Secure in times of rising mobile communication
|
|
|
- Marion Craig
- 10 years ago
- Views:
Transcription
1 White paper Secure in times of rising mobile communication Applied cryptography: Certificates, Gateways and End-to-End Encryption
2 White paper Secure in times of rising mobile communication Applied cryptography: Certificates, Gateways and End-to-End Encryption Essentially, there are two driving forces that bring decision-makers to deal with the issue of encryption. First entrepreneurs have a vested interest in keeping certain information very secret. Customer, management, financial data, concepts and new developments have to be encrypted to protect them against industrial espionage and manipulation. Second, compliance conformity is required. For instance, certain jurisdictions legally define how personal data must be handled and make the company directors personally liable. Furthermore, large numbers of national, international or sector-specific regulations have to be considered, including the linking of a company s credit worthiness with its IT security capabilities. All regulations demand: encryption must meet the current industry standards. Encryption according to the current industry standards relates to the available products, industry standards and the economic viability of the solution. To understand the available solutions, let us consider general cryptology. Modern cryptology was developed in the middle of the last century, and was based completely on mathematics. It replaced the previous security concept of Security by obscurity by which security was achieved by keeping the encryption method secret a risky, proprietary method with high dependencies. Common contemporary market solutions rely on known algorithms. The only parameter needed to turn plain information into secret encrypted data is a key which itself is the secret. Algorithms such as AES (Advanced Encryption Standard) are considered very secure. The necessary effort for a brute force attack in which every possible combination is calculated and tried, rises exponentially with length of the key. The NSA does not have the resources to break AES on a large scale. Besides enormous amounts of mere computer processing time, such an attack would need more energy than is used in the US in a complete year. Specialists have calculated that the size of the secret NSA power plants is not sufficient even to produce the amount of energy required. 1 Key Symmetry There are essentially two types of encryption: symmetric and asymmetric (see Fig. 1). Symmetrical encryption requires... just one key for de- & encryption fast secure algorithms Asymmetric encryption requires two keys: the public key (certificate) for encryption and the private key for decryption secure algorithms private keys guarantee security Fig 1: Symmetrical and asymmetrical encryption 1 / 9
3 In symmetric encryption, for example a defined in the AES standard, the same key is used for both encryption as well as decryption. Security of the encrypted data is inevitably linked to the secrecy of the key. A problem arises when communicating directly with another party: the key has to be initially shared between the parties, but subsequently kept secure. In asymmetric encryption, two keys are used: a public key is used for encryption while a private key is used for decryption. Both keys are mathematically intertwined. However the private key cannot be derived from the public one. RSA encryption, named after its creators Ron Rivest, Adi Shamir and Leonard Adleman is a widely used standard for asymmetric encryption. Private and public keys with identities The initial problem of distributing keys and keeping them safe is solved with the separation of the key into public and private parts. Only the private key remains secret. The public key which is used for encryption is not secret: it can be found and used by anyone, similar to a telephone number. Only that under this number, only the owner of the private key can be reached. Asymmetric key pairs are assigned to identities. This is the core principle of the Public Key Infrastructure (PKI) model the basis of public key cryptology which enables secure communication within an insecure network. Public keys are issued as certificates to known identities and disseminated. By checking the authenticity and validity of the certificates, identities can be established beyond doubt at any given time. PKIs are used for secure communication by encrypting messages with certificates. Only the owner of the private key for a particular certificate can decrypt the message. Moreover, the PKI model allows the creation of digital signatures which are also used for secure communication. Public keys are turned into PKI certificates For PKI based encryption, two standards have become established: and OpenPGP. Both use basically the same cryptographic method. However, they differ in the certification of the public key and thus confidence in the models (see Fig. 2). stands for Secure/Multipurpose Internet Mail Extension and defines a standard using X.509 certificates. The certification of public keys is offered as a paid service by public certificate authorities (CAs). The trust model is hierarchical. Identities are verified through a certificates chain from the user certificate, to subcas and eventually to the root CA-certificate of the issuing authority. PKI trust model Certification by Certificate Authority or personal exchange of keys. Fig 2: and OpenPGP use different trust models. 2 / 9
