Security in Computer Networks



Similar documents
Network Security Part II: Standards

Network Security Concepts: Review

Virtual Private Networks

SECURITY IN NETWORKS

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 10. Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Chapter 7: Network security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

What is network security?

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Network Security. HIT Shimrit Tzur-David

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Computer Networks - CS132/EECS148 - Spring

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Chapter 8 Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Lecture 9 - Network Security TDTS (ht1)

Key Management and Distribution

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Chapter 4 Virtual Private Networking

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Principles of Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Overview. SSL Cryptography Overview CHAPTER 1

Telematics Chapter 11: Network Security Beispielbild User watching video clip

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

EXAM questions for the course TTM Information Security May Part 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Key Management and Distribution

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 8. Network Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

IP Security. Ola Flygt Växjö University, Sweden

Implementing and Managing Security for Network Communications

Transport Level Security

Chapter 32 Internet Security

Public Key Cryptography Overview

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Security vulnerabilities in the Internet and possible solutions

Security in Computer Networks

Chapter 8 Virtual Private Networking

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Lecture 3

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

CRYPTOGRAPHY IN NETWORK SECURITY

Client Server Registration Protocol

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 31 Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

7! Cryptographic Techniques! A Brief Introduction

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Lecture 10: Communications Security

IPsec Details 1 / 43. IPsec Details

Cornerstones of Security

Chapter 7 Transport-Level Security

CSCE 465 Computer & Network Security

Lecture 17 - Network Security

Overview of Network Security

Chapter 6 CDMA/802.11i

CS 758: Cryptography / Network Security

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Lukasz Pater CMMS Administrator and Developer

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Introduction to Security and PIX Firewall

CCNA Security 1.1 Instructional Resource

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Virtual Private Networks

Netzwerksicherheit: Anwendungen

IT Networks & Security CERT Luncheon Series: Cryptography

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

CS 4803 Computer and Network Security

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Network Security Technology Network Management

Internetwork Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

FortiOS Handbook IPsec VPN for FortiOS 5.0

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Lecture 9: Application of Cryptography

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Chapter 17. Transport-Level Security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Using IPSec in Windows 2000 and XP, Part 2

Security: Focus of Control. Authentication

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Transcription:

Security in Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-10/ 8-1

Overview 1. Secret Key Encryption 2. Public Key Encryption 3. Hash Functions 4. Digital Signature, Digital Certificates 5. IPSec, VPN, Firewalls, Intrusion Detection Not Covered: Email Security, SSL, IKE, WEP Note: This class lecture is based on Chapter 8 of the textbook (Kurose and Ross) and the figures provided by the authors. 8-2

Security Requirements Integrity: Received = sent? Availability: Legal users should be able to use. Ping continuously No useful work gets done. Confidentiality and Privacy: No snooping or wiretapping Authentication: You are who you say you are. A student at Dartmouth posing as a professor canceled the exam. Authorization = Access Control Only authorized users get to the data Non-repudiation: Neither sender nor receiver can deny the existence of a message 8-3

Overview Secret Key Encryption 1. Secret Key Encryption 2. Block Encryption 3. Cipher Block Chaining (CBC) 4. DES, 3DES, AES 5. Stream Cipher: RC4 6. Key Distribution 8-4

Secret Key Encryption Also known as symmetric key encryption Encrypted_Message = Encrypt(Key, Message) Message = Decrypt(Key, Encrypted_Message) Example: Encrypt = division 433 = 48 R 1 (using divisor of 9) 8-5

Secret Key: A Simple Example Substitution: Substituting one thing for another Monoalphabetic: substitute one letter for another E.g.: plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc Polyalphabetic: Use multiple substitutions C1, C2, Substitution selected depends upon the position Same letter coded differently in different position 8-6 6

Block Encryption Block Encryption Block Substitution Permutation Round 8-7

Block Encryption (Cont) Short block length tabular attack 64-bit block Transformations: Substitution: replace k-bit input blocks with k-bit output blocks Permutation: move input bits around. 1 13, 2 61, etc. Round: Substitution round followed by permutation round and so on. Diffusion + Confusion. 8-8

Cipher Block Chaining (CBC) Goal: Same message encoded differently Add a random number before encoding 8-9

CBC (Cont) Use C i as random number for i+1 Need Initial Value (IV) no IV Same output for same message one can guess changed blocks Example: Continue Holding, Start Bombing 8-10

DES and 3DES Data Encryption Standard (DES) 64 bit plain text blocks, 56 bit key Broken in 1998 by Electronic Frontier Foundation Triple DES (3DES) Uses 2 or 3 keys and 3 executions of DES Effective key length 112 or 168 bit Block size (64 bit) too small Slow 8-11

