SlideShare a Scribd company logo
Nadar Saraswathi College of arts
and science,Theni
DEPARTMENT OF CS & IT
NETWORK AND INTERNET SECURITY
Presented by
S.Vijayalakshmi – I Msc (IT)
Email security
INTRODUCTION
 email is one of the most widely used and regarded network service
 currently message content are not secure
may be inspected either in transit
or by suitably privileged user on destination system
EMAIL SECURITY REQUIREMENTS
 Confidentiality
 Authentication
 Integrity
 Non-repudiation
BASIC PHASE OF EMAIL
Basic Phase of Email
PRIVACY ENHANCED MAIL
PEM adopted by the Internet Architecture Board(LAB) to provide secure electronic
mail communication over the internet
Steps of PEM
canonical conversion
Digital signature
Encryption
Base 64 encoding
CANONICAL CONVERSIONS
PEM transforms each email message into an abstract canonical
representation. This means that regardless of the architecture and the
operating system of the sending and receiving computers, the email
message always travels in a uniform, independent format.
DIGITAL SIGNATURE
ENCRYPTION
BASE 64 ENCODING
PRETTY GOOD PRIVACY(PGP)
PGP provides a confidentiality and authentication service that can be
used for electronic mail and file storage application. A number of reasons
can be cited for this growth.
 availabel free worldwide.
 It is based on extremely secure algorithm.
 Wide range of applicability.
 Not developed by governmental organization.
OPERATIONAL DESCRIPTION
The actual operation of PGP, consists of five services: authentication,
confidentiality, compression, e-mail compatibility, and segmentation
AUTHENTICATION
1.Sender creates message
2.make SHA-1160-bit hash of message
3. attached RSA signed hash to message
4.receiver decrypts& recovers hash code
5.receiver verifies received message hash
CONFIDENTIALITY
1.Sender forms 128=bit random session key
2.encrypts message with session key
3.attaches session key encrypted with RSA
4.receiver decrypts& recovers session key
5.session key is used to decrypt message
CONFIDENTIALITY&AUTHENTICATION
 Can use both services on same message create signature & attach to message
encrypt both message & signature attach RSAEIG amal encrypted session key
COMPRESSION
 By default PGP compresses message after signing but before encrypting
-so can store uncompressed message& signature
-& because compression is non deterministic
 Uses ZIP compression algorithm
EMAIL COMPATIBILITY
 When using PGP will have binary data to send(encrypted message etc)
 However email was designed only for text
 Hence PGP must encode raw binary data into printable ASCII characters
 Uses radix-64 algorithm
-maps 3 bytes to 4 printable chars
-also appends a CRC
 PGP also segment messages if too big
PGP SESSION KEYS
 Need a session key for each message
-of varying sizes:56-bit DES,128-bit CAST or IDEA, 168-bit Triple –DES
 Generated using ANSI X12.17 mode
 Uses random inputs taken from previous uses and from keystroke timing of user
PGP PUBLIC & PRIVATE KEYS
 Since many public/private keys may be in use, need to identify which is actually
used to encrypt session key in a message.
-could send full public-key with every message
-but this is inefficient
 Rather use a key identifier based on key
-is least significant 64-bits of the key
-will very likely be unique
 Also use key ID in signature
PGP Message Format
PGP MESSAGE GENERATION
PGP MESSAGE RECEPTION
S/MIME(secure/Multipurpose Internet
Mail Extension)
 Security enhancement to MIME email
 -original Internet RFC822 email was text only
 -MIME provided support for varying content types and multi-part message
 -with encoding of binary data to textual form
 -S/MIME added security enhancement
 Have S/MIME support in many mail agents
 -eg MS outlook, Mozilla , Mac Mail etc
SIGNED MAIL
 1. The user writes the message as clear-text .
 2.The message digest is being calculated
(using SHA-1[2] or MD5[3])
 3.The message digest is being encrypted using the signer’s private key
(DSS[4] or RSA[5]).
SINGNED MAIL
ENCRYPTED MAIL
 1.The user writes the message as clear-text
 2.A random session key is being created(triple DES[6] or rc2[7])
 3.The message is being encrypted using the random session key.
 4. For every recipient ,the session key is being encrypted using the recipient’s
public key(DH[8] or RSA[5]).
Encrypted mail
S/MIME CRYPTOGRAPHIC ALGORITHMS
 Digital signature: DSS &RSA
 Hash functions: SHA-1 & MD5
 Session key encryption: EIG amal & RSA
 Message encryption: AES,Triple-DES, RC2/40 and other
 MAC:HMAC with SHA-1
S/MIME FUNCTION
 Enveloped data
-encrypted content and associated keys
 Signed data
-encoded message+ signed digest
 Clear –signed data
-clear text message+ encoded signed digest
 Signed &enveloped data
-nesting of signed& encrypted entities
Network security

