Enhancing Email Security with S/MIME Chuck Connell, www.chc-3.comwww.chc-3.com www.DominoAdministration.comwww.DominoAdministration.com, www.DominoSecurity.org.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Principles of Information Security, 2nd edition1 Cryptography.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Cryptography
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Cryptography 101 Frank Hecker
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Masud Hasan Secue VS Hushmail Project 2.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Digital Signatures, Message Digest and Authentication Week-9.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
K E Y Plain text Cipher text Encryption Decryption
Security at the Application Layer: PGP and S/MIME
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Lecture 10: Network Security.
Presentation transcript:

Enhancing Security with S/MIME Chuck Connell,

Introduction  Worked at Lotus from 90 to 95  Managed Notes C API team, architect in (short-lived) “enterprise applications” group, business partner technical liaison  Began my own business in 1995  Notes/Domino consulting, writing, teaching CS at Boston University  Security expert at

Outline  What is S/MIME?  Why do we care about it?  Secrecy, authentication, and integrity  Cryptography primer, including public key techniques and certificates  How S/MIME works  Where S/MIME is used in Notes/Domino  How to use S/MIME

Audience  Experienced with Notes, Domino, general topics  Used some encryption/privacy tools  Not a security expert or mathematician (will skip gory details)  My goal is to explain a fairly complex topic to a generally knowledgeable computer audience

What is S/MIME?  When was first developed, people could only send plain text messages  MIME was developed in early 90s to allow people to send pictures, sound, programs and general attachments -- “Multipurpose Internet Mail Extension”  MIME has no security features, can be read along its route or forged (easily)  S/MIME is a secure version of MIME

What does S/MIME give us?  Secrecy – Only intended recipient can read the message. (A thick envelope and trustworthy couriers.)  Authentication – Recipient knows the message came from the apparent sender. (An ink signature that you recognize.)  Integrity – Recipient knows the message was not changed en route. (Un-erasable ink in a letter.)

Cryptography primer  Secret key (a.k.a symmetric cipher)  Public key (a.k.a. asymmetric cipher) –Secrecy –Authentication –Secrecy and authentication  Hashing (a.k.a. message digest)  Public key certificate (X.509)

Symmetric cipher  Dates back thousands of years  A “key” is scrambled into the message in a way that makes the message unreadable  Scrambling method can be pencil and paper, mechanical, or mathematical  Key can be numbers, letters, text from a book  Only way to read the message (easily) is to unscramble it with the same key  Sender and receiver must exchange key somehow

Symmetric cipher

Public key cryptography (PKC)  Invented in 1970s  There are two keys; one public for all to see, the other kept secret to one person  Keys are pairs of large numbers, related to prime number theory  Message is scrambled with one key; only unscrambled easily with the other key  Can be used for secrecy, authentication, or both

Public key cryptography

PKC for secrecy only  Chuck wants to send message that only Katie can read  Ciphertext = PKC(plaintext, katie’s public key)  Plaintext = PKC(ciphertext, katie’s private key)  Only Katie can decrypt the message, and Chuck does not have to send her a key

PKC for authentication only  Chuck wants to send message to Katie and prove it is from him  Ciphertext = PKC(plaintext1, chuck’s private key)  Chuck sends ciphertext and plaintext1  Plaintext2 = PKC(ciphertext, chuck’s public key)  Katie compares plaintext1 (sent) with plaintext2 (decrypted)  If they match, only Chuck could have sent the message.

PKC for secrecy and authentication  Chuck wants to send secret message to Katie and prove it is from him  Cipher1 = PKC(plaintext1, chuck’s private key)  Cipher2 = PKC(Cipher1 and plaintext1, katie’s public key)  Chuck sends Cipher2  Cipher1 and Plaintext1 = PKC(Cipher2, katie’s private key)  Plaintext2 = PKC(Cipher1, chuck’s public key)  Katie compares plaintext1 (sent) with plaintext2 (decrypted)

Hashing  A one-way operation that is hard to undo  Often results in a shorter message, which is called a message digest  Example: “Let’s have breakfast at Dunkin Donuts”  “h7tfd8Fr”

Public key certificate  But, there is a problem with PKC… How does Katie know it is really Chuck sending her the message. Someone could pretend to be Chuck.  Public key certificates solve this problem (mostly)  A public key certificate contains –A person’s name –That person’s public key –Name of a trusted certifying authority (CA) –Digital signature of the CA, using their private key  Certificate can be verified with CA’s public key  X.509 is most common format

Questions ?

