Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)
|
|
|
- Candace Dawson
- 10 years ago
- Views:
Transcription
1 Dept. of Information & Communication Systems Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail) Konstantinos Raptis Supervisor: Sokratis Katsikas Samos, September 99
2 Table of Contents: Introduction 3 Security 3 Pretty Good Privacy (PGP)... 4 Privacy-Enhanced Mail (PEM).. 7 Conclusion.. 9 References
3 Introduction On the Internet, the notions of privacy and security are practically non-existent. Although is one of the most popular uses of the Internet, security experts have estimated that only about one in every 100 messages is secured against interception and alteration. Many people may think that sending an in plain text is privacy-protected and enhancement of privacy is not necessary. This is simply not the fact. Whether you realize it or not, those messages you've been sending to business partners or friends over the Internet have been sent in the clear; information you thought was enclosed in a sealed envelope was instead sent just like a postcard. When an message is sent between two distant sites, it will generally transit dozens of machines on the way. Any of these machines can read the message and/or record it for future work. Security Let s look at some of the assumptions many people have about the security and integrity of [1]. Authenticity Many people assume that the name given as the sender of an message identifies who actually sent it. In fact, this depends on the honesty of the sender and the flexibility of their mail package. For example, the Netscape Navigator mail function allows people to enter their own description of who they are, and what their address is. While this will not allow them to receive mail that is not properly addressed to them, they can still send mail. Integrity When you send a message via , there is no guarantee that it will be received, or that what is received is exactly what you sent. You have no way of knowing that your message was not read or forwarded by third parties. This is due to the passing of messages from machine to machine, between your server and that of the intended recipient. At any point along the way, the mail server could lose the message, or the staff supporting the server could read and/or alter it. This is obvious if you consider that a mail message is only a file that gets passed from person to person along a delivery chain. Any person in the chain can drop the whole file in the garbage, or copy, add, delete, or replace documents in it. The next person in the chain doesn't know it's coming, what's in it, or how big it should be. These people don't work for the same company, and quite possibly aren t even on the same continent. If you mis-spell the recipient's address, the mail server at their end may send the note back to you as undeliverable. However, it may also send it to somebody else, who happens to have the address you typed, or it may send it to the Postmaster, who administers the system. Normally the postmaster will re-send it to the appropriate -3-
4 person, but this is a manual process, which may take some time, or it may not be done at all. To add to the confusion, incoming and outgoing mail is stored in plain text files on a hard disk in your mail server. These files can be altered by authorized administrators or by anybody capable of assuming authority. While University employees do not do this on a whim, the capability exists. Reliability As a sender, you have no way of knowing when a message was delivered. It could have been delayed due to system problems at an intermediate link in the delivery chain. Also, there is no standard way of requesting a receipt when the message is read. If you request a return receipt, and the receiver s mail system does not recognize that function, it will not send you an note confirming delivery. Because of the wide-spread nature of these problems, a number of competing solutions are being developed that address the authentication and integrity issues. The general consensus is to use some form of public-key cryptography, so that messages can be decrypted only by the intended recipient, are unalterable, and can be verified as coming from the sender. Pretty Good Privacy, PGP, and Privacy-Enhanced Mail, PEM, are both systems that provide secrecy and non-repudiation of data that is sent over the Internet, mostly by (figure 1). Figure 1: PGP, PEM are external packages for message encryption, signing, etc. Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders. PGP can be used basically for 4 things: Encrypting a message or file so that only the recipient can decrypt and read it. The sender, by digitally signing with PGP, can also guarantee to the recipient, that the message or file must have come from the sender and not an impostor. -4-
