Cryptography and Network Security
|
|
|
- Blaise O’Connor’
- 10 years ago
- Views:
Transcription
1 Cryptography and Network Security Spring Lecture 11: security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14,
2 Very popular network-based application Sending an between two distant sites means that the has to transit dozens of machines on the way Those machines may read and record the message Privacy is thus non-existent by default There are systems for secure s PGP S/MIME PEM February 14,
3 Pretty Good Privacy PGP Essentially the product of one single person Phil Zimmermann PGP was released in 1991 Complete security package providing privacy, authentication, digital signatures, and compression in an easy-to-use form Complete package, including source code distributed freely on Internet: e.g., Available on Unix, Linux, Windows, Mac OS Based on IDEA for encryption (128-bit key), RSA for key management, MD5 for data integrity Big controversy related to PGP Zimmermann did nothing to stop people from posting PGP on websites US government claimed that he violated US laws prohibiting the export of munitions and investigated the case for 5 years before dropping it He never posted PGP on a website Wining a trial meant to convince a jury that posting privacy code on a website is covered by a law prohibiting export of tanks, submarines, nuclear weapons, etc. Publishing the code in a book is not covered by the same law Patent infringement: RSA Security Inc claimed that PGP s use of RSA infringed on its patent (eventually settled); same problems with using IDEA Many version of PGP exist users can download and modify the code. Discuss here original PGP. Other versions: Open PGP, GNU Privacy Guard, etc. February 14,
4 Using PGP to encrypt and sign a message February 14,
5 Using PGP to encrypt and sign a message Sending a message Alice first hashes her message with MD5 and then encrypts the hash with her private RSA key Encrypted hash and message are concatenated and encrypted with ZIP (based on Lempel-Ziv algorithm) PGP asks the user for a random input from the keyboard Based on the input and on the typing speed, PGP generates a 128-bit IDEA message key K M Encrypt P1.Z with IDEA with key K M Key K M is then encrypted with Bob s public key The two components are concatenated and converted to base64 Some software only allows sending ASCII text Converting to base64 will give the symbols [A-Z][a-z][0-9][+/]; pad with = if necessary Receiving a message Bob reverses the base64 encoding and decrypts the IDEA key with his own private key Using this key he decrypts the message to get P1.Z and decompresses it Separate the plaintext from the encrypted hash and decrypt the hash with Alice s public key Compute the hash of the message and check the match with the received hash February 14,
6 Conversion to base 64 - Radix-64 conversion - February 14,
7 Conversion to base 64 - Radix-64 conversion - February 14,
8 Encryption or signing with PGP February 14,
9 Performance RSA is used in two places: to encrypt the 128-bit MD5 hash and the 128-bit IDEA key The heavy encryption is done by IDEA, which is much faster than RSA PGP supports 4 RSA key lengths and it is up to the user to select the appropriate one according to his needs Casual (384 bits) easily broken today Commercial (1024 bits) breakable by three-letter organizations Military (2048 bits) not breakable by anyone on Earth Alien (4096 bits) not breakable by anyone on other planets, either?! Since RSA is only used on 256 bits, everyone should use alien keys February 14,
10 Format of a classic PGP message Key part contains the key and a key identifier (users can have multiple public keys) Signature part contains a header, followed by a timestamp, the ID of the sender s public key that should be used for decrypting the signature hash, some type information to identify the algorithms used (for more flexibility), and the encrypted hash Message part contains a header, the default name of the file if the receiver is saving it on the disk, a message creation timestamp, and the message February 14,
11 Key management in PGP - private key ring - Each user maintains two data structures locally: a private key ring and a public key ring Private key ring contains one or more personal private-public key pairs One may have more than one pair Each pair has an identifier the low-order 64 bits of the public key Users are responsible to create public keys with different identifiers The private keys on disk are kept encrypted using a special (arbitrarily long) password PGP asks the user for a password when creating the private-public pair Using SHA-1, a 160-bit hash of the password is created and the password is discarded The private key is encrypted using IDEA and using the hash as a key Whenever the user needs access to his private key, the password is given, and the key is recovered based on the hash The public key can be uploaded on dedicated servers: e.g., keyserver.pgp.com, europe.keys.pgp.com February 14,
