate was 40-bit RC2 RC2/40 is still the lowest-common-denominator default User is given no warning of the use of crippled crypto Message forwarding may result in a security downgrade S/MIME-cracking screen saver released in 1997 Performs an optimised attack using RC2 key setup cycles Looks for the MIME header in the decrypted data Original S/MIME was based on patented RSA and proprietary RC2, rejected by the IETF as a standard IETF developed S/MIME v3 using strong crypto and nonpatented, non-proprietary technology
25 MSP Message Security Protocol, used in the Defence Messaging System (DMS) X.400 message contains an envelope + content MSP encapsulates the X.400 content and adds a security header X.400 security required using (and trusting) an X.400 MTA; MSP requires only trusted endpoints MSP was later used with MIME MSP Services Services provided Authentication Integrity Confidentiality Non-repudiation of origin (via message signatures) Non-repudiation of delivery (via signed receipts) MSP also provides rule-based access control (RBAC) based on message sensitivity and classification levels of sender, receiver, and workstation Receiving MUA checks that the receiver and workstation are cleared for the messages security classification MSP rule-based access control (RBAC) role-based access control (also RBAC)
26 MSP Certificates MSP defines three X.509 certificate types Signature-only Encryption (key management) only Signature and encryption (two keys in one certificate) Non-standard extension to X.509v1 Certificate also includes R(ule)BAC authorisations MSP Protection Types MSP Signature MUA/MLA signs with signature-only certificate Non-repudiation User signs with signature or dual-key certificate Confidentiality, integrity, R(ule)BAC Encrypted with key management or dual-key certificate Non-repudiation + confidentiality, integrity, R(ule)BAC Sign + encrypt using either signature and key management certificates or dual-key certificate Any of the above can be combined with MSP signatures
27 MSP Protection Types (ctd) MSP signature covers MSP header and encapsulated content Mandatory for mailing lists User signature covers encapsulated content and receipt request information MSP Message Format Originator security data Originator key management cert chain Signature Receipt request information Signature on data and receipt info Signature cert chain Recipient security data Decryption key ID Encrypted security classification (RBAC) and content-encr.key Mailing list control information MUA or MLA information Encapsulated content
28 MSP Message Format (ctd) Extremely complex format Many optional features in S/MIME are part of base MSP Conversely, looking at MSP explains some of the weird stuff found in S/MIME Awkward-to-process format One-pass processing is impossible Signature precedes signed data Signing certificates are present after the signature Fits well with the rest of X.400 MSP in Practice MSP is heavily tied into US DoD crypto hardware, e.g. Fortezza: DSA signatures KEA key management Skipjack encryption MSP was later kludged to work with MIME a la MOSS and PGP/MIME
29 Opportunistic Encryption After years of effort, S/MIME and PGP use is lost in the noise floor (MSP is lost in space) Most mail clients include S/MIME support Many (OSS) clients include PGP support Usage is virtually nonexistent Too hard to use Too much bother to use Opportunistic Encryption (ctd) Encrypt data using keys managed via key continuity Completely transparent to end users Requires no extra effort to use Effectively free (except for the slight CPU overhead) Most commonly encountered in SMTP/POP3/IMAP Protects mail in transit Authenticates the sender Prevents unauthorised relaying/spamming
30 STARTTLS/STLS/AUTH TLS Opportunistic encryption for SMTP/POP/IMAP/FTP 220 mail.foo.com ESMTP server ready EHLO server.bar.com 250-STARTTLS STARTTLS 220 Ready to start TLS <encrypted transfer> Upgrades the unprotected link to a TLS-protected one Totally transparent, (almost) idiot-proof, etc STARTTLS/STLS/AUTH TLS (ctd) A year after appearing, STARTTLS was protecting more than all other encryption protocols combined, despite their year lead Just as SSH has displaced telnet, so STARTTLS is displacing (or augmenting) straight SMTP/POP3/IMAP Auckland Uni turned off unencrypted mail to local servers after STARTTLS appeared, just as they turned off telnet after SSH appeared Not perfect, but boxes attackers into narrower and narrower channels Biggest benefit to MTA admins is as an access control mechanism
4.1: Securing Applications Remote Login: Secure Shell (SSH) E-Mail: PEM/PGP. Chapter 5: Security Concepts for Networks
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.1:
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Lecture 10: 1. Secure E mail E systems. Systems. Page 1
1 2 Prof. Sead Matei Ciobanu Morogan Abdul Ghafoor Abbasi Lecture 10: Secure E-mailE Lecture 10 : Secure E mail E Subjects / opics : 1. Secure E mail E systems 2. Secure, rusted, Authorized and eliable
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
Email Security. Issues:
Email Security Email Security Issues: Not real time, can afford to use public key cryptosystems more. Certification of keys is much harder because anyone can send anyone else some mail Strictly end to
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Electronic mail security. MHS (Message Handling System)
Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Forging Digital Signatures
Forging Digital Signatures Albert Levi Sabanci University Istanbul, TURKEY [email protected] ACSAC 2002 Outline What s a digital signature? How S/MIME handles digital signatures? How to obtain a certificate
Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 3: Securing applications Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section 8.5)
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
E-Mail Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)
Dept. of Information & Communication Systems E-Mail Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail) Konstantinos Raptis Supervisor: Sokratis Katsikas Samos, September 99 Table of Contents:
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many
In the world of secure email, there are many options from which to choose from to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many cryptographical concepts to achieve a supposedly
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22 What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Federal S/MIME V3 Client Profile
NIST Special Publication 800-49 Federal S/MIME V3 Client Profile C. Michael Chernick C O M P U T E R S E C U R I T Y November 2002 NIST Special Publication 800-49 Federal S/MIME V3 Client Profile Recommendations
Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
Pretty Good Privacy with GnuPG
Pretty Good Privacy with GnuPG Steve Revilak Cabot House Sep. 24, 2013 1 / 16 Encryption and Signing Encryption The purpose is to ensure that a message is readable only by someone possessing a specific
An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison
What Your Mother Didn't Tell You About PEM, DER, PKCS Eric Norman University of Wisconsin-Madison 1 Audience I'm nuts Some of you might want to bolt Who needs to know? Developers Support personnel diagnose
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
infilename outfilename signcert privkey headers flags
http://doc.helplib.com openssl_pkcs7_encrypt openssl_pkcs7_verify OpenSSL 函 数 在 线 手 册 : 中 文 英 文 PHP 手 册 openssl_pkcs7_sign (PHP 4 >= 4.0.6, PHP 5) openssl_pkcs7_sign Sign - an S/MIME message 说 明 bool openssl_pkcs7_sign
User Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
E-Mail Security. Raj Jain. Washington University in St. Louis
E-Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
User Guide Using Certificate in Microsoft Outlook Express
CERTIFYING AUTHORITY User Guide Using Certificate in Microsoft Outlook Express CONTACT TATA CONSULTANCY SERVICES - [E-SECURITY: PKI SERVICES] 6TH FLOOR, 5-9-62, KHAN LATEEF KHAN ESTATE FATEH MAIDAN ROAD,
Taxonomy of E-Mail Security Protocol
Taxonomy of E-Mail Security Protocol Ankur Dumka, Ravi Tomar, J.C.Patni, Abhineet Anand Assistant Professor, Centre for information Technology, University of Petroleum and Energy Studies,Dehradun, India
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Encrypted Connections
EMu Documentation Encrypted Connections Document Version 1 EMu Version 4.0.03 www.kesoftware.com 2010 KE Software. All rights reserved. Contents SECTION 1 Encrypted Connections 1 How it works 2 Requirements