5 Clear signing a plain text message guarantees that it can only have come from the sender and not an impostor. Encrypting computer files so that they can't be decrypted by anyone other than the person who encrypted them. Really deleting files (i.e. overwriting the content so that it can't be recovered and read by anyone else) rather than just removing the file name from a directory/folder. As we mentioned, PGP provides two services: encryption and digital signatures [2]. Encryption allows a user to encode a file for storage locally or for transmission as an message. The local storage option is handy if you are worried about other people having access to files on your machine. The option enables PGP to be used for private exchanges over a network. PGP encrypts the entire contents of the message in such a way that only the intended recipient can decode and read the message. Anyone else who attempts to capture or copy the message en route will receive meaningless garble. The digital signature service allows a user to 'sign' a document before transmission in such a way that anyone can verify that the signature is genuine and belongs with a particular document. If someone alters the message or substitutes a different message, the signature will no longer be valid. And any recipient can verify that the message has been signed by its true creator and not an imposter. PGP's confidentiality and encoding services use the most popular public-key encryption scheme, known as RSA. All public-key encryption systems make use of an encoding and decoding algorithm and a related pair of keys. The input to the encryption algorithm is the text to be encrypted--known as plaintext--and a key. The algorithm takes the input and produces scrambled output known as ciphertext. To use the decryption algorithm, you input the ciphertext plus the key that matches the one used for encryption, and the original plaintext is produced as output. The two keys used in any public-key encryption scheme, including RSA, are called the public key and private key. The public key, as the name suggests, is made public. The idea is to make your public key available to people with whom you correspond. You keep your private key secure, and it should be known only to you. These two keys can be used to provide confidentiality and encryption. For confidentiality, PGP encrypts messages with an efficient single-key or conventional encryption algorithm known as IDEA. It then uses RSA to encrypt, with the receiver's public key, the IDEA key used to encrypt the message. The receiver can use RSA to recover the IDEA key and use that key to recover the message. For digital signatures, PGP uses an efficient algorithm known as MD5 to produce a summary code, or hash code, of the message that is, for all practical purposes, unique to that message. PGP then uses RSA to encrypt the hash code with the sender's private key. The receiver can use RSA to recover the hash code and verify that it is the correct hash code for the message. If it is correct, then only the alleged sender could have prepared the encrypted hash code. -5-
6 But how safe is PGP? Will it really protect my privacy? As we know, nothing can be 100% secure. For PGP we have to consider three main points. First, top-rate civilian cryptographers and computer experts have tried unsuccessfully to break PGP. Second, whoever proves that he or she can unravel PGP will earn quick fame in crypto circles. He or she will be applauded at banquets and attract grant money. Third, PGP's most knowledgeable users around the world will broadcast this news at once. People often claim that PGP is illegal. There are three separate reasons why they might claim so. It is probable that PGP falls under the ITAR (International Traffic in Arms Regulations) restrictions, which control the export of munitions and cryptographic technology from the US and CANADA. If this is the case, it is illegal to export PGP from the USA or Canada to any other country. Of course, if you don t get PGP from the US or Canada, the issue is moot. In some countries, the use of cryptography is restricted by law or, it is outright illegal to encrypt data at all. In other countries, they re working on it. In a few words, we can summarize the legal status of PGP as follows: If you live in the USA or Canada, you should buy ViaCrypt PGP, or use MIT PGP 2.6. Otherwise you will be infringeing the patents held by PKP, which you merely paid for. If you live outside the USA or Canada, you can use PGP without having to worry about infringing the RSA patent (though the IDEA patent