S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Architecture of SMTP, POP, IMAP, MIME.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Web Services Security XML Encryption, XML Signature and WS-Security.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
ITA, , 7-Secure .pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA)
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Electronic Mail Security
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic mail security. Outline Pretty good privacy S/MIME.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Pretty Good Privacy (PGP) Security for Electronic .
1 Lecture 19: PEM and S/MIME history PEM –establishing keys –public key hierarchy –message structure –message headers –encryption and integrity protection.
ECE-8813 / CS Prof. John A. Copeland fax Office:
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security
K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College
Security is one of the most widely used and regarded network services
Unit 3 Section 6.4: Internet Security
ASN.1: Introduction Zdeněk Říha.
S/MIME T ANANDHAN.
MAIL AND SECURITY PERTEMUAN 13
Security at the Application Layer: PGP and S/MIME
(free certificate not available)
ELECTRONIC MAIL SECURITY
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
ELECTRONIC MAIL SECURITY
William Stallings Data and Computer Communications
….for authentication and confidentiality PGP
Presentation transcript:

S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang

Basic 4 What is S/MIME? 4 Secure/Multipurpose Internet Mail Extensions 4 How does it work? 4 Basically, it is a package in which there is a CMS object.

Before We start...

Several Definitions 4 7-bit data: Text data with lines less than 998 characters long, where none of the characters have the 8th bit set, and there are no NULL characters. and occur only as part of a end of line delimiter.

Continued bit data: Text data with lines less than 998 characters, and where none of the characters are NULL characters. and occur only as part of a end of line delimiter. 4 Binary data: Arbitrary data.

Continued... 4 ASN.1 Abstract Syntax Notation number One is a standard that defines a formalism for the specification of abstract data types.standard 4 An Example: Person ::= SET { name IA5String, age INTEGER female BOOLEAN }.

Continued... 4 Encoding: BER (Basic Encoding Rules) vs. DER (Distinguished Encoding Rules)

Continued... 4 An Example: The BER encoding (in hexadecimal) of the instance "Maggie", 4, TRUE of Person is: 4 SET IA5String M a g g i e INTEGER 4 BOOLEAN TRUE FF

Continued... 4 Authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit.

Continued... 4 Digital Signature: Using a symmetric encryption algorithm such as MD5 to digest the message one wants to sign first. Then encrypting the output of that symmetric algorithm with signer’s private key.

Continued… 4 Digital Envelope: A type of security that uses two layers of encryption to protect a message. First, the message itself is encoded using symmetric encryption, and then the key to decode the message is encrypted using public key encryption.

Introduction to MIME 4 What is MIME? 4 It is an encoding standard for that allows non-text files like graphics, sound clips, etc., to be attached to regular text . Your program will encode these binary files and change them into text files. When the is sent, your program notifies the recipient program of the MIME encoding standard used, and in effect sends instructions as to how to put the file back into its original form.

Continued... 4 MIME Entity: A MIME entity may be a sub- part, sub-parts of a message, or the whole message with all its sub- parts. A MIME entity that is the whole message includes only the MIME headers and MIME body, and does not include the RFC-822 headers.822

Let’s start now

Introduction to CMS 4 What is CMS? The Cryptographic Message Syntax describes an encapsulation syntax for data protection. It supports digital signatures, message authentication codes, and encryption.

Continued... 4 Basically, there are six content types defined in the RFC But you can define more types yourself. 4 The six basic types are: data, signed-data, enveloped-data, digested-data, encrypted- data, and authenticated-data.

Continued -- General Syntax 4 The CMS object is defined by ASN.1 like: ContentInfo ::= SEQUENCE { contentType ContentType, content [0] EXPLICIT ANY DEFINED BY contentType } ContentType ::= OBJECT IDENTIFIER

Simple Introduction to some Type 4 SignedData Type: The signed-data content type consists of a content of any type and zero or more signature values. Any number of signers in parallel can sign any type of content. The typical application of the signed-data content type represents one signer's digital signature on content of the data content type. Another typical application disseminates certificates and certificate revocation lists (CRLs).