Advanced Encryption Standard (AES) Designed in 1997-2001 by National Institute of Standards and Technology (NIST) Federal information processing standard (FIPS 197) Symmetric block cipher, Block length 128 bits Key lengths 128, 192, and 256 bits 8-12

Ron's Cipher 4 (RC4) Developed by Ron Rivest in 1987. Trade secret. Leaked 1994. Stream Cipher A pseudo-random stream is generated using a given key and xor'ed with the input Pseudo-random stream is called One-Time pad Key can be 1 to 256 octet See the C code in the textbook [KPS]. Encryption Key K Plain text data byte p Random byte b Pseudo-random # generator Cipher text data byte c 8-13

1. Application requests connection 2. Security service asks KDC for session Key 3. KDC distributes session key to both hosts 4. Buffered packet transmitted Key Distribution Key Distribution Center KDC shares a secret key with each Host. 8-14

Secret Key Encryption: Review 1. Secret key encryption requires a shared secret key 2. Block encryption, e.g., DES, 3DES, AES break into fixed size blocks and encrypt 3. CBC is one of many modes are used to ensure that the same plain text results in different cipher text. 4. Stream Cipher, e.g., RC4, generate a random stream and xor to the data 5. Key distribution center can be used to exchange session keys 8-15

Try but do not submit Home Exercises Review questions R1, R2, R6 Problems P1, P2, P3, P4, P5, P6 Read pages 681-698 of the textbook 8-16

Homework 8A Problem P6: Consider 3-bit block cipher in Table 8.1. Plain 000 001 010 011 100 101 110 111 Cipher 110 111 101 100 011 010 000 001 Suppose the plaintext is 100100100. (a) Initially assume that CBC is not used. What is the resulting ciphertext? (b) Suppose Trudy sniffs the cipher text. Assuming she knows that a 3-bit block cipher without CBC is being employed (but doesn t know the specific cipher), what can she surmise? (c) Now suppose that CBC is used with IV-111. What is the resulting ciphertext? 8-17

Overview Public Key Encryption 1. Public Key Encryption 2. Modular Arithmetic 3. RSA Public Key Encryption 4. Confidentiality 5. Diffie-Hellman Key Agreement 6. Hash Functions: MD5, SHA-1 7. Message Authentication Code (MAC) 8. Digital Signature 9. Digital Certificates 8-18

Public Key Encryption Invented in 1975 by Diffie and Hellman Encrypted_Message = Encrypt(Key1, Message) Message = Decrypt(Key2, Encrypted_Message) Key1 Text Ciphertext Key2 Ciphertext Text 8-19

Public Key (Cont) One key is private and the other is public Message = Decrypt(Public_Key, Encrypt(Private_Key, Message)) Message = Decrypt(Private_Key, Encrypt(Public_Key, Message)) Msg Alice s Public Key Alice s Private Key Msg Msg Bob s Public Key Bob s Private Key Msg 8-20

Public Key Encryption Method RSA: Encrypted_Message = m 3 mod 187 Message = Encrypted_Message 107 mod 187 Key1 = <3,187>, Key2 = <107,187> Message = 5 Encrypted Message = 5 3 = 125 Message = 125 107 mod 187 = 5 = 125 (64+32+8+2+1) mod 187 = {(125 64 mod 187)(125 32 mod 187)... (125 2 mod 187)(125 mod 187)} mod 187 8-21

Modular Arithmetic xy mod m = (x mod m) (y mod m) mod m x 4 mod m = (x 2 mod m)(x 2 mod m) mod m x ij mod m = (x i mod m) j mod m 125 mod 187 = 125 125 2 mod 187 = 15625 mod 187 = 104 125 4 mod 187 = (125 2 mod 187) 2 mod 187 = 104 2 mod 187 = 10816 mod 187 = 157 128 8 mod 187 = 157 2 mod 187 = 152 128 16 mod 187 = 152 2 mod 187 = 103 128 32 mod 187 = 103 2 mod 187 = 137 128 64 mod 187 = 137 2 mod 187 = 69 128 64+32+8+2+1 mod 187 = 69 137 152 104 125 mod 187 = 18679128000 mod 187 = 5 8-22

