HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)



Similar documents
HW/Lab 3: SSL/TLS. CS 336/536: Computer Network Security DUE 11am on Nov 16 (Monday)

GPG installation and configuration

HW/Lab 2: Network Mapping and Attacks. CS 336/536: Computer Network Security DUE at 10/19/2015 (11am)

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

GPG - GNU Privacy Guard

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

Encrypting and signing

Encrypting your Communications using PGP

Signing and Encryption with GnuPG

Overview Keys. Overview

How to use PGP Encryption with iscribe

File and encryption with GPG4win & Enigmail

Secure Part II Due Date: Sept 27 Points: 25 Points

Pretty Good Privacy with GnuPG

Networks & Security Course. Web of Trust and Network Forensics

GPG4win / Kleopatra Documentation. Secure file and encryption by using GnuPG for Windows

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

Update Instructions

Update Instructions

Internet Programming. Security

LiteCommerce Advanced Security Module. Version 2.8

Update Instructions

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

Configuring Mozilla Thunderbird to Access Your SAS Account

Update Instructions

THUNDERBIRD WORKBOOK

PGP from: Cryptography and Network Security

Open Thunderbird. To set up an account in Thunderbird, from the Tools menu select Account Settings; choose account; then click Next.

Signing and Encryption with GnuPG

Set Up Setup with Microsoft Outlook 2007 using POP3

Receiving Secure from Citi For External Customers and Business Partners

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

Using etoken for SSL Web Authentication. SSL V3.0 Overview

ENCRYPTION ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR S FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD A BLACK PAPER

Client Configuration Secure Socket Layer. Information Technology Services 2010

Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

HGC SUPERHUB HOSTED EXCHANGE

Published : License : None

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

Please note that a username and password will be made available upon request. These are necessary to transfer files.

IRMACS Setup. Your IRMACS is available internally by the IMAP protocol. The server settings used are:

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

How to Set Up Your. Account

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

Clearswift Information Governance

Outlook Express IMAP Instructions - Bloomsburg University Students

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

NeoMail Guide. Neotel (Pty) Ltd

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

SECURE USER GUIDE OUTLOOK 2000

setup information for most domains hosted with InfoRailway.

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

4. Click Next and then fill in your Name and address. Click Next again.

Introduction to Cryptography

Key Management and Distribution

INTRODUCTION TO CRYPTOGRAPHY

Secure Outgoing Mail (SMTP) Setup Guide

Using etoken for Securing s Using Outlook and Outlook Express

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

How To Configure Using Different Clients

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

USER GUIDE WWPass Security for (Outlook) For WWPass Security Pack 2.4

Steps for: POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) setup on MAC Platforms

Client configuration and migration Guide Setting up Thunderbird 3.1

Grapevine Mail User Guide

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365

User Guide May Using Certificates in Outlook Express

Before starting to use the new system you will need to know the password to your e-wire account.

Security: Focus of Control. Authentication

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Mac OS X Secure Wireless Setup Guide

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

client configuration guide. Business

Patriots Outlook Configuration

isecur User Guide for iphone

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

This information is provided for informational purposes only.

COMP 3704 Computer Security

GPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009

Yale Software Library. PGP 9.6 for Windows

Chapter 10. Network Security

How to Setup Privacy Guard Encryption.

Configuring Outlook for IMAP. Creating a New IMAP Account. Modify an Existing Account

Configuring Thunderbird with UEA Exchange 2007:

Quick-Start Guide

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Instructions for Microsoft Outlook 2003

Using Voltage Secur

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Configuring Outlook to send mail via your Exchange mailbox using an alternative address

Configure Outlook 2007 for Brandeis Gmail

Transcription:

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to work on the assignment.. It is a combination of a hands-on lab exercise and conceptual problems. Problem 1 is a lab exercise while the rest are conceptual problems. You are strongly encouraged to utilize your lab session to accomplish the lab exercise. All soft copy submissions (with answers to the problems) must be turned in via Canvas. Name your files as Lastname_Firstname_HW1. Please make sure that you have correctly submitted/uploaded the files. You can submit hand-written hard copies, if you wish. However, we would prefer that you submit soft copies. If you choose to submit hard copies in any case, please turn them into my mailbox in the CS office or hand them in just before the lecture. Please also make sure that your hand-written solutions and handwriting is legible and easy to understand. You must submit by the deadline 11 am on 09/28/2015. This applies to both soft and hard copy submissions. Late submissions will not be graded. You will be graded based on the correctness of your answer and also on the steps that you took to come to that answer, whenever possible and applicable. Please try to show all your work, when feasible. The assignment needs to be solved individually by every student. No collaboration of any sort is allowed, unless stated otherwise. No plagiarism is allowed. Please check the course policies against misconduct (discussed in Lecture 1). When in doubt, please consult the instructor. Please submit early to avoid any last minute issues. Please do start working on the homework early and do not wait until the deadline.

