Chapter 15 Electronic Mail Security – Part II Data & Network Security Spring 2006 Dr. Jalili.

Slides:



Advertisements
Similar presentations
TOPIC : MIME (Multipurpose Internet Mail Extensions ) By: Cecilia Gomes COSC 541,DATA COMMUNICATION SYSTEMS & NETWORKS Instructor: Prof. Anvari (SEU)
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Cryptography and Network Security Sixth Edition by William Stallings.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 22 Internet Security Protocols and Standards
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Security Introduction to Introduction to Privacy Enhanced Mail (PEM) Privacy Enhanced Mail (PEM) The Certification System The Certification.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
ITA, , 7-Secure .pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA)
Message preparation Word processing Annotation Message sending User directory Timed delivery Multiple addressing Message priority Status information.
CSc 8222 Network Security Security WenZhan Song Cryptography and Network Security1.
Electronic Mail Security
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Chap 81 Electronic mail security. Chap 82 Outline Pretty good privacy S/MIME Recommended web sites.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Network Security Essentials Chapter 7 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Electronic mail security Ola Flygt Växjö University, Sweden
Electronic mail security
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
Chapter 16: Distributed Applications Business Data Communications, 4e.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
ECE-8813 / CS Prof. John A. Copeland fax Office:
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
Chapter 16: Distributed Applications Business Data Communications, 4e.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Electronic mail security
Security is one of the most widely used and regarded network services
Chapter 15 – Electronic Mail Security
Security Pretty Good Privacy (PGP)
Security Services for
Selected Research Topics Electronic Mail Security
Electronic Mail Security
S/MIME T ANANDHAN.
MAIL AND SECURITY PERTEMUAN 13
Security at the Application Layer: PGP and S/MIME
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Network Security Essentials
Cryptography and Network Security
Presentation transcript:

Chapter 15 Electronic Mail Security – Part II Data & Network Security Spring 2006 Dr. Jalili

2 Agenda In the previous session, we’ve studied PGP. In this session, other security standards will be studied. PEM S/MIME RFC 822 MIME

3 Phil’s feelings …a week before PGP's first release, I discovered the existence of another encryption standard called Privacy Enhanced Mail (PEM), which was backed by several big companies, as well as RSA Data Security. I didn't like PEM's design, for several reasons…

4 Why not PEM?! 1. PEM used 56-bit DES to encrypt messages, which I did not regard as strong cryptography. 2. PEM absolutely required every message to be signed, and revealed the signature outside the encryption envelope, so that the message did not have to be decrypted to reveal who signed it. Not an issue today

5 PEM Standard PEM is described in RFCs : Privacy Enhancement for Internet Electronic Mail (1993): 1. Part I: Message Encryption and Authentication Procedures; 2. Part II: Certificate-Based Key Management; 3. Part III: Algorithms, Modes, and Identifiers; 4. Part IV: Key Certification and Related Services.

6 Summary of Transformations The incoming/outgoing message undergoes (a subset of) the four-phase transformation: Message in the system's native character set RFC 822 compatible Authentication & Encryption Printable Encoding

7 PEM Encapsulation Adopted from RFC 934 encapsulation mechanism. Uses Encapsulation Boundaries (EBs): -----BEGIN PRIVACY-ENHANCED MESSAGE END PRIVACY-ENHANCED MESSAGE-----

8 Encapsulation Format Encapsulated Message -----BEGIN PRIVACY-ENHANCED MESSAGE----- Encapsulated Header Portion Blank Line Encapsulated Text Portion -----END PRIVACY-ENHANCED MESSAGE----- Pre- Encapsulation Boundary (Pre- EB) Post- Encapsulation Boundary (Post-EB) Separates Header & Body Result of four- phase transformation Contains encryption control fields

9 Example Encapsulated Message (Symmetric Case) Pre-EB Header Body Post-EB

10 Proc-Type Field Identifies the type of processing performed on the transmitted message: ENCRYPTED; MIC-ONLY; MIC-CLEAR; CRL; Content-Domain Field; DEK-Info Field; MIC: Message Integrity Check DEK: Data Encrypting Keys

11 PEM Algorithms

12 PEM, Today Today, PEM is not used as a mail security/privacy tool anymore. But, as stated in RFC 2315 (PKCS #7: Cryptographic Message Syntax v1.5), PEM & PKCS #7 are totally compatible. PKCS#7 messages can be converted into PEM messages without any cryptographic operations.