RSA Public Key Encryption Ron Rivest, Adi Shamir, and Len Adleman at MIT 1978 Both plain text M and cipher text C are integers between 0 and n-1. Key 1 = {e, n}, Key 2 = {d, n} C = M e mod n M = C d mod n How to construct keys: Select two large primes: p, q, p q n = p q Calculate z = (p-1)(q-1) Select e, such that lcd(z, e) = 1; 0 < e < z Calculate d such that de mod z = 1 8-23

RSA Algorithm: Example Select two large primes: p, q, p q p = 17, q = 11 n = p q = 17 11 = 187 Calculate z = (p-1)(q-1) = 16x10 = 160 Select e, such that lcd(z, e) = 1; 0 < e < z say, e = 7 Calculate d such that de mod z = 1 160k+1 = 161, 321, 481, 641 Check which of these is divisible by 7 161 is divisible by 7 giving d = 161/7 = 23 Key 1 = {7, 187}, Key 2 = {23, 187} 8-24

Homework 8B Problem P8: Consider RSA with p=5, q=11 A. what are n and z B. let e be 3. Why is this an acceptable choice for e? C. Find d such that de=1(mod z) and d<160 D. Encrypt the message m=8 using the key (n,e). Let c be the corresponding cipher text. Show all work including decryption. 8-25

Confidentiality User 1 to User 2: Encrypted_Message = Encrypt(Public_Key2, Encrypt(Private_Key1, Message)) Message = Decrypt(Public_Key1, Decrypt(Private_Key2, Encrypted_Message) Authentic and Private Your Public Key My Private Key Message 8-26

Diffie-Hellman Key Agreement Allows two party to agree on a secret key using a public channel A selects p=large prime, and g=a number less than p A selects a random # S A, B selects another random # S B S A, g, p T A = g S A mod p T AB = T B SA mod p g, p, T A T B S B T B = g S B mod p T AB = T SB A mod p T AB = g S A SB mod p Eavesdropper can see T A, g, p but cannot compute S A Computing S A requires discrete logarithm - a difficult problem 8-27

Example: g=5, p=19 Diffie-Hellman (Cont) A selects 6 and sends 5 6 mod 19 =T A = 7 B selects 7 and sends 5 7 mod 19 =T B = 16 A computes K =T AB = 16 6 mod 19 = 7 B computes K = 7 7 mod 19 = 7 Preferably (p-1)/2 should also be a prime. Such primes are called safe prime. 8-28

Hash Functions 12345678901234567 Hash Example: CRC can be used as a hash (not recommended for security applications) Requirements: 1. Applicable to any size message 2. Fixed length output 3. Easy to compute 4. Difficult to Invert Can t find x given H(x) One-way 5. Difficult to find y, such that H(x) = H(y) Can t change msg 6. Difficult to find any pair (x, y) such that H(x) = H(y) Strong hash 12345678901234767 Hash 8-29

MD5 Hash 128-bit hash using 512 bit blocks using 32-bit operations Invented by Ron Rivest in 1991 Described in RFC 1321 Commonly used to check the integrity of files (easy to fudge message and the checksum) Also used to store passwords 8-30

SHA-1 1 Algorithm 160 bit hash using 512 bit blocks and 32 bit operations Five passes (4 in MD5 and 3 in MD4) Maximum message size is 2 64 bit 8-31

Message Authentication Code (MAC) Authentic Message = Contents unchanged + Source Verified May also want to ensure that the time of the message is correct Encrypt({Message, CRC, Time Stamp}, Source s secret key) Message + Encrypt(Hash, Source s secret key) Message + Encrypt(Hash, Source s private key) Message MAC 8-32

Digital Signature Message Digest = Hash(Message) Signature = Encrypt(Private_Key, Hash) Hash(Message) = Decrypt(Public_Key, Signature) Authentic Also known as Message authentication code (MAC) Text Hash Signature Private Key Digest Public Key Signature Digest Hash Text 8-33

Digital Certificates Like driver license or passport Digitally signed by Certificate authority (CA) - a trusted organization Public keys are distributed with certificates CA uses its private key to sign the certificate Hierarchy of trusted authorities X.509 Certificate includes: Name, organization, effective date, expiration date, public key, issuer s CA name, Issuer s CA signature User ID Public Key hash Encrypt CA private key User ID Public Key 8-34

Oligarchy Example 8-35

Internet Explorer Sample X.509 Certificate 8-36

X.509 Sample (Cont) 8-37

Public Key Encryption: Review 1. Public Key Encryption uses two keys: Public and Private 2. RSA method is based on difficulty of factorization 3. Diffie-Hellman Key Agreement allows agreeing on a shared secret in public 4. Hashes are one-way functions such that it difficult to find another input with the same hash like MD5, SHA-1 5. Message Authentication Code (MAC) ensures message integrity and source authentication using hash functions Digital Signature consists of encrypting the hash of a message using private key 6. Digital certificates are signed by root certification authorities and contain public keys 8-38

Try but do not submit Review Exercises Review exercises:r7, R9, R10, R11, R12, R13, R14, R15 Problems: P7, P9, P10, P11, P12 Read pages 699-721 of the textbook 8-39

Overview IPSec, VPN, Firewalls 1. IPSec Tunnel vs. Transport Mode Authentication Header Encapsulating Security Payload (ESP) 2. Virtual Private Networks 3. Firewalls 4. Application Gateways: Proxy Servers 5. Intrusion Detection Systems 8-40

IPSec Secure IP: A series of proposals from IETF Separate Authentication and privacy Authentication Header (AH) ensures data integrity and data origin authentication Encapsulating Security Protocol (ESP) ensures confidentiality, data origin authentication, connectionless integrity, and antireplay service IP Header Original Original AH ESP IP Header* Data Encrypted Authenticated * Optional 8-41

Tunnel vs. Transport Mode Gateway-to-gateway vs. end-to-end Router Router Gateway-to-Gateway End-to-end 8-42

Authentication Header Next Header = TCP=6, UDP=17, IP=4, AH=51 Designed by IPv6 fans Payload Length = Length of AH in 32-bit words 2 (for IPv4) =Length of AH in 64-bit words -1 (for IPv6) SPI = Identifies Security association (0=Local use, 1-255 reserved) Authentication data = Integrity Check Value 8-43

AH ICV Computation IP Header AH Header [Old IP Header] IP payload ICV coverage The AH ICV is computed over: IP header fields that are either immutable in transit or that are predictable in value upon arrival at the endpoint for the AH SA, e.g., source address (immutable), destination address with source routing (mutable but predictable) The AH header (Next Header, Payload Len, Reserved, SPI, Sequence Number, and the Authentication Data (which is set to zero for this computation), and explicit padding bytes (if any)) The upper level protocol data, which is assumed to be immutable in transit 8-44

ESP Packet Payload data: IP, TCP, UDP packet Pad Length in bytes Next Header: Type of payload (TCP, UDP, ) Authentication Data: Integrity Check Value over ESP packet 8-45

Encapsulating Security Payload (ESP) Provides encryption and/or integrity Confidentiality=ESP, Integrity=AH or ESP, Confidentiality+Integrity=ESP, ESP+AH Null encryption algorithm No confidentiality IV and authentication data sizes available from SA database 8-46

Homework 8C For each of the fields in IPv4 header, indicate whether the field is immutable, mutable but predictable, or mutable (zeroed prior to ICV calculation). 8-47

What is a VPN? Private Network: Uses leased lines Virtual Private Network: Uses public Internet Internet Service Provider 8-48

PPTP Server ISP PPTP Network Access Server Client PPTP Tunnel PPTP = Point-to-point Tunneling Protocol Developed jointly by Microsoft, Ascend, USR, 3Com and ECI Telematics PPTP server for NT4 and clients for NT/95/98 8-49

Firewall Intranet R1 Firewall R2 Internet Enforce rules on what internal hosts/applications can be accessed from outside and vice versa One point of entry. Easier to manage security. Discard based on IP+TCP header. Mainly port #. Firewall-Friendly applications: Use port 80. 8-50

Application Gateways: Proxy Servers R2 Proxy Server R1 Internet Client Proxy Real Specialized server programs on bastion host Take user's request and forward them to real servers Take server's responses and forward them to users Enforce site security policy Refuse some requests. Also known as application-level gateways With special "Proxy client" programs, proxy servers are almost transparent 8-51

Types of IDS IDS Sensor: SW/HW to collect and analyze network traffic Host IDS: Runs on each server or host Network IDS: Monitors traffic on the network Network IDS may be part of routers or firewalls Manager Host Based Network Based IDS Agent Agent Agent WWW Mail DNS 8-52

Signature Based IDS 5-tuple packet filtering (SA/DA/L4 protocol/ports) Use Ternary Content Addressable Memories (TCAMs) Deep packet inspection requires pattern string matching algorithms (Aho-Corasik algorithm and enhancements) Regular expression signatures 8-53