So what is S/MIME?  S/MIME puts all these techniques together to create a practical, efficient, reasonably secure protocol  Standard (symmetric) cipher – RC2 or TripleDES  Public key (asymmetric) cipher – RSA  Hashing – SHA-1 or MD5  (Mathematical details found in references)

S/MIME for secrecy only 1. Chuck’s program creates a random key (session key) to be used in a symmetric cipher. 2. Chuck’s program encrypts the message with the symmetric cipher and session key. 3. Chuck’s program encrypts the session key with PKC and Katie's public key. 4. Chuck’s program creates a package of: encrypted message, encrypted session key, his X.509 certificate, names of encryption algorithms.

S/MIME for secrecy, continued 5. Chuck’s program sends package to Katie. This is an S/MIME message. 6. Katie’s program receives package. 7. Katie's program uses her private key (and named PKC method) to decrypt the session key. 8. Katie’s program uses session key (and named symmetric cipher) to decrypt the message.

S/MIME for authentication only 1. Chuck’s program uses hash function to create message digest 2. Chuck’s program encrypts message digest with PKC and his private key 3. Chuck’s program creates a package of: original message, encrypted message digest, his X.509 certificate, names of encryption algorithms 4. Chuck’s program sends package to Katie. 5. Katie's program receives package

S/MIME for authentication, continued 6. Katie’s program verifies Chuck’s X.509 certificate by testing signature of CA 7. Katie’s program gets Chuck’s public key from his certificate 8. Katie's program uses Chuck’s public key to decrypt the message digest 9. Katie's program independently computes the message digest, using the same hash function 10. Katie's program compares the two message digests to verify sender and message integrity

S/MIME for secrecy and authentication 1. Message is authenticated just as shown above 2. Authenticated package is made secret, just as shown above 3. Secret package is sent to recipient 4. Receiver uses his/her private key to decrypt session key 5. Receiver uses session key to decrypt rest of secret package, yielding authenticated message 6. Receiver authenticates message, just as shown above

Questions ?

So S/MIME is used for Notes mail?  No! For pure Notes (Notes and Domino) S/MIME is not needed. Notes has its own, similar, methods.  S/MIME is used whenever pure Notes is not available –From Notes, through Domino, to other –From Notes, through standard server, to any –From other , through Domino, to any

Using S/MIME  Get a digital identification  Set up Domino server for S/MIME  Use S/MIME with general clients  Use S/MIME with Notes

Getting a digital identification  A digital ID is –Your name –Public/private key pair –Public key certificate for this ID  Most popular vendors are and  Thawte is free, but VeriSign is only $15/year and simpler to use

Setting up Domino for S/MIME  Do nothing! (other than standard Internet mail set up)  (If anyone is aware of special settings that are required, please let me know.)

S/MIME with standard clients (e.g. Outlook Express)  If you got your digital ID on this computer, it is already installed (Can see the ID with Start / Settings / Control Panel / Internet Options / Content / Certificates)  For secrecy, just press Encrypt  For authentication, just press Sign  When receiving a message, you will see security symbols near the attachment paperclip

Using S/MIME with Notes (Assuming digital ID already on Windows computer) 1. Export digital ID from Windows 2. Import digital ID to Notes ID file 3. Make sure this certificate will be used for Internet mail from Notes 4. Use digital ID as you send and receive Demonstration…

For further reading  Excellent online overview of cryptography:  Cryptography and Network Security by William Stallings – Good general security textbook.  S/MIME Internet task force:  Relationship between S/MIME and PGP/MIME: