Masud Hasan 03-60-475 SecueEmail VS Hushmail Project 2.

Slides:



Advertisements
Similar presentations
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Advertisements

SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
6/3/2015topic1 Web Security Qiang Yang Simon Fraser University Thanks: Francis Lau (HKU)
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Guide to Operating System Security Chapter 10 Security.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
CSCI 6962: Server-side Design and Programming
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Electronic Mail Security
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Secure Socket Layer (SSL)
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
(or ?) Short for Electronic Mail The transmission of messages over networks.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Security fundamentals Topic 9 Securing internet messaging.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Security is one of the most widely used and regarded network services
SSL Certificates for Secure Websites
Secure Sockets Layer (SSL)
Meganet Corporation VME Mail 2004
S/MIME T ANANDHAN.
Using SSL – Secure Socket Layer
Electronic Payment Security Technologies
Presentation transcript:

Masud Hasan Secue VS Hushmail Project 2

Secure & Hushmail It uses Digital Certificate combined with S/MIME capable clients to digitally sign and encrypt E- mail It uses Digital Certificate combined with OpenPGP capable clients to digitally sign and encrypt E- mail

Two Basic Features – The two basic features of security are privacy (only the intended recipient can read the message) and authentication (the recipient can be assured of the identity of the sender). The technical capabilities for these functions has been known for many years, but they have only been applied to Internet mail recently. – Reality Check: Security experts claim users encrypt only about one in every 50 to 100 of their messages.

Goal of this Project – Learning Hushmail (PGP based secure ) – Compare Hushmail with Secure (S/Mime based) – Which one we should use to secure our ? – Technical difference between those 2 protocols. – Difference in Algorithm, Mechanism used.

Hushmail – How it works As part of enrollment, HushMail generates a public/private key pair for each user. The private key is encrypted with a pass-phrase and, along with the public key, stored on the HushMail server. When a HushMail user wishes to send a private message, a Java applet on the user's PC will request his password. The password is securely hashed, and part of the hash is sent to the HushMail server to validate the user. If the user is authenticated, the HushMail server sends the user's plaintext public key and encrypted private key to the Java applet at the user's machine. The applet symmetrically decrypts the private key and uses it for digital signatures.

Hushmail – How it works messages and attachments are symmetrically encrypted using a unique session key for each message. The session key is encrypted using a HushMail recipient's public key, and included in the message before transmission. When a recipient reads , a Java applet decrypts the encrypted message (and attachments). If the message is digitally signed, the Java applet downloads the sender's public key and uses it to verify the sender.

Features – Enhanced Spam Control – Webmail Updates – File Sharing – IMAP Access – External POP3

OnSite System Requirements Browser: IE 5.0+, Netscape 7.0+ OS: Windows/Linux Java Enabled: MSVM/SUN Hushmail for Outlook requires: Microsoft Office 2000, Microsoft Office XP, or Microsoft Office It also requires that Outlook's “ Collaboration Data Objects ” be installed.

OnSite Installation tips Tips for Getting This Application Working in Internet Explorer: Set Your Security Settings to Medium. The most common problem Internet Explorer users have with this application is that they set the security settings on their browser too high, disabling essential features such as JavaScript. This application recommends a security setting of "Medium".

OnSite Installation Steps Run the Setup executable (I recommend that you set up your address in Outlook prior to installation) Accept License Agreement Complete Installation

OnSite Outlook Configuration Open Microsoft Outlook. Click the Hushmail icon on the Microsoft Outlook toolbar. Click the Add button. Specify whether you would like to digitally sign your outgoing mail.

OnSite Continues…..

OnSite Continues…..

OnSite Secure VS Hushmail Secure uses S/MIME. Hushmail uses OpenPGP. Both the protocols are designed to perform the same task. However, they are not compatible with each other. The key distinguishing factor of these competing protocol is not the algorithm used to encrypt, but the technology used to establish the trust.

OnSite Trust Establishment Hushmail defines trust: Through a “Web of Trust” which places the burden of trust on the end user.It’s a transitive relationship. If A trust B, and B trust C Then A will trust C Secure defines trust: Through a certificate authority (CA ) to establish trust. Every user is issued a certificate that contains his public key and is signed by a CA. Because CA is trusted third party, trust is automatically established among users.

OnSite Continues… Secure follows X.509 standard format for digital signatures which can be only issued by a CA. Open PGP supports not X.509, but rather a digital certificate format developed by PGP Inc. Note: Industry Analyst say big corporations want the extra level of authority a CA brings to the table, as well as the better established X.509 digital certificate. (also include SSL features for browsers)

OnSite Continues… Being said that, Users want encryption and digital certificate to be as simple as hitting the send button to shoot a message over the internet. Hush mail has easier user implementation than Secure . The algorithm used by both the tools are equally strong. None of the Algorithm have been broken mathematically.

OnSite Bottom line…. The bottom line is both forms of trust the S/MIME’s third party CA and OpenPGP’s Web of trust are viable. However, it’s a pity that they don’t “trust” each other enough to work together. Brighter Note: The evolution of both the protocols are now under the guidance of IETF working group.

OnSite Services/ Mechanisms and Algorithm Used Services in a security protocol SignaturesEncryption Hashing RSAAESSHAI

OnSite Conclusion I would consider doing my graduate studies in Computer Security. Thanks for listening and good luck for Final.

OnSite QUESTIONS Only easy ones will be answered! Kidding~~