Electronic Mail Security - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Electronic Mail Security

Description:

Electronic Mail. Most heavily used network-based application ... Preferable to sign uncompressed message - store them together for future verification ... – PowerPoint PPT presentation

Number of Views:76
Avg rating:3.0/5.0
Slides: 16
Provided by: far1
Category:
Tags: electronic | in | mail | security | sign

less

Transcript and Presenter's Notes

Title: Electronic Mail Security


1
Electronic Mail Security
  • CSCE 590 Farkas
  • November 15, 2000

2
Electronic Mail
  • Most heavily used network-based application
  • Used across different architectures and platforms
  • Send e-mail to others connected directly or
    indirectly to the Internet regardless of host
    operating systems and communication protocols
  • NEED
  • Authentication
  • Confidentiality

3
Secure E-mail Approaches
  • PGP Pretty good Privacy
  • PEM Privacy-Enhanced Mail

4
Pretty Good Privacy
  • Phil Zimmermann
  • Confidentiality and authentication for
  • Electronic mail and
  • Storage applications

5
PGP Evolution
  • Best cryptographic algorithms
  • Integrate these algorithms such that
  • Independent of operating system and processor
  • Based on a small set of commands
  • Make it available through the Internet
  • Agreement with a company to provide compatible,
    low-cost commercial version of PGP

6
PGP - Usage
  • PGP became widely used within a few years
  • Available worldwide for different platforms
  • Based on proven secure algorithms (RSA, IDEA,
    MD5)
  • Wide range of applicability
  • Was not developed or controlled by government
    standards

7
Why PGP?
  • Protect privacy
  • I dont need encryption! I dont need
    privacy.
  • Interception transmission to destinations
  • Transparent mailbox (dial-up connection)
  • You may not but other party may want privacy
  • Commercial privacy
  • Customers data
  • Company data
  • Users profiling
  • Signed messages
  • Authentication
  • Integrity

?
8
How PGP Works?
  • Five services
  • Confidentiality RSA, IDEA
  • Authentication RSA, MD5
  • Compression ZIP
  • E-mail compatibility Radix 64 conversion
  • Segmentation

9
Authentication
KAprivate
H(M)
KAprivateH(M)
E
H
H
M
M
c
Compare
M
D
concatenate
KAprivateH(M)
KApublic
Receiver B
Sender A
10
Confidentiality
Ksession
Ksession(M)
Ksession(M)
M
E
E
concatenate
M
c
Ksession
E
D
KBpublic (Ksession)
Ksession
KBpublic (Ksession)
KBpublic
KBprivate
Receiver B
Sender A
11
Confidentiality and Authentication
Sender A
KAprivate
KsMH(M)
KBpublic
E
Ks
M
H
E
M
E
c
c
KAprivateH(M)
KBpublic (Ks)
H
Compare
D
D
Ks
D
KBprivate
KApublic
Receiver B
12
Compression
  • Usually after signature and before encryption
  • Preferable to sign uncompressed message -gt store
    them together for future verification
  • PGPs compression algorithm is not deterministic
  • Encryption after compression strengthen
    cryptographic security (less redundancy)

13
E-mail Compatibility
  • PGP encryption arbitrary 8-bit binary stream
  • Several e-mail system ASCII text
  • PGP converts the binary stream to a stream of
    printable ASCII characters
  • Expands the message by 33
  • Converts everything, regardless of content (even
    ASCII characters)

14
Segmentation and Reassembly
  • E-mail restriction on maximum message length
  • Long messages broken into segments
  • Segments are mailed separately
  • PGP automatically divides a long message
  • Segmentation is done after all other processing
  • Receiving PGP reassembles the original message

15
Reading assignment
  • Handout on PGP p. 360-383
  • Handout on PEM p. 383-387
Write a Comment
User Comments (0)
About PowerShow.com