13 S/MIME Before studying S/MIME, one must first understand what RFC 822 & MIME are. RFC 822 defines a format for text messages that are sent using electronic mail. Consists of envelope & contents. The content includes a set of header fields that may be used by the mail system to create the envelope.

14 RFC 822 Message Format Date: Tue, 9 May :37:17 (EST) From: “Mahmood Ahmadinejad” Subject: no subject To: Cc: Mr. George Bush, president of the United States of America For some time now, I have been thinking, how one can justify the undeniable contradictions that exist in the international arena -- which are being constantly debated, especially in political forums and amongst university students. Many questions remain unanswered. Those have prompted me to discuss some of the contradictions and questions, in the hopes that it might bring about an opportunity to redress them… Blank Line

15 RFC 822 SMTP limitations 1. Binary object transfer; 2. Non-ASCII-7 encoding; 3. Message size limitations; 4. ASCII-to-EBCDIC translation; 5. SMTP gateways to X.400 networks can’t handle non-textual X.400 messages; 6. Some SMTP implementations inconsistent with RFC 821 SMTP. 1.Handling CRLF; 2.76-Character lines; 3.Trailing white spaces; 4.Padding of lines; 5.Handling Tab characters.

16 MIME RFCs obsolete RFCs MIME =Multipurpose Internet Mail Extensions. An extension to the RFC 822 framework. Intended to address some of the problems and limitations of the use of SMTP.

17 MIME RFCs MIME is discussed in RFCs : 2045: Format of Internet Message Bodies; 2046: Media Types; 2047: Message Header Extensions for Non- ASCII Text; 2048: Registration Procedures; 2049: Conformance Criteria and Examples;

18 MIME Specification 1. Five new message header fields are defined, which may be included in an RFC 822 header. 2. A number of content formats for multimedia electronic mail are defined. 3. Transfer encodings are defined that enable the conversion of any content format into a form that is protected from alteration by the mail system.

19 New Message Headers 1. MIME-Version; 2. Content-Type; 3. Content-Transfer-Encoding; 4. Content-ID; 5. Content-Description. Always 1.0 RFCs e.g. video/quicktime e.g. binary Used to identify MIME entities uniquely in multiple contexts. Like tags

20 MIME Content Types (RFC 2046)

21 Sample MIME Message From: “Mahmood Ahmadinejad” To: “George W. Bush” Subject: no subject MIME-Version: 1.0 Content-type: multipart/mixed; boundary=“Mr. President” Preamble --Mr. President You might know that I am a teacher. My students ask me how can these actions be reconciled with the values… --Mr. President Content-type: text/plain; charset=us-ascii I am sure you know how -- and at what cost -- Israel was established… --Mr. President-- Epilogue Blank Line

22 MIME Transfer Encodings

23 Canonical Form An important concept in MIME and S/MIME. Canonical form is a format, appropriate to the content type, that is standardized for use between systems. May involve character set and EOL conversion, transformation of audio data, compression, etc.

24 S/MIME Secure MIME (RFCs ). Provides four functions: 1. Enveloped data; 2. Signed data; 3. Clear-Signed data; 4. Signed & Enveloped data. Both message & signature are encoded using Base64. Only signature is encoded using Base64.

25 S/MIME Algorithms DSS: preferred for digital signature. DH (ElGamal): preferred for session key encryption. RSA: signing and/or encryption. 3DES/RC2 (40 bits): message encryption. SHA-1/MD5: digest. There are some RULES for algorithm selection (MUST/SHOULD). RFC 2119

26 S/MIME Content Types

27 S/MIME Certificate Processing S/MIME uses public-key certificates that conform to X.509v3. The key-management scheme used by S/MIME is in some ways a hybrid between a strict X.509 certification hierarchy and PGP's web of trust. PGP is suitable for personal use, while S/MIME is appropriate for commercial use.