4 Hybrid Encryption 1. Message symmetrically encrypted with session key 2. Session key encrypted with recipient s certificate 3. Transmission of the encrypted message and the encrypted session key 4. Session key decrypted with the recipients private key and the message opened Fig. 3: Core functions of hybrid encryption. 2. During the enrollment process, the key pairs are generated. The private key remains with the owner while the public key is signed with this private key and then sent to the CA for certification. The CA adds its own signature to the key and sends back a signed public key. From this moment onwards, the public key is a certificate. X.509 certificates have a limited lifetime and are divided into different classes. These classes however are not standardized. A class 1 certificate usually certifies that a public key and address belong together. Higher classes can require notarial authentication. is implemented as communication standard in most common clients which also use the CA and subca certificates of the common certificate authorities to validate user certificates. OpenPGP (Pretty Good Privacy) is based upon the principle that participants reciprocally sign and thereby validate their keys. This generates a non-hierarchical Web of Trust. Key pairs are generated autonomously and public keys certified by other users for example at signing parties. OpenPGP is not installed in common clients, which means that users have to install a client program such as Enigmail for Thunderbird. The use of both PGP and in webmail clients is not satisfactorily solved yet. With regard to security aspects, Open- PGP is safer than since some certificate authorities have already been compromised and forced to issue forged certificates by government agencies. The encryption of a message In the light of a PKI s complexity, the process of encryption itself seems almost trivial, as the following example demonstrates (see Fig. 3). Alice wants to send an encrypted message to Bob. The encryption software first generates a symmetric session key. This is used to encrypt the message. The session key will then be encrypted with Bob s certificate and attached to the message. The encrypted message now contains the information about which certificate was used to encrypt the message, so that Bob s software may now use the private key related to the certificate to decrypt the message. Bob receives the message. With his private key, he can now first decrypt the symmetrical session key generated by Alice s encryption program. The session key can then be used to decrypt the original message. 3 / 9
5 This mixture of symmetric and asymmetric techniques, called hybrid encryption is common practice and is mainly used for performance reasons. Asymmetric encryption of the original file would rapidly become inefficient due to the large amounts of computing effort it requires. Asymmetric encryption of a session key on the other hand is fast and is sufficient to guarantee the message security. Even when an is sent to multiple recipients, the original information is encrypted only once with the session key, which in turn is then encrypted with each recipient s certificate. Security in certificate and key management Confidential communication between Alice and Bob as described above is merely an over simplified example. As a prerequisite to any encryption, the following questions have to be answered: Where does Alice gets Bob s certificate? Is this certificate real? Is it valid? It is indispensable that Alice can find Bob s certificate. The verification of the certificate protects against so-called man in the middle attacks. In such an exploit, somebody with a forged certificate pretends to be Bob. He intercepts the message and then forwards it to Bob using Bob s real certificate. This could go on for weeks or months without neither Bob nor Alice being aware of it. Without a validation step, even a revoked certificate can be used by an attacker. The complexity of a PKI and the volume of information required for authenticating and validating certificates makes a manual management of keys and certificates almost impossible. As a result, certificate servers have been developed for this purpose, automating key and certificate management, including their verification and validation (see Fig. 4). Certificate servers are connected via diverse interfaces to certificate authorities and the CAs of large corporation. They check validity using Certificate Revocation Lists (CRLs) and conduct real time verification checks using Online Certificate Service Protocols (OCSPs). This mechanism retrieves data, checks integrity using check-sum comparison and keeps the local certificate repository constantly upto-date. Z1 Global TrustPoint 2 is a freely available public certificate server which provides this functionality including certificate publication. Besides their use in encryption, the certificate servers can also be used by other PKI based applications. Instead of a natural person, a certificate owner can be a system for example identified by its host name or IP address. Certificate Server Automated usage with APIs and standard protocols, or manually via a web interface Fig 4: Certificate servers automate the management of keys and certificates. 4 / 9
