S/MIME v3.2 draft-ietf-smime-3850bis-00.txt draft-ietf-smime-3851bis-00.txt Sean Turner Blake Ramsdell.

Slides:



Advertisements
Similar presentations
Symmetric Message Authentication Codes Prof. Ravi Sandhu.
Advertisements

Public Key Infrastructure and Applications
Conventional Encryption: Algorithms
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Some New RSA Mechanisms for PKCS #11 Burt Kaliski, RSA Laboratories PKCS Workshop April 14, 2003.
Customized Network Security Protocols Cristina Nita-Rotaru and Jeffrey Seibert SPONSORED BY DOUBLE-TAKE SOFTWARE (Jan July 2009) Department of.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
HASH ALGORITHMS - Chapter 12
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter 3 Encryption Algorithms & Systems (Part C)
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Encryption Methods By: Michael A. Scott
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
PKI Processing with OpenSSL Rodney Thayer
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions J. Buchmann, E. Dahmen, A. Hülsing | TU Darmstadt |
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Bob can sign a message using a digital signature generation algorithm
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Electronic Mail Security
S/MIME Freeware Library IETF S/MIME WG 13 December 2000 Getronics Government Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Crypto Bro Rigby. History
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
DICOM Security Andrei Leontiev, M.S. Dynamic Imaging.
Exercises Information Security Course Eric Laermans – Tom Dhaene.
Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
CRYPTREC (Cryptography Research and Evaluation Committees) Office of IT Security Policy Ministry of Economy, Trade and Industry Japan.
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Hash Algorithms see similarities in the evolution of hash functions & block ciphers –increasing power of brute-force attacks –leading to evolution in algorithms.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography Fundamentals
Potential vulnerabilities of IPsec-based VPN
DCI – rump session CR ‘05 Jean-Jacques Quisquater DCI – rump session CR ‘05 Jean-Jacques Quisquater Digital Cinema System Specification V1.0 Jean-Jacques.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Secure Multipart Internet Mail (S/MIME) Working Group Tuesday, July 24, 2007 Afternoon Session III
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Allowed uses of Public Keys Jim Schaad Soaring Hawk Consulting.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
DIGITAL SIGNATURE ALGORITHM. The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186,
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Network Security: Lab#2 J. H. Wang Oct. 9, Objectives To learn to use message digests –MD5 To learn to use secure hash functions –SHA-1, SHA-2 To.
RSA Data Security, Inc. PKCS #13: Elliptic Curve Cryptography Standard Burt Kaliski RSA Laboratories PKCS Workshop October 7, 1998.
S/MIME Working Group Status Russ Housley November 2002 PLEASE SIGN THE BLUE SHEET.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Authenticated Identity
Dan Brown, Certicom Research November 10, 2004
S/MIME Working Group Agenda and Status
(free certificate not available)
Presentation transcript:

S/MIME v3.2 draft-ietf-smime-3850bis-00.txt draft-ietf-smime-3851bis-00.txt Sean Turner Blake Ramsdell

What’s Updated Mostly it’s about the algorithms Some minor edits and references updated Question: Should key size requirement be updated - it says bits.

DOCUMENTALGORITHM SENDINGRECEIVING Digest S/MIME v3.1SHA-1 MUSTSHA-1 MUST MD5 SHOULD S/MIME v3.2SHA-256 MUST SHA-1 SHOULD- SHA-256 MUST SHA-1 SHOULD- MD5 SHOULD- Signature S/MIME v3.1RSA with SHA-1 or DSA with SHA-1 MUST DSA MUST RSA MUST S/MIME v3.2RSA with SHA-256 MUST RSA with SHA-1 SHOULD- RSA-PSS with SHA-256 SHOULD+ ECDSA with SHA-256 SHOULD+ DSA with SHA-1 SHOULD- RSA with MD5 SHOULD- Same as Sending

DOCUMENTALGORITHM SENDINGRECEIVING Key Management S/MIME v3.1RSA MUST E-S D-H SHOULD Same as Sending S/MIME v3.2RSA MUST RSA-OAEP SHOULD+ ECDH SHOULD+ E-S D-H SHOULD- Same as Sending Content Encryption and Key Wrap S/MIME v3.1Triple DES MUST RC2 SHOULD AES 128 CBC SHOULD AES 192 CBC SHOULD AES 256 CBC SHOULD Same as Sending S/MIME v3.2AES 128 CBC MUST AES 192 CBC SHOULD+ AES 256 CBC SHOULD+ Triple DES SHOULD- Same as Sending