A. Lab Exercise and Conceptual Problems 1. [50pts] As per the Lab Description (Section B; provided on the next page), set up a PGP email client. When done, send the TA (Abhishek Anand) a signed and encrypted email (message Hello ) at uabcsx36.f15@gmail.com using the public key hosted on the course webpage (link: pub-key). 2. [15pts] We studied the textbook RSA encryption scheme in the class. a. [5pts] Explain the Key Generation ( KeyGen ), Encryption ( Enc ) and Decryption ( Dec ) procedures of the textbook RSA encryption scheme. b. [10pts] Is textbook RSA encryption a secure encryption scheme against a known plaintext attack that we discussed? Explain why or why not. 3. [15pts] Is the following statement True or False: 4-DES, which uses four (single) DES encryption operations in series and four independent keys C = Enc(K4, Enc(K3, Enc(K2, Enc(K1, P)))) has an effective keyspace size of 2 224 under the known-plaintext attack? Argue your answer in details. 4. [10pts] The RSA cryptosystem serves two main purposes in PGP when sending a signed and encrypted message -- what are they? 5. [5pts] Name an algorithm commonly used to encrypt PGP email messages: 6. [5pts] PGP is characterized by three main steps. What are they, and in what order are they applied (if used)?

B. Lab Description Pretty Good Privacy is a mechanism using which a user can sign and encrypt email messages to ensure authentication, integrity and/or non-repudiation. There are a number of implementations of PGP, such as Symantec PGP, and the freely available the Gnu Privacy Guard, which we will explore in this Lab. At its core, PGP relies on a number of technologies including asymmetric encryption, symmetric encryption, hashing and compression in order to sign and encrypt messages. This lab assumes that you re already familiar with the basics behind PGP (crypto basics and PGP details were already covered in prior lectures - Lectures 2-4), and will show/teach you one way to setup PGP and send signed/encrypted messages. PGP Encryption/Decryption - From http://en.wikipedia.org/wiki/pretty_good_privacy PGP on Linux First, we will need to install a GPG Key management tool, on debian. You can install these with the command: sudo apt-get install gnupg gnupg2 Next, we will install IceDove, which is the rebranded Thunderbird email client for Debian, using: sudo apt-get install icedove

Finally, we need to install the enigmail plugin for IceDove, using: sudo apt-get install enigmail. GnuPG will give us a tool to manage both our own public/private PGP keypairs through IceDove, in addition to the keys of others, when we import them. IceDove is our email client, and Enigmail is the Thunderbird/IceDove plugin that implements the PGP standard and allows us to send signed and encrypted emails to others. Basic Setup: First things first, we need to generate an RSA keypair that will be used for signing and encrypting our emails. For simplicity, we will create the keys using IceDove. Launch IceDove, select the options button next to the search bar (three horizontal bars), OpenPGP, and then Key Management. From here, you should be able to select Generate, and select New Key Pair. From here, you can input basic user information and the email you want to associate with this key pair. Key generation will take up to several minutes. The tool should then generate an RSA public and private key (never share the private key!). If you want to share your public key with someone else, use the Export tool to get a text file containing your public key information (it gives you an option to export your secret key, but most of the time you won t need to do this). Add an Email Address: This can be any email address you would like, although we would recommend using your UAB account for simplicity. Server Settings: What are the ideal Mail Server settings when you need to manually setup an email client that does not support Exchange? Mail Setting type: IMAP Mail Server: mail.ad.uab.edu SSL is set. Mail Server Port: 993 Email address: BlazerID@uab.edu Password: BlazerID password. Outgoing Mail Server: Relay.ad.uab.edu Mail Server port: 587 SSL is set. Server does require you to login with your BlazerID and password.

Configuring Enigmail In order to use your RSA keys, you will need to configure your email account to allow it to use your RSA key pair. After adding an email account to Thunderbird, go to the Options Pane and navigate to Account Settings (or right click on the account name and select Settings). Now, select the OpePGP Options tab and check the Enable PGP Support check box. From here, you should be able to select your key, and check your signing/encryption preferences. Also, for optimal PGP usage, you will probably want to adjust your email preferences to send only text emails (Uncheck the Compose Messages in HTML Format box under Composition & Addressing). Signing an Emails Once Enigmail is configured, sending signed emails is simple. Compose an email like usual, and then select the OpenPGP button, and check the Sign Email option. Anyone can receive a signed email, however they won t be able to verify it without your Public Key (and ideally a plugin like Enigmail). When you send your email, you should be prompted to unlock your keyring so you can sign the message with your private key. Encrypting an Email Just like with signing a message, you just need to select the Encrypt Message box (we would recommend signing it as well). However, in order to encrypt the message, you will need the public key of your intended recipient. Again, once you hit send, it will prompt you for your keyring password (in case of signing), and then your message will be sent. Reading Signed/Encrypted Email If you receive an encrypted message from someone, when you select to read the message, Thunderbird/IceDove should prompt you for your keyring password in order to decrypt the message for viewing. The Enigmail plugin will automatically verify signatures from PGP encrypted/signed emails assuming you have the sender s public key in your keyring. As part of the lab, you may try exchanging public keys, and sending signed and encrypted emails amongst yourselves. PGP on OS X You wi ll need to install a Key Management tool for your GPG Keyring, you can install GPG Suite https://gpgtools.org/. From here, you can install Thunderbird and do the same setup as above, or integrate it into Apple Mail.

PGP on Windows You will need to install a Key Management tool for generating and maintaining keys; GPG4Win is a good tool for this: http://www.gpg4win.org/ From here, you can again install Thunderbird and Enigmail.