6 White paper Secure in times of rising mobile communication PKI OpenPGP TrustCenter & Directories Passwort Z1 KickMail PDF Z1 KickMail HTML Z1 WebSafe Secur Gateway on Organizati Secure Channel TLS, D , VPN Hardware or Virtual Appliance INTERNET Gateway-to-Gateway Fig. 5: encryption with Z1 Secur Gateway Secure gateways server-based encryption In encryption, so-called secure gateways are widespread (see Fig. 5). These secure server-based systems handle the complete traffic according to policies for users centrally and transparently. Compliance conformity and high user acceptance without the need for client-side software make the use of gateways efficient and profitable. Secure gateways interact with certificate servers to implement PKI based encryption. For communication partners without PKI, alternative secure delivery methods in which a password replaces the private key have been developed for secure gateways. The security of password-based encryption is equal to PKI based encryption and represents a widely accepted and proven method of secure ad hoc encryption when PKI certificates are not available. In this case, the password is not saved as plain text in the system, but instead as an encrypted hash value. The only security challenge is the initial transmission of the password. To solve this problem different and practicable methods have been developed, including sending the password by SMS. A secure gateway can therefore not only provide and OpenPGP encryption, but also deliver password-encrypted PDF, HTML or ZIP files. Another popular alternative is the ad hoc creation of secure webmail accounts. D connectors, VPN and TLS support are also offered by some gateways. Mobile communication demands end-to-end encryption With a secure gateway, one could relax and simply trust the state of the art security mechanisms. However, the gateways were originally conceived to provide encryption with external communication partners. Until a couple of years ago, it did not seem necessary to secure messages within a company s own internal network. The attacker came from outside and firewalls provided protection. Besides the relatively new insights about government spying programs such as PRISM or Tempora, the rising use of mobile devices for communication raises new challenges. s distributed via smart phone or notebook are sent in plain text within the internal communication network which in turn relies more and more on mobile communication channels or public WLAN infrastructures. 5/9
7 One possible solution to this problem can be found in end-to-end encryption. This approach is interpreted differently by each manufacturer and in its purest form carries a number of business risks. We will present the most general form of end-to-end encryption along with two different interpretations. Real End-to-end encryption In real end-to-end encryption, a message is encrypted immediately in the client and can only be decrypted by the recipients program (see Fig. 6). The message remains encrypted even in the client s inbox. It is impossible for any system to view the message content during its transmission through the network. This means though that centralized content filters including virus/ spam checkers, data loss prevention and archiving systems cannot be used, which increases the risks for the business. This solution however, is not practical for spontaneous secure communication even when a certificate server is used. The sender and recipient both need to use exactly the same standard: or OpenPGP. End-to-end encryption with X.509 certificates When end-to-end encryption is required, but no certificate for the recipient can be found, the system itself can perform the certificate authority (CA) role. In order to enforce ad hoc end-to-end encryption, Alice s dedicated certificate server issues Bob a key pair generated on the fly. Alice s system generates not only an X.509 certificate, but also a private key for Bob and sends both of them to him. Bob s private key however, needs to be protected somehow during transmission. By using the key pair generated in real time, Alice can now send an encrypted message to Bob. So far, so good. The usage of the X.509 certificate will remain restricted to Alice and Bob, because it can neither be officially trusted, nor verified by certificate servers and other clients. PKI security standards are not met, since Alice has access to Bob s private key. Moreover, such a certificate s rank of trust is very low less than 1 since Bob s address could not be confirmed. End-to-end encryption without re-encryption Internal and external encryption without access for Content Filters, DLP etc. Content Filter, DLP, Archive Secure only with Mailserver Internal infrastructure Internet Fig. 6: Real End-to-end encryption 6 / 9
