SlideShare a Scribd company logo
2
Most read
4
Most read
10
Most read
Email Security &
Development
By: Yosef Gamble
CS 325
https://commons.wikimedia.org/wiki/File:Crypto_key.svg
Table of Contents
Email Security Flaws
Encryption Techniques
Public key Infrastructure (PKI)
Pretty Good Privacy (PGP)
Application
Future Development
Email Security Flaws
Email is sent in plain text.
Email uses outdated protocol, Simple Mail
Transfer Protocol (SMTP).
Includes a header full of revealing metadata.
Can easily become intercepted.
Encryption Techniques - PKI
Public Key Infrastructure
Introduced public/private key encryption using
certificates
Relied on Third-Party vendors
Widely used in Corporate environment
https://en.wikipedia.org/wiki/Public_key_infrastructure#mediaviewer/File:Public-Key-Infrastructure.svg
Encryption Technique - PGP
Pretty Good Privacy
Decentralised version of PKI
Removed Third-Party Involvement
Uses ‘Web of Trust’ authentication
https://www.sandboxgeneral.com/?p=974
Applications
GNU Privacy Guard (GnuPG)
Hushmail
Lavabit, Silent Circle, & PrivateSky
Third-Party Plugins Webmail
https://en.wikipedia.org/wiki/GNU_Privacy_Guard#mediaviewer/File:Gnupg_logo.svg
Future Development
Focus on End-to-End Email Encryption and
Usability
Dark Mail Project
Extensible Messaging and Presence Protocol
(XMPP)
http://www.darkmail.info
Conclusion
Email Security Flaws
Encryption Techniques
Public key Infrastructure (PKI)
Pretty Good Privacy (PGP)
Application
Future Development
Questions?
?
Works Cited
Bradbury, D. (2014, March). Can we make email secure? Network Security, 2014(3), 13-16.
Retrieved May 27, 2014, from ACM Database.
Ellison, C., & Schneier, B. (2000). Risks of pki: Secure email. Communications of the ACM,
43(1), 160.
Hallam-Baker P. (2014). Privacy protected email. Retrieved from
https://www.w3.org/2014/strint/papers/01.pdf
Nguyen P. (2004). Can we trust cryptographic software? cryptographic flaws in gnu privacy guard
V1.2.3. In C. Cachin and J. Camenisch (Eds.), Advances in Cryptology - EUROCRYPT 2004, 3027, 555-
570.
Shelley L. I. (2003). Organized crime, terrorism and cybercrime. In A. Bryden, P. Fluri (Eds.),
Security sector reform: Institutions, society and good governance (pp. 303-312).
Baden-Baden, DE: Nomos Verlagsgesellschaft.
Yu J., Cheval V., Ryan M. (2014). Challenges with end-to-end email encryption. Retrieved from
https://www.w3.org/2014/strint/papers/08.pdf

More Related Content

PPT
Email security
PDF
Email security presentation
PPT
E-mail Security in Network Security NS5
PPTX
Email security
PPTX
RSA algorithm
PPT
X.509 Certificates
PPT
Email Security and Awareness
PPTX
Cryptography
Email security
Email security presentation
E-mail Security in Network Security NS5
Email security
RSA algorithm
X.509 Certificates
Email Security and Awareness
Cryptography

What's hot (20)

PDF
Electronic mail security
PPT
Information Security & Cryptography
PPT
Digital signature
PPTX
public key infrastructure
PPTX
Email security
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Public key Infrastructure (PKI)
PPTX
Encryption
ODP
Email security
PDF
User Authentication: Passwords and Beyond
PPTX
Digital signature(Cryptography)
PPTX
Hash Function
PPTX
Two factor authentication presentation mcit
PPTX
Cryptography
PDF
IP Security
PPTX
Wireless and mobile security
PPT
Digital signature
PPTX
Cryptography
PPTX
Cryptography
Electronic mail security
Information Security & Cryptography
Digital signature
public key infrastructure
Email security
CRYPTOGRAPHY AND NETWORK SECURITY
Public key Infrastructure (PKI)
Encryption
Email security
User Authentication: Passwords and Beyond
Digital signature(Cryptography)
Hash Function
Two factor authentication presentation mcit
Cryptography
IP Security
Wireless and mobile security
Digital signature
Cryptography
Cryptography
Ad

Viewers also liked (14)

PPTX
Email security - Netwroking
PDF
Email Security Overview
PPT
Lecture 8 mail security
PPT
Network security
PDF
Email Security
PPT
Email Security : PGP & SMIME
PDF
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
PPTX
Simple mail transfer protocol
PPTX
Simple Mail Transfer Protocol
PDF
Secure electronic transaction (set)
PPTX
S/MIME & E-mail Security (Network Security)
PPTX
Trusted systems
PPTX
Protocolo SMTP (Simple Mail Transfer Protocol)
PPT
Smtp
Email security - Netwroking
Email Security Overview
Lecture 8 mail security
Network security
Email Security
Email Security : PGP & SMIME
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
Simple mail transfer protocol
Simple Mail Transfer Protocol
Secure electronic transaction (set)
S/MIME & E-mail Security (Network Security)
Trusted systems
Protocolo SMTP (Simple Mail Transfer Protocol)
Smtp
Ad

