SlideShare a Scribd company logo
Chapter 5 Electronic mail security  Henric Johnson Blekinge Institute of Technology, Sweden http://www.its.bth.se/staff/hjo/ [email_address]
Outline Pretty good privacy S/MIME Recommended web sites
Pretty Good Privacy Philip R. Zimmerman is the creator of PGP. PGP  provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.
Why Is PGP Popular? It is availiable free on a variety of platforms. Based on well know n  algorithms . Wide range of applicability Not developed or controlled by governmental or standards organizations
Operational Description Consist of five services: Authentication Confidentiality Compression E-mail compatibility Segmentation
 
Compression PGP compresses the message after applying the signature but before encryption The placement of the compression algorithm is critical. The compression algorithm used is ZIP (described in appendix 5A)
E-mail Compatibility The scheme used is radix-64 conversion (see appendix 5B). The use of radix-64 expands the message by 33%.
Segmentation and Reassembly Often restricted to a maximum message length of 50,000 octets. Longer messages must be broken up into segments. PGP automatically subdivides a message that is to large. The receiver strip of all e-mail headers and reassemble the block.
Sumary of PGP Services
 
Format of PGP Message
 
 
 
The Use of Trust Key legitimacy field Signature trust field Owner trust field See Table 5.2  (W. Stallings)
 
Revoking Public  Keys The owner issue a key revocation certificate. Normal signature certificate with a revote indicator. Corresponding private key is used to sign the certificate.
S/MIME Secure/Multipurpose Internet Mail Extension S/MIME will probably emerge as the industry standard. PGP for personal e-mail security
Simple Mail Transfer Protocol (SMTP, RFC 822) SMTP Limitations - Can not transmit, or has a problem with: executable files, or other binary files (jpeg image) “ national language” characters (non-ASCII) messages over a certain size ASCII to EBCDIC translation problems lines longer than a certain length (72 to 254 characters)
Header fields in MIME MIME-Version:   Must be “1.0” -> RFC 2045, RFC 2046 Content-Type:   More types being added by developers (application/word) Content-Transfer-Encoding:   How message has been encoded (radix-64) Content-ID:   Unique identifying character string. Content Description:   Needed when content is not readable text (e.g.,mpeg)
S/MIME Functions Enveloped Data:  Encrypted content and encrypted session keys for recipients. Signed Data:  Message Digest encrypted with private key of “signer.” Clear-Signed Data:  Signed but not encrypted. Signed and Enveloped Data:  Various orderings for encrypting and signing.
Algorithms Used Message Digesting:  SHA-1 and MDS Digital Signatures:  DSS Secret-Key Encryption:  Triple-DES, RC2/40 (exportable) Public-Private Key Encryption:  RSA with key sizes of 512 and 1024 bits, and Diffie-Hellman (for session keys).
User Agent Role S/MIME uses Public-Key Certificates - X.509 version 3 signed by Certification Authority Functions: Key Generation  - Diffie-Hellman, DSS, and RSA key-pairs. Registration  -  Public keys must be registered with X.509 CA. Certificate Storage  - Local (as in browser application) for different services. Signed and Enveloped Data  - Various orderings for encrypting and signing.
User Agent Role Example: Verisign (www.verisign.com) Class-1:   Buyer’s email address confirmed by emailing vital info. Class-2:   Postal address is confirmed as well, and data checked against directories. Class-3:   Buyer must appear in person, or send notarized documents.
Recommended Web Sites PGP home page: www.pgp.com MIT distribution site for PGP S/MIME Charter S/MIME Central: RSA Inc.’s Web Site

More Related Content

PPTX
S/MIME & E-mail Security (Network Security)
PDF
Electronic mail security
PPT
Email Security : PGP & SMIME
PPTX
Email security
PPTX
public key infrastructure
PDF
Email security presentation
PPT
Email security
PPT
Network security
S/MIME & E-mail Security (Network Security)
Electronic mail security
Email Security : PGP & SMIME
Email security
public key infrastructure
Email security presentation
Email security
Network security

What's hot (20)