More Related Content

PDF
Email security & threads
PPT
Email security
PDF
Electronic mail security
PPT
Email Security : PGP & SMIME
PPT
Celebrity Cricket League 2016 - http://ccl5.com/
PPTX
S/MIME & E-mail Security (Network Security)
PPTX
Information and data security email security
PPSX
Email Security
Email security & threads
Email security
Electronic mail security
Email Security : PGP & SMIME
Celebrity Cricket League 2016 - http://ccl5.com/
S/MIME & E-mail Security (Network Security)
Information and data security email security
Email Security

What's hot (19)

PPT
E-mail Security in Network Security NS5
PPT
The Security layer
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
PPTX
E mail security
PPTX
IP Security
PPT
Lecture 8 mail security
PPTX
Email Security Presentation
PPTX
Email security
PDF
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
PDF
Email security presentation
PPTX
Pretty good privacy
PDF
Network Security Applications
DOCX
S/MIME
PPTX
Using PGP for securing the email
PDF
8 Authentication Security Protocols
PPT
IP Security in Network Security NS6
PPT
Pretty good privacy
E-mail Security in Network Security NS5
The Security layer
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
E mail security
IP Security
Lecture 8 mail security
Email Security Presentation
Email security
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
Email security presentation
Pretty good privacy
Network Security Applications
S/MIME
Using PGP for securing the email
8 Authentication Security Protocols
IP Security in Network Security NS6
Pretty good privacy
Ad

Similar to Network security (20)

PPTX
module 4_7th sem_ Electronic Mail Security.pptx
PPT
computer netwok security Pretty Good Privacy PGP.ppt
PPT
chapter 15-Network and Security-By-MIT.ppt
PPT
ch15 (1).ppt
PPT
ch15.ppt
PPT
ch15.ppt
PDF
1682302951397_PGP.pdf
PPT
chap15 cryptography and network security.ppt
PPT
PGP.ppt
PDF
Email Security Pretty Good Privacy (PGP),Services Provided by PGP.pdf
PPT
S-MIMEemail-security.ppt
PDF
M.FLORENCE DAYANA/electronic mail security.pdf
PPT
E-mail Security.ppt
PDF
Network Security CS2
PPTX
Email security
PDF
BAIT1103 Chapter 5
PPTX
Email sec11
PDF
CS6004 CYBER FORENSICS
module 4_7th sem_ Electronic Mail Security.pptx
computer netwok security Pretty Good Privacy PGP.ppt
chapter 15-Network and Security-By-MIT.ppt
ch15 (1).ppt
ch15.ppt
ch15.ppt
1682302951397_PGP.pdf
chap15 cryptography and network security.ppt
PGP.ppt
Email Security Pretty Good Privacy (PGP),Services Provided by PGP.pdf
S-MIMEemail-security.ppt
M.FLORENCE DAYANA/electronic mail security.pdf
E-mail Security.ppt
Network Security CS2
Email security
BAIT1103 Chapter 5
Email sec11
CS6004 CYBER FORENSICS
Ad

More from SVijaylakshmi (13)

PPTX
client server computing.pptx
PPTX
small industries.pptx
PPTX
pseudo Color Image.pptx
PPTX
hive.pptx
PPTX
real Time data analysis.pptx
PPTX
Density based methods
PPTX
Reinforcement Learning
PPTX
Synchronization in distributed computing
PPTX
control structures
PPTX
Swing components
PPTX
Basic Traversal and Search Techniques
PPTX
Parallel language and compiler
PPTX
Basic Traversal and Search Techniques
client server computing.pptx
small industries.pptx
pseudo Color Image.pptx
hive.pptx
real Time data analysis.pptx
Density based methods
Reinforcement Learning
Synchronization in distributed computing
control structures
Swing components
Basic Traversal and Search Techniques
Parallel language and compiler
Basic Traversal and Search Techniques

Recently uploaded (20)

PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Testing WebRTC applications at scale.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Funds Management Learning Material for Beg
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Internet___Basics___Styled_ presentation
PPTX
artificial intelligence overview of it and more
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
introduction about ICD -10 & ICD-11 ppt.pptx
Digital Literacy And Online Safety on internet
PptxGenJS_Demo_Chart_20250317130215833.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Testing WebRTC applications at scale.pdf
Paper PDF World Game (s) Great Redesign.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Unit-1 introduction to cyber security discuss about how to secure a system
Funds Management Learning Material for Beg
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Internet___Basics___Styled_ presentation
artificial intelligence overview of it and more
The Internet -By the Numbers, Sri Lanka Edition
Introuction about WHO-FIC in ICD-10.pptx
international classification of diseases ICD-10 review PPT.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Tenda Login Guide: Access Your Router in 5 Easy Steps

