SlideShare a Scribd company logo
E-mail and Encryption Ensuring secure communications in a distributed corporate environment.
The Problem The Internet is a distributed network. No one machine controls access to all others. E-mail travels through several servers before arriving at its destination. Every e-mail is stored for a time on every server it passes through. E-mail between the same recipients may never take the same route.
Threat Assessment Anyone with access to any of the servers through which our e-mail passes can read it. Anyone with a minimum of technical expertise can forge e-mail to impersonate any sender (or a fictitious sender). We are vulnerable to data theft, data vandals, and electronic imposters.
Negating the Threat Public Key (or Asymmetric) Encryption: Permits only the intended recipient to recover the message, no matter who sees the e-mail. Allows positive authentication, so that the recipient can verify the sender’s identity. “ Conferable Trust” extends these benefits to any two parties that need to exchange secure e-mail,  even if they have never met .
Public Key Encryption Users generate a key pair: A Public Key that is widely distributed (the wider the better); A Private Key that is never revealed. Each key in the pair is the inverse cryptographic function of its mate.  It is impossible to deduce the private key by analysis of the public key.
Public Key Protocol Alice and Bob meet to exchange public keys. Alice “locks” messages for Bob with her copy of Bob’s public key. Bob uses his private key to “unlock” the message encrypted with his public key. Alice Eve Bob
Cryptographic Signatures Messages “locked” with a public key are encrypted to the recipient. Messages “locked” with a private key are digitally signed by the sender. Encrypted messages are recovered with recipient’s private key. Signatures are verified with sender’s public key.
Key Management People cannot always meet to swap keys. Vulnerable to “man in the middle” attack: Eve intercepts keys and substitutes her own; Eve can recover messages intended for Alice and Charlie, and still evade detection. Alice Charlie Eve
Conferring Trust with a Signature Exchange keys through a mutually trusted third party: Charlie and Alice each hold a copy of Trent’s public key; Trent signs Charlie’s and Alice’s public key with his private key; Charlie and Alice each verify Trent’s signature using Trent’s public key. Alice Charlie Trent Eve
Key Distribution Key servers on the Internet are free public key repositories. Users upload their public keys so they can receive secure e-mail from others Users can download keys for sending secure e-mail to the keys’ owners. Users can download keys with which to authenticate signatures.
The Good News ... You don’t have to remember much of this. SMSI has selected and will purchase for you software that handles all of these tasks almost automatically. Today, Andrew will hand you a copy of SMSI’s corporate public key, which will act as “Trent” in our example. The software can harvest the keys of SMSI employees and associates off of the key servers. Ensure each key you download is signed by SMSI. Verify the SMSI signature using the key Andrew gives you.
The Bad News Encryption systems fail their users because of poor key management. Pick a good pass phrase. Always verify signatures. Encrypt your private key when you’re not using it. Keep a back-up of your keys in a safe place! If possible, try and limit physical access to your computer.
Has it ever been cracked? Yes. Two RSA-encrypted messages have been cracked publicly. The first took an estimated 5000 MIPS-years of computing time. The second took about 1300. Both compromised keys were extremely weak, consisting of fewer than 500 bits. Today we use 2,048 bit keys (or stronger), and a more secure algorithm, called Diffie-Hellmann. These efforts each cracked only a single RSA key. Nothing was discovered that could cause any other keys to become less secure.
If you really want to know ... Find two very large primes, p and q. Find n=pq (the public modulus). Choose e, such that e < n and relatively prime to (p-1)(q-1). Compute d such that ed=1[mod (p-1)(q-1)]. e is the public exponent and d is the private one. The public key is (n,e), and the private key is (n,d). To encrypt, divide the target message into blocks smaller than n and perform modular exponentiation: c=m^e mod n Decryption is the inverse operation: m=c^d mod n … et Voila!