still stands if you wish to use PGP commercially). If you use International PGP (version 2.6.2i), you should have no problems talking to other versions i is endorsed by Phil Zimmermann for use outside the USA, and is faster and more compatible than any other freeware version of PGP. It may be illegal to send encrypted messages in some countries or on some networks. You should not export PGP from the USA or Canada to any other country. An example of a PGP key is the follow: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.i mqbnai6w7bsaaaecancxkb8rjcusvhllb+dkrjndj83kticy/uozv9tdmrsyv1pl TM9PSmEqvDi4ghiaW1vnFL6djYAEM/BVPBdeATkABRG0OEhhcmFsZCBUdmVpdCBB bhzlc3ryyw5kidxiyxjhbgquvc5bbhzlc3ryyw5kqhvuaw5ldhqubm8+iqcvaguq Ly+cZH98CXqjtAstAQFmSwQAgxtz/Fp3Nmm6jRgariX5HrZ+oDMpfaRbtLhf8eF5 amofryo3zghi2kfgnigcfiyxzfhi4kzv4vnfnoav5kytkzzvz7isuidacvfkh6oa mwuvewaw2azklmbbbkeytyj3ekxnbchl7xkrciyuwj0dz3esl+cunkdh6/6bgqhz qqcjahucbrawqrjy89bnwtbxqkkbasqqawdk+qy5i5k2zsgbdq6bx0kklaeqeb5s D2FbIyFoWvIqO89JWpgaoST72nVhUoRbpFk63shKksvkpUHlP46UHNwrRUCYV84l BdPUDuNArG8Cg1LOIjmdXH4fYrklv2s/fuaJAJUDBRAwQgCIvhnf3d8RivEBAclJ A/4gd8z8tWhdYgFkr0Cxb4mtvX5S+XWtCiIkd/OZz1WXiX4xMJaAtGMeN7PQuWG6 FsoayC3VG4jvUgJwLg3+tyqHqnp9xU3trVht82CTAuYzp5hf6V3Yu1GXAHccwdPI 2A5OZCYHW5p+nMPZSifVJdNYJ3Hbvwr+9qgx+QP+ezXYzokAVQIFEC6xCi4z8FU8 F14BOQEBwjMCALCsMQHZCITEh9uxTcDsKwatobgEFIpjw/YGeYfzmA40a7iY7Jd2 NG4aylyaUX7mQqoNHGjIiDOs3JtCDnw/JKK0CGh0YUBkYWxl =3Qxp -----END PGP PUBLIC KEY BLOCK
7 Privacy-Enhanced Mail (PEM) Privacy-Enhanced Mail (PEM) is an Internet standard that provides for secure exchange of electronic mail. PEM employs a range of cryptographic techniques to allow for confidentiality, sender authentication, and message integrity. The message integrity aspects allow the user to ensure that a message hasn't been modified during transport from the sender. The sender authentication allows a user to verify that the PEM message that they have received is truly from the person who claims to have sent it. The confidentiality feature allows a message to be kept secret from people to whom the message was not addressed. PEM does not require the use of a specific algorithm. On the contrary, it allows use of several algorithms for data encryption, key management, and data integrity. The details of PEM are described in four Internet RFCs as the following: RFC 1421 [3] describes message encryption and authentication procedure; RFC 1422 [4] addresses certificate-based key management including the key management architecture and infrastructure using public-key certificates; RFC 1423 [5] describes the encryption and message integrity algorithms, including key management; RFC 1424 [6] describes three types of services to support PEM, including key certification, certificate-revocation list (CRL) storage, and CRL retrieval. PEM provides a range of security features. They include originator authentication, (optional) message confidentiality, and data integrity. Each of these will be discussed in turn. Originator Authentication In RFC 1422 [4] an authentication scheme for PEM is defined. It uses a hierarchical authentication framework compatible X.509, ``The Directory --- Authentication Framework.'' Central to the PEM authentication framework are certificates, which contain items such as the digital signature algorithm used to sign the certificate, the subject's Distinguished Name, the certificate issuer's Distinguished name, a validity period, indicating the starting and ending dates the certificate should be considered valid, the subject's public key along with the accompanying algorithm. This hierarchical authentication framework has four entities. The first entity is a central authority called the Internet Policy Registration Authority (IPRA), acting as the root of the hierarchy and forming the foundation of all certificate validation in the hierarchy. It is responsible for certifying and reviewing the policies of the entities in the next lower level. These entities are called Policy Certification Authorities (PCAs), which are responsible for certifying the next lower level of authorities. The next lower level consists of Certification Authorities (CAs), responsible for certifying both subordinate CAs and also individual users. Individual users are on the lowest level of the hierarchy. This hierarchical approach to certification allows one to be reasonably sure that certificates coming users, assuming one trusts the policies of the intervening CAs and PCAs and the policy of the IPRA itself, actually came from the person whose name is associated with it. This hierarchy also makes it more difficult to spoof a certificate because it is likely that few people will trust or use certificates that have untraceable -7-
