An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst



Similar documents
Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

GPG - GNU Privacy Guard

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

Encrypting your Communications using PGP

GlobalSign Enterprise Solutions

PGP from: Cryptography and Network Security

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

A Guide to Secure

EXAM - ST Symantec PGP Universal Server 3.2 Technical Assessment. Buy Full Product.

File and encryption with GPG4win & Enigmail

GPG installation and configuration

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Receiving Secure from Citi For External Customers and Business Partners

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Djigzo S/MIME setup guide

Zarafa S/MIME Webaccess Plugin User Manual. Client side configuration and usage.

Network Security Protocols

Internet Encryption S/Mime Standard

Personal Secure Certificate

INTRODUCTION TO CRYPTOGRAPHY

Signing and Encryption with GnuPG

SECURE USER GUIDE OUTLOOK 2000

Secure Part II Due Date: Sept 27 Points: 25 Points

Ciphermail S/MIME Setup Guide

Using etoken for Securing s Using Outlook and Outlook Express

Overview Keys. Overview

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Internet Security. Contents. ITS335: IT Security. Internet Security. Secure . Summary

A Noval Approach for S/MIME

Secure transaction guidelines for external users with Commission personnel.

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

Document Management Getting Started Guide

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Setting up secure communication with Ericsson. Guideline for Ericsson partners

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Introduction to Cryptography

Why Johnny Can't Encrypt: A Usability Study of PGP

Encrypting and signing

Key Management and Distribution

CIPHERMAIL ENCRYPTION. CipherMail white paper

Key Management and Distribution

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Secured Mail through PGP Mail Gateway

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

Cryptography and Network Security

The GlobalCerts TM Secur Gateway TM

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Strong Encryption for Public Key Management through SSL

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

Clearswift Information Governance

PGP Universal Satellite Version 2.7 for Windows Release Notes

W H I T E PA P E R. Providing Encryption at the Internal Desktop

Pretty Good Privacy with GnuPG

TABLE OF CONTENTS. Legend:

Published : License : None

USER GUIDE WWPass Security for (Outlook) For WWPass Security Pack 2.4

PKI Contacts PKI for Fraunhofer Contacts

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

How To Secure Your From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Signing and Encryption with GnuPG

4. Click Next and then fill in your Name and address. Click Next again.

Secure in times of rising mobile communication

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Securing your Online Data Transfer with SSL

PDG Software. Encryption Guide

Cryptography and Network Security Chapter 15

Open-Xchange Guard Major Release v Feature Overview V1.4

Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter


White paper. Why Encrypt? Securing without compromising communications

HP ProtectTools Embedded Security Guide

IMPORTANT: You must complete this step before you can install and activate SafeSend.

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

HMRC Secure Electronic Transfer (SET)

Electronic Mail Security

E Mail Encryption End User Guide

Network Security Essentials Chapter 7

How To Encrypt With An Certificate On An From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On

PGP(R) Desktop Version 10.0 for Mac OS X Release Notes

Using Entrust certificates with Microsoft Office and Windows

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Overview of edx Analytics

tips A quick and easy guide to securing your private information

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

GPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009

Transcription:

An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst

Topics Secure Email Basics Types of Secure Email Walkthroughs 2

Secure Email Services Confidentiality Message Integrity Sender Authentication 3

Protect sensitive data Why do I want secure email? Prove authenticity to recipients Send attachments normally filtered Avoid the junk folder! 4

How does Secure Email work? Long answer That s another talk entirely. Short answer Secure email uses a set cryptographic tools to encapsulate a message into a specially formatted envelope. 5

Encryption Think CryptoQuip Means of hiding a message through substitution or rearranging letters Requires a key to unlock the original message 6

Digital Signatures A string of characters that uniquely identifies the signer of an electronic message. Recipients are able to Verify message was from purported sender Verify message was not modified in transit Sender cannot deny being originator of message 7

Pick your poison Most popular secure email standards S/MIME OpenPGP How are these different? Similar services Different trust models 8

Hierarchical Trusts Users all directly trust some central authority Alice trusts Bob if Bob s chain of trust traces back to the central authority Driver s License Issued by state authority to prove identity to others 9

Web of Trust Incorporates user perception of trust Any user can be an authority to verify others Users can assign levels of trust Not all authorities are equal Alice and Bob think she is Carol, and that s good enough for me. 10

S/MIME and Digital Certificates IETF standard extending MIME Most email clients already support S/MIME Requires users have public keys to communicate securely Where do users get this key? 11

S/MIME Capable Clients Apple Mail Entourage Eudora 7 Evolution Kmail Mozilla/Thunderbird Mutt Outlook Pine 12

OpenPGP A defacto standard based on Pretty Good Privacy program Users must be able to find others public keys Requires additional 3 rd party software Several implementations available 13

Finding public keys Get public key from previous messages Lookup via directory service PGP Key Servers (e.g. http://pgp.mit.edu) Purdue Electronic Directory Distributed via Public Key Infrastructure 14

Trusting Keys Equivalent to trusting link between identity and key Must have a process for validating identity of key owner Documentation Check Verbal Verification 15

GNU Privacy Guard Freely available implementation of OpenPGP protocol Available for most platforms Does not integrate directly with email clients Integrates with Thunderbird through Enigmail 16

PGP Desktop 8.0 Commercial implementation of OpenPGP standard Runs on Windows and MacOS X Integrates with several common email clients 17

PGP Desktop 9.0 Acts as email proxy instead of client plugin Allows secure email through any client May require reconfiguration of email client connection settings 18

Issues with Secure Email Who should have access to private keys? How do we exchange public keys? How do we assign trust? Should group keys be issued? 19

Generate an Identity Steps to Secure Email Configure Secure Email software Get public keys for recipients Start sending secured messages 20

Getting a Digital Certificate Must be issued by an authority Organizational PKI Third-party vendor Free personal certificates available Thawte Global Trust CACert Comodo 21

Thawte Personal Certificate Enroll for Thawte ID via website Request certificate for ID Must provide national identification number By default, certificate includes email address but not name No validation done to link identity to address yet 22

Thawte Web of Trust Receive trust points from notaries 50 points: Request certificate with name 100 points: Eligible to be a notary Several notaries on Purdue WL campus Hint: One is probably up front talking right now 23

Download from Thawte via IE How to Install a Certificate - Outlook Set Security to High Automatically installed in certificate store How do I view the certificate store? Control Panel->Internet Options->Content->Certificates 24

Download from Thawte via IE How to Install a Certificate - Thunderbird Export from certificate store Import into Thunderbird Options->Privacy->Security->View Certificates->Import 28

Specify identity to link to keys Generating PGP Keys Provide key type and size parameters Add comments or even a digital photo Choose a strong passphrase 30

Outlook S/MIME Setup Outlook S/MIME Walkthrough Encrypting and signing messages Decrypting and Verifying messages 35

Thunderbird Setup Thunderbird S/MIME Walkthrough Encrypting and signing messages Decrypting and Verifying messages 40

Interface Overview Signing messages Encrypting messages Decrypting messages Backing up key pairs PGP Desktop 9 Walkthrough 45

Generate new key pair Configure Enigmail settings Thunderbird GPG Walkthrough Encrypting and Signing Messages Inline PGP vs. PGP/MIME Decrypting and Verifying Messages 53

Using GPG with Thunderbird

Secure Email Tips Backup your keys! Revoke certificates or PGP keys if compromised Trusting a key should only be done after suitable verification with the owner 60

Secure Email Tips Follow the Purdue Data Handling Guidelines Encrypted email is a means of transport, not storage File your sensitive information elsewhere 61

Just because you can, doesn t mean you should. 62

References Trust Models www.pgpi.org/doc/pgpintro/#p20 Thawte Personal Certificates www.thawte.com/secure-email/personal-email-certificates/index.html S/MIME Tutorial www.marknoble.com/tutorial/smime/smime.aspx OpenPGP www.openpgp.org Pretty Good Privacy www.pgp.com Purdue Data Handling Guidelines www.itap.purdue.edu/security/procedures/datahandling.cfm 63

References Gnu Privacy Guard http://www.gnupg.org/ Enigmail OpenPGP Extension enigmail.mozdev.org NIST Guidelines on Electronic Mail Security (Draft) http://csrc.nist.gov/publications/drafts/draft-sp800-45a.pdf 64