More Related Content

PDF
How Encryption Works
 
PPTX
Cryptography
PDF
Communication Security
PPTX
End to End Encryption in 10 minutes -
PPT
Encryption for Everyone
PDF
無題 1
PPTX
Encryption
PPT
Digital signature service in noida
How Encryption Works
 
Cryptography
Communication Security
End to End Encryption in 10 minutes -
Encryption for Everyone
無題 1
Encryption
Digital signature service in noida

What's hot (8)

PDF
ODP
Network Security
PPT
Network Security
PDF
PBU-Intro_to_PGP
PPTX
Group 6
PPTX
Cryptography
PDF
$ii7oi5i-12
PPTX
Cryptography
Network Security
Network Security
PBU-Intro_to_PGP
Group 6
Cryptography
$ii7oi5i-12
Cryptography
Ad

Viewers also liked (20)

PDF
Exadata 11-2-overview-v2 11
PPT
C:\Fakepath\Viviendas Bioclimaticas
PDF
2 d4.poslovna analitika_160410
PDF
What does-it-take-to-follow-christ
PPTX
КОМПЬЮТЕРНОЕ ОБЕСПЕЧЕНИЕ СОВРЕМЕННОГО ОФИСА
PDF
Jehovah Jireh msg on 22nd Apr 2012 by henry cheah
PDF
Intercession 17 Nov 2013 for the Philipines
PDF
Mercury instructions
PPT
Контрольная закупка
PPT
Sales Pad Overview
PPTX
Currency
PPTX
生活拍樂趣 (二) 拍出你的美食樂趣
PPT
Личные Интернет- кабинеты участников НП "СРО "ОПСР"
PPT
Canadian Border Crossing for Prescription Drugs
PDF
4 god's keys to possess our inheritance
PPSX
Neomax It Specialist[1]
PDF
Sreejith Sr.Software Engineer Java J2 Ee 4 Years
PPT
Shannon Cannes Presentation
PPT
Adobe Flash Platform for the Enterprise
PDF
Junk E-mail in Maryland
Exadata 11-2-overview-v2 11
C:\Fakepath\Viviendas Bioclimaticas
2 d4.poslovna analitika_160410
What does-it-take-to-follow-christ
КОМПЬЮТЕРНОЕ ОБЕСПЕЧЕНИЕ СОВРЕМЕННОГО ОФИСА
Jehovah Jireh msg on 22nd Apr 2012 by henry cheah
Intercession 17 Nov 2013 for the Philipines
Mercury instructions
Контрольная закупка
Sales Pad Overview
Currency
生活拍樂趣 (二) 拍出你的美食樂趣
Личные Интернет- кабинеты участников НП "СРО "ОПСР"
Canadian Border Crossing for Prescription Drugs
4 god's keys to possess our inheritance
Neomax It Specialist[1]
Sreejith Sr.Software Engineer Java J2 Ee 4 Years
Shannon Cannes Presentation
Adobe Flash Platform for the Enterprise
Junk E-mail in Maryland
Ad

Similar to E-mail and Encryption (20)

PDF
Email security
PPTX
Cryptography
PDF
How encryption works
PPT
Rothke Info Security Canada 2007 Final
PPT
What is Encryption
PDF
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
PPT
Network Security Primer
PPT
Secure Communication (Distributed computing)
PPT
Cryptography
PPT
Cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Security
PPTX
Fundamental Concept of Cryptography in Computer Security
PPT
Pki &amp; Personal Digital Certificates, The Key To Securing Sensitive Electr...
PPT
Pki & personal digital certificates, the key to securing sensitive electronic...
PPTX
Encryption techniques
PPT
1329 n 9460
PPT
A+ Update Endpoint Encryption
PPTX
Cyptography and network security unit 3-1
Email security
Cryptography
How encryption works
Rothke Info Security Canada 2007 Final
What is Encryption
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Network Security Primer
Secure Communication (Distributed computing)
Cryptography
Cryptography
Cryptography and Network Security Principles.pptx
Security
Fundamental Concept of Cryptography in Computer Security
Pki &amp; Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & personal digital certificates, the key to securing sensitive electronic...
Encryption techniques
1329 n 9460
A+ Update Endpoint Encryption
Cyptography and network security unit 3-1