8 Secure Gateway State of the Art encryption incl. End-to-end components internally, flexible de-/encryption externally Secure when communicating with all users and systems. Content Filter, DLP, Archive, OpenPGP Mailserver Gateway CryptoPDF, Webmailer, D , VPN, TLS,... Internal infrastructure Internet Fig. 7: End-to-end encryption with flexible re-encryption on the gateway. In the meantime, a Public Key Infrastructure has been forced upon Bob. If he can use the certificate or not, depends on the administration rights in his client. The solution is restricted to, and even Bob s publicly available Open- PGP key is not any help. If Bob has contact with lots of companies he will quickly have a large collection of certificates. An explanation of the limited use of the pseudo-certificates is therefore essential. The solution remains a compromise if there is not any access to the mail server. End-to-end encryption with flexible re-encryption Modern secure gateways with extensions enable a connection between internal and external encryption, so that messages are encrypted not only when they are sent over the Internet but also when transmitted within the company network (see Fig 7). To achieve this, an encapsulated internal PKI is set up, implementing encryption directly on the client. The dedicated X.509 certificates issued exclusively for this purpose will never be published outside the company, so that the problem of trust on external certificate servers and clients will never arise. Outgoing s are encrypted on the client with the certificate of the gateway clients support, while for mobile devices several easily installed Apps are available. The secure gateway decrypts the message and queries the recipient s certificate. Depending on the availability of external communication partner s certificates, a re-encryption into, OpenPGP, CryptoPDF, D , TLS, etc. is performed. In the other direction, every encrypted incoming message will reach the internal end user as encrypted . During re-encryption, virus and spam checking as well as DLP and archiving can be performed. Some secure gateways can be combined with real end-to-end encryption which may be required for a limited number of recipients. 7 / 9
9 Criteria for a solid trust base Strict laws on privacy protection, government agencies who do not practice industrial espionage and governments who do not influence internet and IT service providers such ideal conditions are not available all over the world. In Germany however, IT security can be developed without having to include secret back doors. In proprietary IT security solutions, not only the trust in the suppliers plays a decisive role, but also the trust in the suppliers country. Furthermore, it has to be remembered that the sender and receiver must use the same solution and are then limited to the devices on which the software is installed. Made in Germany: The future of Secure Gateways is safe The Gateway concept is future-proofed with the combination of internal and external encryption techniques. Some manufacturers provide extra extensions that integrate the secure transfer of large files alongside message encryption features. When considering an investment in an encryption solution, it is important to consider not only the suppliers geographical location but also whether the primary motivation is security or compliance. In addition it is important to consider the size and diversity of the potential communication partners. List of references: (1) (2) This white paper is also published in: IT-Sicherheit 2/2014, Datakontext, Verlagsgruppe Hüthig Jehle Rehm, p / 9
10 Fig. 8: Zertificon s headquarters in Focus Teleport Berlin Zertificon is a leading software manufacturer for IT security located in Berlin, Germany. An independent, founder-led company, Zertificon currently has more than 50 employees in its in-house development, sales and support departments. The award winning Z1 Secur Gateway has established Zertificon as a pioneer in the market for server-based encryption for more than ten years. Through ground-breaking developments, Zertificon remains one of today s driving forces in encryption solutions. The focus is on delivering user friendly and economical turn-key solutions for secure and data exchange. The popular Z1 Secur Gateway and Z1 CertServer for encryption, digital signing and certificate management are complemented by Zertificon s Z1 SecureHub for secure web-based exchange of data files in any size and format. The latest innovation from Zertificon Z1 Secur End2End provides state of the art end-to-end encryption for organizations when combined with Z1 Secur Gateway. The organizational end-to-end mode allows immediate end-to-end encryption all that is required is a recipient address. Clients are able to connect seamlessly using the Z1 MyCrypt add-in for MS-Outlook and Lotus Notes or mobile app for ios & Android. Z1 MyCrypt Mail supports end-to-end encryption alongside security features for server-based encryption whilst Z1 MyCrypt BigAttach integrates the web-based Z1 SecureHub into mail clients. Z1 MyCrypt integrate closely with all Z1 Server products. These new developments reliably meet the unique security demands of increased mobile communication via smart phones, tablets etc. in corporate environments. For a simple, efficient and smooth operation of Z1 products, Zertificon offers its Z1 Appliances as hardware or virtualized optimized platforms for a full integration into existing IT infrastructures. Additionally, Zertificon s renowned support service offers rapid and personalized help for all product-related questions. Accordingly, Zertificon enables companies and institutions of all branches and sizes to easily fulfill the highest security and compliance demands. Alt-Moabit 91d Berlin Germany Tel.: +49 (0) [email protected] 9 / 9
End-to-End Email Encryption for Everybody?