Network security

  • 1. Nadar Saraswathi College of arts and science,Theni DEPARTMENT OF CS & IT NETWORK AND INTERNET SECURITY Presented by S.Vijayalakshmi – I Msc (IT)
  • 3. INTRODUCTION  email is one of the most widely used and regarded network service  currently message content are not secure may be inspected either in transit or by suitably privileged user on destination system
  • 4. EMAIL SECURITY REQUIREMENTS  Confidentiality  Authentication  Integrity  Non-repudiation
  • 7. PRIVACY ENHANCED MAIL PEM adopted by the Internet Architecture Board(LAB) to provide secure electronic mail communication over the internet Steps of PEM canonical conversion Digital signature Encryption Base 64 encoding
  • 8. CANONICAL CONVERSIONS PEM transforms each email message into an abstract canonical representation. This means that regardless of the architecture and the operating system of the sending and receiving computers, the email message always travels in a uniform, independent format.
  • 12. PRETTY GOOD PRIVACY(PGP) PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage application. A number of reasons can be cited for this growth.  availabel free worldwide.  It is based on extremely secure algorithm.  Wide range of applicability.  Not developed by governmental organization.
  • 13. OPERATIONAL DESCRIPTION The actual operation of PGP, consists of five services: authentication, confidentiality, compression, e-mail compatibility, and segmentation
  • 14. AUTHENTICATION 1.Sender creates message 2.make SHA-1160-bit hash of message 3. attached RSA signed hash to message 4.receiver decrypts& recovers hash code 5.receiver verifies received message hash
  • 15. CONFIDENTIALITY 1.Sender forms 128=bit random session key 2.encrypts message with session key 3.attaches session key encrypted with RSA 4.receiver decrypts& recovers session key 5.session key is used to decrypt message
  • 16. CONFIDENTIALITY&AUTHENTICATION  Can use both services on same message create signature & attach to message encrypt both message & signature attach RSAEIG amal encrypted session key
  • 17. COMPRESSION  By default PGP compresses message after signing but before encrypting -so can store uncompressed message& signature -& because compression is non deterministic  Uses ZIP compression algorithm
  • 18. EMAIL COMPATIBILITY  When using PGP will have binary data to send(encrypted message etc)  However email was designed only for text  Hence PGP must encode raw binary data into printable ASCII characters  Uses radix-64 algorithm -maps 3 bytes to 4 printable chars -also appends a CRC  PGP also segment messages if too big
  • 19. PGP SESSION KEYS  Need a session key for each message -of varying sizes:56-bit DES,128-bit CAST or IDEA, 168-bit Triple –DES  Generated using ANSI X12.17 mode  Uses random inputs taken from previous uses and from keystroke timing of user
  • 20. PGP PUBLIC & PRIVATE KEYS  Since many public/private keys may be in use, need to identify which is actually used to encrypt session key in a message. -could send full public-key with every message -but this is inefficient  Rather use a key identifier based on key -is least significant 64-bits of the key -will very likely be unique  Also use key ID in signature
  • 24. S/MIME(secure/Multipurpose Internet Mail Extension)  Security enhancement to MIME email  -original Internet RFC822 email was text only  -MIME provided support for varying content types and multi-part message  -with encoding of binary data to textual form  -S/MIME added security enhancement  Have S/MIME support in many mail agents  -eg MS outlook, Mozilla , Mac Mail etc
  • 25. SIGNED MAIL  1. The user writes the message as clear-text .  2.The message digest is being calculated (using SHA-1[2] or MD5[3])  3.The message digest is being encrypted using the signer’s private key (DSS[4] or RSA[5]).
  • 27. ENCRYPTED MAIL  1.The user writes the message as clear-text  2.A random session key is being created(triple DES[6] or rc2[7])  3.The message is being encrypted using the random session key.  4. For every recipient ,the session key is being encrypted using the recipient’s public key(DH[8] or RSA[5]).
  • 29. S/MIME CRYPTOGRAPHIC ALGORITHMS  Digital signature: DSS &RSA  Hash functions: SHA-1 & MD5  Session key encryption: EIG amal & RSA  Message encryption: AES,Triple-DES, RC2/40 and other  MAC:HMAC with SHA-1
  • 30. S/MIME FUNCTION  Enveloped data -encrypted content and associated keys  Signed data -encoded message+ signed digest  Clear –signed data -clear text message+ encoded signed digest  Signed &enveloped data -nesting of signed& encrypted entities