E-mail and Encryption

  • 1. E-mail and Encryption Ensuring secure communications in a distributed corporate environment.
  • 2. The Problem The Internet is a distributed network. No one machine controls access to all others. E-mail travels through several servers before arriving at its destination. Every e-mail is stored for a time on every server it passes through. E-mail between the same recipients may never take the same route.
  • 3. Threat Assessment Anyone with access to any of the servers through which our e-mail passes can read it. Anyone with a minimum of technical expertise can forge e-mail to impersonate any sender (or a fictitious sender). We are vulnerable to data theft, data vandals, and electronic imposters.
  • 4. Negating the Threat Public Key (or Asymmetric) Encryption: Permits only the intended recipient to recover the message, no matter who sees the e-mail. Allows positive authentication, so that the recipient can verify the sender’s identity. “ Conferable Trust” extends these benefits to any two parties that need to exchange secure e-mail, even if they have never met .
  • 5. Public Key Encryption Users generate a key pair: A Public Key that is widely distributed (the wider the better); A Private Key that is never revealed. Each key in the pair is the inverse cryptographic function of its mate. It is impossible to deduce the private key by analysis of the public key.
  • 6. Public Key Protocol Alice and Bob meet to exchange public keys. Alice “locks” messages for Bob with her copy of Bob’s public key. Bob uses his private key to “unlock” the message encrypted with his public key. Alice Eve Bob
  • 7. Cryptographic Signatures Messages “locked” with a public key are encrypted to the recipient. Messages “locked” with a private key are digitally signed by the sender. Encrypted messages are recovered with recipient’s private key. Signatures are verified with sender’s public key.
  • 8. Key Management People cannot always meet to swap keys. Vulnerable to “man in the middle” attack: Eve intercepts keys and substitutes her own; Eve can recover messages intended for Alice and Charlie, and still evade detection. Alice Charlie Eve
  • 9. Conferring Trust with a Signature Exchange keys through a mutually trusted third party: Charlie and Alice each hold a copy of Trent’s public key; Trent signs Charlie’s and Alice’s public key with his private key; Charlie and Alice each verify Trent’s signature using Trent’s public key. Alice Charlie Trent Eve
  • 10. Key Distribution Key servers on the Internet are free public key repositories. Users upload their public keys so they can receive secure e-mail from others Users can download keys for sending secure e-mail to the keys’ owners. Users can download keys with which to authenticate signatures.
  • 11. The Good News ... You don’t have to remember much of this. SMSI has selected and will purchase for you software that handles all of these tasks almost automatically. Today, Andrew will hand you a copy of SMSI’s corporate public key, which will act as “Trent” in our example. The software can harvest the keys of SMSI employees and associates off of the key servers. Ensure each key you download is signed by SMSI. Verify the SMSI signature using the key Andrew gives you.
  • 12. The Bad News Encryption systems fail their users because of poor key management. Pick a good pass phrase. Always verify signatures. Encrypt your private key when you’re not using it. Keep a back-up of your keys in a safe place! If possible, try and limit physical access to your computer.
  • 13. Has it ever been cracked? Yes. Two RSA-encrypted messages have been cracked publicly. The first took an estimated 5000 MIPS-years of computing time. The second took about 1300. Both compromised keys were extremely weak, consisting of fewer than 500 bits. Today we use 2,048 bit keys (or stronger), and a more secure algorithm, called Diffie-Hellmann. These efforts each cracked only a single RSA key. Nothing was discovered that could cause any other keys to become less secure.
  • 14. If you really want to know ... Find two very large primes, p and q. Find n=pq (the public modulus). Choose e, such that e < n and relatively prime to (p-1)(q-1). Compute d such that ed=1[mod (p-1)(q-1)]. e is the public exponent and d is the private one. The public key is (n,e), and the private key is (n,d). To encrypt, divide the target message into blocks smaller than n and perform modular exponentiation: c=m^e mod n Decryption is the inverse operation: m=c^d mod n … et Voila!