8 certification trails, and in order to generate a false certificate one would need to subvert at least a CA, and possibly the certifying PCA and the IPRA itself. Message Confidentiality Message confidentiality in PEM is implemented by using standardized cryptographic algorithms. RFC 1423 [5] defines both symmetric and asymmetric encryption algorithms to be used in PEM key management and message encryption. Currently, the only standardized algorithm for message encryption is the Data Encryption Standard (DES) in Cipher Block Chaining (CBC) mode. Currently, DES in both Electronic Code Book (ECB) mode and Encrypt-Decrypt-Encrypt (EDE) mode, using a pair of 64-bit keys, are standardized for symmetric key management. For asymmetric key management, the RSA algorithm is used. Data Integrity In order to provide data integrity, PEM implements a concept known as a message digest. The message digests that PEM uses are known as RSA-MD2 and RSA-MD5 for both symmetric and asymmetric key management modes. Essentially both algorithms take arbitrary-length ``messages,'' which could be any message or file, and produce a 16-octet value. This value is then encrypted with whichever key management technique is currently in use. When the message is received, the recipient can also run the message digest on the message, and if it hasn't been modified in-transit, the recipient can be reasonably assured that the message hasn't been tampered with maliciously. The reason message digests are used is because they're relatively fast to compute, and finding two different meaningful messages that produce the same value is nearly impossible. There are at least two different implementations of PEM available. The first one is Riordan's Internet Privacy Enhanced Mail (RIPEM), written by Mark Riordan [7]. The other implementation of PEM was originally called TIS/PEM [8] (version 7.0), written by Trusted Information Systems, Inc. However, TIS/PEM has since been succeeded by TIS/MOSS (version 7.1), a program which implements PEM with MIME extensions added to it. Like PGP, PEM uses RSA encryption. As we mentioned, the US government has strict export controls over foreign use of this technology, so people outside the US may have a difficult time finding programs which perform the encryption. An example of a PEM key is the follow: -----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 4,MIC-CLEAR Content-Domain: RFC822 Originator-Certificate: MIIBhDCB7gIBBjANBgkqhkiG9w0BAQIFADAfMQswCQYDVQQGEwJOTzEQMA4GA1UE ChMHdW5pbmV0dDAeFw05NjAxMDUxMjU4MjNaFw05ODAxMDExMjAwMDBaMD4xCzAJ BgNVBAYTAk5PMRAwDgYDVQQKEwdVTklORVRUMR0wGwYDVQQDExRIYXJhbGQgVC4g QWx2ZXN0cmFuZDBZMAoGBFUIAQECAgIAA0sAMEgCQQCXWrAQT6InQcc8IU7pEBUl 4dgG/2QTsyUb3GCFJnlTupt0iHrICuQt4YpZp8KfFCiwZxH87+z5n4lHPQ1ogskP AgMBAAEwDQYJKoZIhvcNAQECBQADgYEAgo15g/lGULfuS0/55LOEXNuKZK2fs/yH V87D+YwtIPSzaN8nLLJd9iROf7+mVMb+Z/KqcuheYBxWCN4Azi9x4PCVUPpFcRFQ wsnlpzt+ymnl2z3l5avdog/4viutr1cwfiwled8s/cmbnxw+0yzm4udch0pbsnsm PS+vZ+XnihM= Issuer-Certificate: -8-
9 MIIBuDCCASECAQMwDQYJKoZIhvcNAQECBQAwLTELMAkGA1UEBhMCTk8xEDAOBgNV BAoTB3VuaW5ldHQxDDAKBgNVBAsTA3BjYTAeFw05NTA5MjIwNzUzMTBaFw05ODAx MDExMjAwMDBaMB8xCzAJBgNVBAYTAk5PMRAwDgYDVQQKEwd1bmluZXR0MIGcMAoG BFUIAQECAgQAA4GNADCBiQKBgQCMqO/918sEBBzAJ/v2b1hHPW54/Km5A2+aox3W SUQnUb21XDIvWoJUi9t8wRjPhfCMFcP0uiQkELKXTI4qzgZ3UKWhxX/SIPyvNG9G VkSsB+aMprE80ex2LlZiu5kZ6TGV+ndDY/ZukXikLXAbht5xd0Exgo1feE5dcqSd 5DID7QIDAQABMA0GCSqGSIb3DQEBAgUAA4GBAHnkm+Yi8qVDB+0qUzH8F43fJtyq KQd25QcAdy/Zn6t12OYUT0zO3spQ8XJW2+O2oBpvQJGGgOOZPnCFGz+7uJTC5eW/ VZTB7W1vz5iBiswntrts2EYaj95Mihm+ZA399Jh+jyf+nreitOwSpQiLBUxBjv7l 9f0ObCmU/kXVwdJK Issuer-Certificate: MIIB6TCCAVICBQJzAAAJMA0GCSqGSIb3DQEBAgUAMEkxGTAXBgNVBAoTEEludGVy bmv0ifnvy2lldhkxldaqbgnvbasti0ludgvybmv0ifbdqsbszwdpc3ryyxrpb24g QXV0aG9yaXR5MB4XDTk1MDkyMTAwMDAwMFoXDTk2MDkyMTAwMDAwMFowLTELMAkG A1UEBhMCTk8xEDAOBgNVBAoTB3VuaW5ldHQxDDAKBgNVBAsTA3BjYTCBnzANBgkq hkig9w0baqefaaobjqawgykcgyea1r8wnskjrjkc9duzx8f8vhs8kv2podvhmlyo HNUP+2DroTYCzvEd+49CYiTLjrhJuYaFdjZ7SVgMiZM+Y3rb6JawgFKZG/k6/b/N ac4obvqq1undecli00nuxom+iny5kgntcgj4uh9q6idylxtctmcf2dwi7tpajma/ wfiy5necaweaatanbgkqhkig9w0baqifaaobgqbejo61ijvksp+0skonhfnoxjlz hvaranwjls+ptp6xyynjdd9ngzlpkjn+udrn5ndqdyy4jjujlx9+9ueqryh1vtoo +iecsla77s39xvdyngdcbg1msk4jo1mars6w6autt9/af1tzz41f0vfkmcazroii Jd/Aujkxpy8Wi5+eEQ== MIC-Info: RSA-MD5,RSA, dtykoo/fjz/gnlxpwhijaw4jntyoayh4t5bqiv1chy4+ftara50kod2prrwtowyk GlXWTEaiRcUWVll9x7oJXw== Dette er signert med PEM -----END PRIVACY-ENHANCED MESSAGE----- Conclusion As we mentioned, Pretty Good Privacy, PGP, and Privacy-Enhanced Mail, PEM, are both systems that provide secrecy and non-repudiation of data that is sent over the Internet, mostly by . PGP and PEM allow two parties to communicate in a way which does not allow third parties to read them, and which certify that the person who sent the message is really who they claim they are. The table below presents the basic similarities and differences of PGP and PEM. Item PGP PEM Supports encryption? Yes Yes Supports authentication? Yes Yes Supports non-repudiation? Yes Yes Supports compression? Yes No Supports canonicalization? No Yes Supports mailing lists? No Yes Uses base64 coding? Yes Yes Secret-key algorithm IDEA DES, TDES Secret-key length (bits) Public-key algorithm RSA RSA Public-key length (bits) 384/512/1024 Variable User name space User defined X