White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions White paper End-to-End Email Encryption for Everybody? Why private individuals and
Mobile Device End-to-End-Email Encryption for Organizations. San Francisco, April 20th, 2015 GABA / TeleTrusT: Security Solutions Showcase
Mobile Device End-to-End-Email Encryption for Organizations San Francisco, April 20th, 2015 GABA / TeleTrusT: Security Solutions Showcase Secure proven server-based Email Encryption Internet PKI S/MIME
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Security-Product by IT SOLUTIONS. Email security at the highest level JULIA. E-Mail Security. Cloud Security
Security-Product by IT SOLUTIONS Email security at the highest level Cloud Security JULIA MailOffice E-Mail Security wedn Sign Sig To Global protection for your emails Convenience Statistics module: graphic
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
A Guide to Secure Email
White Paper A Guide to Secure Email ABOUT THIS WHITE PAPER AND TARGET AUDIENCE This document is a whitepaper discussing the concept of secure email and the way in which M86 Security enables secure email
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
How To Secure Mail Delivery
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
White paper. Why Encrypt? Securing email without compromising communications
White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Voltage's Encrypted Email
Voltage's Encrypted Email October 2004. Report #471 Ferris Research Product Brief Sponsored by Ferris Research, Inc. 408 Columbus Ave., Suite 1 San Francisco, Calif. 94133, USA Phone: +1 (415) 986-1414
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
An Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
(51) Int Cl.: H04L 12/58 (2006.01) H04L 29/06 (2006.01)
(19) TEPZZ_986 8 B_T (11) EP 1 986 382 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 19.02.14 Bulletin 14/08 (1) Int Cl.: H04L 12/8 (06.01) H04L
Secured Mail through PGP Mail Gateway
Secured Mail through PGP Mail Gateway L. S. Haturusinha, Y. Y. Landersz, A. U. H. Gamage, P. N. Pathiranage, G. T. D. Rodrigo, and M. P. A. W. Gamage Abstract PGP Mail Gateway is a backend server which
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Ciphermail S/MIME Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail S/MIME Setup Guide September 23, 2014, Rev: 6882 Copyright 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 S/MIME 3 2.1 PKI...................................
Exam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.
The way the world does business is changing, and corporate security must change accordingly. For instance, e-mail now carries not only memos and notes, but also contracts and sensitive financial information.
Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001
Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001 D. Richard Kuhn Vincent C. Hu W. Timothy Polk Shu-Jen Chang National Institute of Standards and Technology, 2001.
Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
April 2005. PGP White Paper. PGP Universal 2.0 Technical Overview
April 2005 PGP White Paper PGP Universal 2.0 Technical Overview 1 Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 3 THE PGP ECOSYSTEM... 4 WHAT IS THE PGP ECOSYSTEM?... 4 PGP Global Directory...
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
How To Secure Your Email From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term
CYBER-ATLAS TOOLKIT TOOLKIT: REFERENCES FREE EMAIL ENCRYPTION SOFTWARE BEFORE YOU START Limited functionality, limited capacity, limited usage, limited platforms or restrictions disallowing commercial
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
W H I T E PA P E R. Providing Encryption at the Internal Desktop
W H I T E PA P E R Secure Email Inside the Corporate Network: Providing Encryption at the Internal Desktop Table of Contents Introduction 2 Encryption at the Internal Desktop 2 Current Techniques for Desktop
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Taxonomy of E-Mail Security Protocol
Taxonomy of E-Mail Security Protocol Ankur Dumka, Ravi Tomar, J.C.Patni, Abhineet Anand Assistant Professor, Centre for information Technology, University of Petroleum and Energy Studies,Dehradun, India
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
When Data Loss Prevention Is Not Enough:
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