12 Key management in PGP - public key ring - Public key ring contains public keys of the user s correspondents and their IDs, plus an indication of how strongly the user trusts the key When the user inserts a new public key, PGP is asserting the trust the user has in that key: key legitimacy field (computed by PGP) The key could be signed by other users; if those users are already known to PGP (through their public keys), then the trust the user has in those users influences the key legitimacy If the key is not signed or it is signed by unknown users, then it will be considered invalid To validate somebody s key, the user must sign the key himself thus asserting to PGP that he is convinced the key is valid To convince oneself, one could: physically get the key from its owner, get the key by and verify it (its SHA-1 hash) by telephone, get the key from a mutually trusted individual, get it from a trusted certificate authority, etc. PGP has support for X.509 key certificates To revoke a public key, the user should issue a key revocation certificate, signed by the owner this is just like a normal signature certificate; the user should send this revocation certificate to everybody he knows as quickly as possible An opponent who has compromised a private key may also revoke it himself this seems unlikely though February 14,
13 Key management in PGP - using keys for encryption and authentication - Signing a file/message PGP retrieves the sender s private key asking first for the password protecting it Signature is constructed based on the private key Encrypting a file/message PGP generates a session key and encrypts the message PGP retrieves the recipient s public key from the public key ring and encrypts the session key Decrypting a file/message On the receiver s side, PGP retrieves his private key asking for the password protecting it PGP recovers the session key and decrypt the message Authenticating a file/message PGP retrieves the sender s public key from the public-key ring PGP recovers the transmitted message digest PGP computes the message digest for the received message and checks the match February 14,
14 Security of PGP No publicly known attack against PGP Various indications that even government agencies find it impossible (or have big difficulties) breaking PGP 2003: incident involving the Red Brigades (Italy) indicated that neither Italian police neither FBI could break PGP December 2006: US custom agents could not break PGP used to encrypt some presumably illegal files on a computer November 2009: British citizen jailed for 9 months for refusing to give the encryption keys to some of his PGP-encrypted files Commercial exploitation 1996: Zimmermann founded PGP inc through a merge with Viacrypt 1997: bought by Network Associates Inc (now McAfee) 2001: Zimmermann leaves Network Associates 2002: several from Zimmermann s old team found PGP corporation and eventually buys the PGP assets from McAfee 2010: Symantec Corp buys PGP for 300 million dollars February 14,
15 S/MIME Secure/Multipurpose Internet Mail Extension Security enhancement to the MIME internet format standard Originally developed by RSA Labs Both PGP and S/MIME are under consideration for IETF standard S/MIME is likely to emerge as the industry standard. PGP for personal security S/MIME defined in RFC 2630, 2632, 2633 February 14,
16 Simple Mail Transfer Protocol (SMTP, RFC 822) RFC 822: defines a format for text messages sent by header + body The header consists of several lines, each starting with a keyword followed by a semicolon: Date:, From:, Subject:, To:, Cc:, Message-ID: and ends with a blank line The body: unrestricted text SMTP Limitations cannot transmit, or has a problem with: executable files, or other binary files (jpeg image) national language characters (non-ascii) messages over a certain size ASCII to EBCDIC translation problems lines longer than a certain length (72 to 254 characters) Solutions for each of these problems exist but none is standard Each SMTP message has a header specifying from, to, subject, date MIME (Multipurpose Internet Mail Extension) is an extension to the RFC 822 framework addressing limitations of the SMTP MIME defines a standard way to deal with RFC 2045, 2046 Each message has a header with a number of fields describing the content of the A number of content formats defined Transfer encodings defined February 14,
17 Header fields in MIME MIME-Version: Must be 1.0 -> RFC 2045, RFC 2046 Content-Type: describes the data with sufficient detail so that the receiving user can deal with the data; more types being added by developers (application/word) Content-Transfer-Encoding: How the message has been encoded (radix-64) to make it suitable for mail transport Content-ID: Unique identifying character string. Content Description: Text description of the object within the body; needed when content is not readable text (e.g.,mpeg) February 14,