PPTX
Transport Layer Security (TLS)
PPT
Message Authentication Code & HMAC
PPTX
RSA algorithm
PPTX
Introduction to Public Key Infrastructure
PPT
Cryptography
PDF
Digital certificates & its importance
PPT
Pretty good privacy
PPT
Digital signature
PPTX
Public key infrastructure
PPTX
RSA ALGORITHM
PPTX
CMACs and MACS based on block ciphers, Digital signature
PPT
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Email security
PPTX
DomainKeys Identified Mail (DKIM).pptx
PPTX
Intrusion Detection Systems.pptx
PPTX
Digital signature(Cryptography)
PPT
Firewalls
PPT
Digital Signature
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Transport Layer Security (TLS)
Message Authentication Code & HMAC
RSA algorithm
Introduction to Public Key Infrastructure
Cryptography
Digital certificates & its importance
Pretty good privacy
Digital signature
Public key infrastructure
RSA ALGORITHM
CMACs and MACS based on block ciphers, Digital signature
CRYPTOGRAPHY AND NETWORK SECURITY
Email security
DomainKeys Identified Mail (DKIM).pptx
Intrusion Detection Systems.pptx
Digital signature(Cryptography)
Firewalls
Digital Signature
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Ad

Similar to E-mail Security in Network Security NS5 (20)

PPT
ch05.ppt
PPT
Chapter 5
PPT
Chapter 5Electronic MailElectronic Mail.ppt
PPT
types of attacks on electronic mail security
PDF
BAIT1103 Chapter 5
PDF
M.FLORENCE DAYANA/electronic mail security.pdf
PPT
chap15 cryptography and network security.ppt
PPT
Celebrity Cricket League 2016 - http://ccl5.com/
PPT
CRYPTOGRAPHY_ENGG_CSE_III_YEAR_PGP_CNS.ppt
PPTX
Email sec11
PPT
ch15.ppt
PPT
ch15 (1).ppt
PPT
ch15.ppt
PPT
chapter 15-Network and Security-By-MIT.ppt
PPT
Pgp smime
PPT
computer netwok security Pretty Good Privacy PGP.ppt
PDF
CNS - Unit v
PPT
pretty good privacy class hrtyetywetwetyewty
PPT
E-mail Security.ppt
ch05.ppt
Chapter 5
Chapter 5Electronic MailElectronic Mail.ppt
types of attacks on electronic mail security
BAIT1103 Chapter 5
M.FLORENCE DAYANA/electronic mail security.pdf
chap15 cryptography and network security.ppt
Celebrity Cricket League 2016 - http://ccl5.com/
CRYPTOGRAPHY_ENGG_CSE_III_YEAR_PGP_CNS.ppt
Email sec11
ch15.ppt
ch15 (1).ppt
ch15.ppt
chapter 15-Network and Security-By-MIT.ppt
Pgp smime
computer netwok security Pretty Good Privacy PGP.ppt
CNS - Unit v
pretty good privacy class hrtyetywetwetyewty
E-mail Security.ppt
Ad

More from koolkampus (20)

PPT
Local Area Networks in Data Communication DC24
PPT
Bit Oriented Protocols in Data Communication DC23
PPT
Data Link Control in Data Communication DC20
PPT
Error Detection and Correction in Data Communication DC18
PPT
TDM in Data Communication DC16
PPT
Radio Communication Band(Data Communication) DC14
PPT
Connectors in Data Communication DC12
PPT
Transmission of Digital Data(Data Communication) DC11
PPT
Analog to Digital Encoding in Data Communication DC9
PPT
Signal with DC Component(Data Communication) DC7
PPT
Layer Examples in Data Communication CD4
PPT
OSI Model (Data Communication) DC3
PPT
Basic Concepts in Data Communication DC1
PPT
Token Passing in Data Communication DC25
PPT
Data Link Protocols in Data Communication DC22
PPT
Flow Control in Data Communication DC21
PPT
CRC in Data Communication DC19
PPT
Telephone Networn in Data Communication DC17
PPT
Multiplexing in Data Communication DC15
PPT
Transmission Media in Data Communication DC13
Local Area Networks in Data Communication DC24
Bit Oriented Protocols in Data Communication DC23
Data Link Control in Data Communication DC20
Error Detection and Correction in Data Communication DC18
TDM in Data Communication DC16
Radio Communication Band(Data Communication) DC14
Connectors in Data Communication DC12
Transmission of Digital Data(Data Communication) DC11
Analog to Digital Encoding in Data Communication DC9
Signal with DC Component(Data Communication) DC7
Layer Examples in Data Communication CD4
OSI Model (Data Communication) DC3
Basic Concepts in Data Communication DC1
Token Passing in Data Communication DC25
Data Link Protocols in Data Communication DC22
Flow Control in Data Communication DC21
CRC in Data Communication DC19
Telephone Networn in Data Communication DC17
Multiplexing in Data Communication DC15
Transmission Media in Data Communication DC13