Continued... 4 Enveloped-data Content Type: The enveloped-data content type consists of an encrypted content of any type and encrypted content-encryption keys for one or more recipients. The combination of the encrypted content and one encrypted content-encryption key for a recipient is a "digital envelope" for that recipient. Any type of content can be enveloped for an arbitrary number of recipients using any of the three key management techniques for each recipient.

Continued... 4 The typical application of the enveloped- data content type will represent one or more recipients' digital envelopes on content of the data or signed-data content types.

Continued... 4 Digested-data Content Type: The digested-data content type consists of content of any type and a message digest of the content. Typically, the digested-data content type is used to provide content integrity, and the result generally becomes an input to the enveloped-data content type.

Continued... 4 Encrypted-data Content Type: The encrypted-data content type consists of encrypted content of any type. Unlike the enveloped-data content type, the encrypted-data content type has neither recipients nor encrypted content- encryption keys. Keys must be managed by other means. The typical application of the encrypted- data content type will be to encrypt the content of the data content type for local storage, perhaps where the encryption key is a password.

Continued... 4 Authenticated-data Content Type: The authenticated-data content type consists of content of any type, a message authentication code (MAC), and encrypted authentication keys for one or more recipients. The combination of the MAC and one encrypted authentication key for a recipient is necessary for that recipient to verify the integrity of the content. Any type of content can be integrity protected for an arbitrary number of recipients.

Creating S/MIME Messages

Preparing the MIME Entity for Signing or Enveloping 4 Step 1. The MIME entity is prepared according to the local conventions. Step 2. The leaf parts of the MIME entity are converted to canonical form. Step 3. Appropriate transfer encoding is applied to the leaves of the MIME entity

The application/pkcs7-mime Type: 4 The application/pkcs7-mime type is used to carry CMS objects of several types including envelopedData and signedData.

Continued... 4 The name and filename Parameters: The sender can send three filename extension which are:.p7m,.p7c and.p7s. The purpose of these file names are: 1. It is a easy way to store the S/MIME objects in the local disk;

Continued When a MIME entity of type application/pkcs7- mime (for example) arrives at a gateway that has no special knowledge of S/MIME, it will default the entity's MIME type to application/octet-stream and treat it as a generic attachment, thus losing the type information. However, the suggested filename for an attachment is often carried across a gateway. This often allows the receiving systems to determine the appropriate application to hand the attachment off to, in this case a stand-alone S/MIME processing application.

Continued... 4 The smime-type parameter: The application/pkcs7-mime content type defines the optional "smime- type" parameter. The intent of this parameter is to convey details about the security applied (signed or enveloped) along with information about the contained content.

Creating an Enveloped-only Message 4 Step 1. The MIME entity to be enveloped is prepared. 4 Step 2. The MIME entity and other required data is processed into a CMS object of type envelopedData. In addition to encrypting a copy of the content-encryption key for each recipient, a copy of the content encryption key SHOULD be encrypted for the originator and included in the envelopedData. 4 Step 3. The CMS object is inserted into an application/pkcs7-mime MIME entity.

Creating a Signed-only Message 4 There are two formats for signed messages defined for S/MIME: application/pkcs7- mime with SignedData, and multipart/signed. 4 Messages signed using the multipart/signed format can always be viewed by the receiver whether they have S/MIME software or not.

Continued... 4 Signing Using application/pkcs7-mime with SignedData Step 1. The MIME entity is prepared Step 2. The MIME entity and other required data is processed into a CMS object of type signedData Step 3. The CMS object is inserted into an application/pkcs7-mime MIME entity

Registration Requests 4 A sending agent that signs messages MUST have a certificate for the signature so that a receiving agent can verify the signature. There are many ways of getting certificates, such as through an exchange with a certificate authority, through a hardware token or diskette, and so on.

References