Similar to Email Security Presentation (20)

PDF
Network Security CS2
PDF
www.ijerd.com
PDF
Cisco Secure Email 2024 Cisco Secure Email 2024
DOCX
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
DOCX
YosefGamble_Writing_Sample_Email_Security
PPT
PPT
Secure Mail Application's by Ashok Panwar
PDF
Data security for any organization by using public key infrastructure compone...
PDF
Data security for any organization by using public key infrastructure compone...
PDF
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
PDF
Identity based cryptography for client side security in web applications (web...
PDF
High security mechanism: Fragmentation and replication in the cloud with auto...
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
G43053847
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Hacking IoT with EXPLIoT Framework
PPT
PPT
Cryptography
PDF
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
PDF
Debunking the Myths of SSL VPN Security
Network Security CS2
www.ijerd.com
Cisco Secure Email 2024 Cisco Secure Email 2024
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
YosefGamble_Writing_Sample_Email_Security
Secure Mail Application's by Ashok Panwar
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Identity based cryptography for client side security in web applications (web...
High security mechanism: Fragmentation and replication in the cloud with auto...
International Refereed Journal of Engineering and Science (IRJES)
G43053847
International Journal of Engineering Research and Development (IJERD)
Hacking IoT with EXPLIoT Framework
Cryptography
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Debunking the Myths of SSL VPN Security

More from Yosef Gamble (7)

DOCX
Design Report
PDF
Water Rights Documentation
PPTX
BOT 3 Oct.pptx
PPTX
Cainet Meeting August 20 2014 (2).pptx
PDF
ASCWU BOT 13 May.pptx_2
PDF
B2B Consulting
PDF
COB Brother 2 Brother Funding
Design Report
Water Rights Documentation
BOT 3 Oct.pptx
Cainet Meeting August 20 2014 (2).pptx
ASCWU BOT 13 May.pptx_2
B2B Consulting
COB Brother 2 Brother Funding

Email Security Presentation

  • 1. Email Security & Development By: Yosef Gamble CS 325 https://commons.wikimedia.org/wiki/File:Crypto_key.svg
  • 2. Table of Contents Email Security Flaws Encryption Techniques Public key Infrastructure (PKI) Pretty Good Privacy (PGP) Application Future Development
  • 3. Email Security Flaws Email is sent in plain text. Email uses outdated protocol, Simple Mail Transfer Protocol (SMTP). Includes a header full of revealing metadata. Can easily become intercepted.
  • 4. Encryption Techniques - PKI Public Key Infrastructure Introduced public/private key encryption using certificates Relied on Third-Party vendors Widely used in Corporate environment https://en.wikipedia.org/wiki/Public_key_infrastructure#mediaviewer/File:Public-Key-Infrastructure.svg
  • 5. Encryption Technique - PGP Pretty Good Privacy Decentralised version of PKI Removed Third-Party Involvement Uses ‘Web of Trust’ authentication https://www.sandboxgeneral.com/?p=974
  • 6. Applications GNU Privacy Guard (GnuPG) Hushmail Lavabit, Silent Circle, & PrivateSky Third-Party Plugins Webmail https://en.wikipedia.org/wiki/GNU_Privacy_Guard#mediaviewer/File:Gnupg_logo.svg
  • 7. Future Development Focus on End-to-End Email Encryption and Usability Dark Mail Project Extensible Messaging and Presence Protocol (XMPP) http://www.darkmail.info
  • 8. Conclusion Email Security Flaws Encryption Techniques Public key Infrastructure (PKI) Pretty Good Privacy (PGP) Application Future Development
  • 10. Works Cited Bradbury, D. (2014, March). Can we make email secure? Network Security, 2014(3), 13-16. Retrieved May 27, 2014, from ACM Database. Ellison, C., & Schneier, B. (2000). Risks of pki: Secure email. Communications of the ACM, 43(1), 160. Hallam-Baker P. (2014). Privacy protected email. Retrieved from https://www.w3.org/2014/strint/papers/01.pdf Nguyen P. (2004). Can we trust cryptographic software? cryptographic flaws in gnu privacy guard V1.2.3. In C. Cachin and J. Camenisch (Eds.), Advances in Cryptology - EUROCRYPT 2004, 3027, 555- 570. Shelley L. I. (2003). Organized crime, terrorism and cybercrime. In A. Bryden, P. Fluri (Eds.), Security sector reform: Institutions, society and good governance (pp. 303-312). Baden-Baden, DE: Nomos Verlagsgesellschaft. Yu J., Cheval V., Ryan M. (2014). Challenges with end-to-end email encryption. Retrieved from https://www.w3.org/2014/strint/papers/08.pdf