IPSec, VPN, Firewalls: Review 1. IPSec has two modes: end-to-end (Transport mode) or routerto-router (tunnel mode) 2. Authentication Header (AH) ensures data integrity and data origin authentication 3. Encapsulating Security Protocol (ESP) ensures confidentiality, data origin authentication, connectionless integrity, and antireplay service 4. Virtual Private Networks provide encryption over public networks 5. Firewalls filter traffic based on port numbers 6. Proxy Servers provide application specific protection 7. Intrusion Detection Systems inspect incoming traffic for specific attack signatures 8-54

Try but do not submit Review Exercises Review Questions: R24, R25, R29, R30, R33 Problems P22, P23 Read pages 734-740, 747-758 (Skip Sections 8.4, 8.5, 8.6.5, and 8.7) 8-55

Homework 8D P25 (modified): Provide a filter table for a stateful wirewall that is as restrictive as possible but accomplishes the following: A. Allows all internal users to establish Telnet sessions with external hosts. B. Allows external users to surf the company website at 222.22.0.12 C. But otherwise blocks all inbound and outbound traffic. The internal network is 222.22/16. 8-56

Summary Network security requires confidentiality, integrity, availability, authentication, and non-repudiation Encryption can use one secret key or two keys (public and private) Public key is very compute intensive and is generally used to send secret key Digital certificate system is used to certify the public key IPSec provides integrity, data origin authentication, confidentiality, and anti-replay 8-57

Lab Homework 8E You will receive a signed email from the TA with his digital certificate. Import this certificate in your contacts list. (Use help feature on your email software for details. See instructions for Outlook and Gmail). Now send an encrypted signed email to TA with the subject line of CSE473 Encrypted Signed Mail Homework 8E You will need a certificate for yourself too. 8-58

Lab Homework 8E (Cont) Getting your Certificate: Use Internet Explorer to request and collect a free email certificate from: http://www.comodo.com/home/email-security/free-email-certificate.php After you have collected the certificate, in Internet Explorer go to Tools Internet Options Contents Certificates Personal Select your certificate and export it to a file. Select Yes Export the private key click next Select Include all certificates in the certification path Select Enable strong protection Do not select Delete the private key if the export is successful Save it with a password of your choice. Import this certificate in Outlook as follows: Tools Options Security Import/Export Browse to your certificate file and add it. 8-59

Lab Homework 8E (Cont) If you use Firefox, use the following procedure to request and collect a free email certificate from: http://www.comodo.com/home/email-security/free-email-certificate.php After you have collected the certificate, in Firefox go to Tools Options Advanced Encryption View Certificates Your Certificates Select your certificate and backup to a file. Save it with a password of your choice. Import this certificate in Outlook as follows: Tools Options Security Import/Export Browse to your certificate file and add it. Note: You have to use the same browser to collect the certificate from Comodo that you used to request the certificate. 8-60

Lab Homework 8E (Cont) Importing Other s Certificates in Outlook: In Outlook, open the signed message received from TA. In the message window, right click on the name in the From field and select "save as outlook contact This will open a new contact window. In that window, click on the "certificates" tab. You will see the certificate listed there. Save this contact in your contacts list. When you reply or send email to this contact, you can enable the security options for encryption and signatures by: View Options Security Options Select Encrypt Message or Add Digital Signature or both Select Security Settings: <Automatic> 8-61

Lab Homework 8E (Cont) Gmail Instructions: The certificate will show up as an attachment name smime.p7s Download and save this attachment on your computer. Transfer this file to the computer where you have an outlook email. Manually create a new contact entry in outlook with proper name and email address. Open this contact entry. Go to certificate panel and import. Select all files *.* and select the file smime.p7s Save and close the entry. To send an email with your Gmail address in the from field, you will need to create a new email account in Outlook with the corresponding Gmail address in the from field. Outlook allows email security. Gmail does not. 8-62

Lab Homework 8E (Cont) Sending Encrypted and Signed Messages w Outlook: You can reply to the TA s email with a signed encrypted message. Content of the reply is not important. Before sending the message, on the message window, Select View Options Security Settings Select encryption and signature Now send the message. 8-63

Lab Homework 8E (Cont) Thunderbird: To import your certificate into Thunderbird: Tools -> Options -> Advanced -> Certificates -> View Certificates -> Your Certificates -> Import Then navigate to where you saved the certificate and select it. Enter the password you encrypted the certificate with. Now go to Tools->Account Settings->Security Under "Digital Signing", click select to choose the certificate you just imported. Click "Yes" to automatically use the same certificate for encryption/decryption. Thunderbird keeps track of other people's certificates automatically. "Add to address book" step is not necessary for Thunderbird. To send a message: After opening a new message, go to Options-> Encrypt this Message and Options->Digitally Sign this message, as desired. 8-64