18 S/MIME Functions S/MIME offers similar services as PGP: sign and/or encrypt Enveloped Data: Encrypted content and encrypted session keys for recipients. Signed Data: Message Digest encrypted with private key of signer Can only be viewed by a recipient with S/MIME capabilities Clear-Signed Data: Signed but not encrypted. Can be seen (but not verified) also by recipients without S/MIME capabilities Signed and Enveloped Data: Various orderings for encrypting and signing sign first, then encrypt, or encrypt first, then sign, signed or clear signed-data, etc. February 14,
19 Cryptographic algorithms in S/MIME Message Digesting: SHA-1 and MD5 Digital Signatures: DSS (based on ElGamal) and RSA (keys from 512 to 1024 bits) Secret-Key Encryption: Triple-DES, AES (if available on the user s computer; not supported in Windows XP), RC2/40 (for backward compatibility) Session Key Encryption: ElGamal, RSA (key from 512 to 1024 bits) MAC: HMAC with SHA-1 In all the above, the first listed algorithm is a MUST, the second is recommended to be available S/MIME messages have extra MIME content types to describe the content of the message S/MIME secures a MIME entity (not the header though) with signature and/or encryption if the MIME content type is multipart, then a MIME entity is one or more subparts of the message Signing/encrypting a message works in the same way as with PGP February 14,
20 Key management S/MIME uses Public-Key Certificates - X.509 version 3 signed by Certification Authority The user is responsible to get the certificates needed to validate a new public key S/MIME key management functions to be performed Key Generation generate keys for ElGamal, DSS, and RSA Registration - Public keys must be registered with X.509 CA Certificate Storage - Local (as in browser application) for different services; may also be offered by the net administrator for a number of local users Public key certificates are offered by several companies (CAs): Nortel, Verisign (most popular), GTE, US Postal Service February 14,
21 Public-key certificates at Verisign (now Symantec) ( Product name: Verisign Digital ID; to change name in 2012 to Norton-secured certificates Owner s public key Owner s name or alias Expiration date of the digital ID Serial number of the digital ID Name of the certification authority Digital signature of the certification authority Address address Basic registration information country, zip, age, gender, etc. Several classes of certificates 2004 Class-1 (14.95 $/year in April 2004): Buyer s address checked by Verisign by ing vital info Class-2: Postal address is confirmed as well, and data checked against directories Class-3: Buyer must appear in person, or send notarized documents Digital ID: 19.95$ for 1 year February 14,
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 3: Securing applications Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section 8.5)
Forging Digital Signatures
Forging Digital Signatures Albert Levi Sabanci University Istanbul, TURKEY [email protected] ACSAC 2002 Outline What s a digital signature? How S/MIME handles digital signatures? How to obtain a certificate
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
4.1: Securing Applications Remote Login: Secure Shell (SSH) E-Mail: PEM/PGP. Chapter 5: Security Concepts for Networks
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.1:
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Electronic mail security. MHS (Message Handling System)
Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos
SSL, PGP, Kerberos Secure Socket Layer (Web Security), Pretty Good Privacy (Email Security) and Authentication Agenda SSL PGP Kerberos SSL, PGP, Kerberos, v4.4 2 Page 96-1 SSL versus IPsec Application
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many
In the world of secure email, there are many options from which to choose from to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many cryptographical concepts to achieve a supposedly
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Taxonomy of E-Mail Security Protocol
Taxonomy of E-Mail Security Protocol Ankur Dumka, Ravi Tomar, J.C.Patni, Abhineet Anand Assistant Professor, Centre for information Technology, University of Petroleum and Energy Studies,Dehradun, India
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
GPG - GNU Privacy Guard
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
E-Mail Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)
Dept. of Information & Communication Systems E-Mail Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail) Konstantinos Raptis Supervisor: Sokratis Katsikas Samos, September 99 Table of Contents:
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
PROCEDURE FOR UPDATING LISTS THROUGH WEB INTERFACE
PROCEDURE FOR UPDATING LISTS THROUGH WEB INTERFACE Prerequisites In order to be able to follow the steps of the present procedure: the Operator (hereafter OP) must have presented the application to the
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Encrypting and signing e-mail
Encrypting and signing e-mail V1.0 Developed by Gunnar Kreitz at CSC, KTH. V2.0 Developed by Pehr Söderman at ICT, KTH ([email protected]) V3.0 Includes experiences from the 2009 course V3.1 Adaptation for
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
GlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