10 X.509 conformant No Yes Do you have to trust anyone? No Yes (IRPA) Key revocation Haphazard Better Can eavesdroppers read messages? No No Can eavesdroppers read signatures? No Yes Internet standard? No Yes Exportable from US? No Depends Can get full source? Depends Yes Cost? Free/Low cost Free PGP is a popular program used to encrypt and decrypt over the Internet. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and is also used by many corporations. PEM, in contrast to PGP, does not used widely. There are hooks for using both PEM, specifically RIPEM although TIS/PEM should work as well, and PGP in the NCSA httpd program for providing secure web communications with NCSA Mosaic. There are also extensions to the Emacs editor which allow one to use either PGP or a PEM implementation in conjunction with mail or any other Emacs buffer. There is also a product put out by SecureWare ( called Secur that implements PEM. References 1. John McCarthy, Security, Computing News, York University, Dept. of Computing and Communication Services (CCS), November 1996 ( 2. William Stallings, Getting Cryptic, PGP for You and Me, Internet World, Vol. 6, No 2, February J. Linn, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, RFC 1421, DEC, February 1993 ( 4. S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, RFC 1422, BBN, February 1993 ( 5. D. Balenson, Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes and Identifiers, RFC 1423, TIS, February 1993 ( 6. B. Balaski, Privacy Enhancement for Internet Electronic Mail: Part IV: Notary, Co-Issuer, CRL-Storing and CRL-Retrieving Services, RFC 1424, RSA Laboratories, February 1993 ( -10-
11 7. Mark Riordan, Riordan's Internet Privacy Enhanced Mail (RIPEM), 1993 ( 8. Trusted Information Systems Inc., Trusted Information Systems/ Privacy Enhanced Mail (TIS/PEM), 1993 ( -11-
4.1: Securing Applications Remote Login: Secure Shell (SSH) E-Mail: PEM/PGP. Chapter 5: Security Concepts for Networks
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.1:
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
Email Security. Issues:
Email Security Email Security Issues: Not real time, can afford to use public key cryptosystems more. Certification of keys is much harder because anyone can send anyone else some mail Strictly end to
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
cipher: the algorithm or function used for encryption and decryption
! "# $ %& %'()! *,+ & -.! % %- / 0-1 2+ 34 576!! 8 9! ": ;
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Taxonomy of E-Mail Security Protocol
Taxonomy of E-Mail Security Protocol Ankur Dumka, Ravi Tomar, J.C.Patni, Abhineet Anand Assistant Professor, Centre for information Technology, University of Petroleum and Energy Studies,Dehradun, India
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
A Novel Approach For Intranet Mailing For Providing. User Authentication
, (IJCSIS) International Journal of Computer Science and Information Security, A Novel Approach For Intranet Mailing For Providing User Authentication ASN Chakravarthy A.S.S.D.Toyaza Associate Professor,Dept.of
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004
BRIEF INTRODUCTION TO CRYPTOGRAPHY By PAGVAC February 8, 2004 What will I learn from this file? What cryptography is How encryption and decryption works Cryptography terms Symmetric cryptography Asymmetric
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014
Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Detailed Concept of Network Security
Detailed Concept of Network Security Er. Anup Lal Yadav M-Tech Student Er. Sahil Verma Asst. Prof. in C.S.E. Deptt. EMGOI, Badhauli. [email protected] Er. Kavita Asst. Prof. in C.S.E. Deptt. EMGOI,
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
GlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Public Key Encryption and Digital Signature: How do they work?
White Paper Public Key Encryption and Digital Signature: How do they work? Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved. Reproduction of
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