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Electronic commerce courselecture one. Pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Tartificialntelligence_presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Machine Learning_overview_presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Electronic commerce courselecture one. Pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Tartificialntelligence_presentation.pptx
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
Machine Learning_overview_presentation.pptx
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

E-mail Security in Network Security NS5

  • 1. Chapter 5 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden http://www.its.bth.se/staff/hjo/ [email_address]
  • 2. Outline Pretty good privacy S/MIME Recommended web sites
  • 3. Pretty Good Privacy Philip R. Zimmerman is the creator of PGP. PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.
  • 4. Why Is PGP Popular? It is availiable free on a variety of platforms. Based on well know n algorithms . Wide range of applicability Not developed or controlled by governmental or standards organizations
  • 5. Operational Description Consist of five services: Authentication Confidentiality Compression E-mail compatibility Segmentation
  • 6.  
  • 7. Compression PGP compresses the message after applying the signature but before encryption The placement of the compression algorithm is critical. The compression algorithm used is ZIP (described in appendix 5A)
  • 8. E-mail Compatibility The scheme used is radix-64 conversion (see appendix 5B). The use of radix-64 expands the message by 33%.
  • 9. Segmentation and Reassembly Often restricted to a maximum message length of 50,000 octets. Longer messages must be broken up into segments. PGP automatically subdivides a message that is to large. The receiver strip of all e-mail headers and reassemble the block.
  • 10. Sumary of PGP Services
  • 11.  
  • 12. Format of PGP Message
  • 13.  
  • 14.  
  • 15.  
  • 16. The Use of Trust Key legitimacy field Signature trust field Owner trust field See Table 5.2 (W. Stallings)
  • 17.  
  • 18. Revoking Public Keys The owner issue a key revocation certificate. Normal signature certificate with a revote indicator. Corresponding private key is used to sign the certificate.
  • 19. S/MIME Secure/Multipurpose Internet Mail Extension S/MIME will probably emerge as the industry standard. PGP for personal e-mail security
  • 20. Simple Mail Transfer Protocol (SMTP, RFC 822) SMTP Limitations - Can not transmit, or has a problem with: executable files, or other binary files (jpeg image) “ national language” characters (non-ASCII) messages over a certain size ASCII to EBCDIC translation problems lines longer than a certain length (72 to 254 characters)
  • 21. Header fields in MIME MIME-Version: Must be “1.0” -> RFC 2045, RFC 2046 Content-Type: More types being added by developers (application/word) Content-Transfer-Encoding: How message has been encoded (radix-64) Content-ID: Unique identifying character string. Content Description: Needed when content is not readable text (e.g.,mpeg)
  • 22. S/MIME Functions Enveloped Data: Encrypted content and encrypted session keys for recipients. Signed Data: Message Digest encrypted with private key of “signer.” Clear-Signed Data: Signed but not encrypted. Signed and Enveloped Data: Various orderings for encrypting and signing.
  • 23. Algorithms Used Message Digesting: SHA-1 and MDS Digital Signatures: DSS Secret-Key Encryption: Triple-DES, RC2/40 (exportable) Public-Private Key Encryption: RSA with key sizes of 512 and 1024 bits, and Diffie-Hellman (for session keys).
  • 24. User Agent Role S/MIME uses Public-Key Certificates - X.509 version 3 signed by Certification Authority Functions: Key Generation - Diffie-Hellman, DSS, and RSA key-pairs. Registration - Public keys must be registered with X.509 CA. Certificate Storage - Local (as in browser application) for different services. Signed and Enveloped Data - Various orderings for encrypting and signing.
  • 25. User Agent Role Example: Verisign (www.verisign.com) Class-1: Buyer’s email address confirmed by emailing vital info. Class-2: Postal address is confirmed as well, and data checked against directories. Class-3: Buyer must appear in person, or send notarized documents.
  • 26. Recommended Web Sites PGP home page: www.pgp.com MIT distribution site for PGP S/MIME Charter S/MIME Central: RSA Inc.’s Web Site