16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.

Slides:



Advertisements
Similar presentations
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Principles of Information Security, 2nd edition1 Cryptography.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Electronic mail security -- Pretty Good Privacy.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 7 – Electronic Mail Security
Electronic Mail Security
S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display Chapter 10 Network Security.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Pretty Good Privacy (PGP) Security for Electronic .
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
NETWORK SECURITY.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Recall from CS x34: Internet standards were published in two parts in 1982: RFC 822: STANDARD FOR THE FORMAT OF ARPA INTERNET TEXT MESSAGES by.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Key management issues in PGP
Electronic mail security
Security is one of the most widely used and regarded network services
Security Pretty Good Privacy (PGP)
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
NET 536 Network Security Networks and Communication Department
Public Key Infrastructure
Security at the Application Layer: PGP and S/MIME
ELECTRONIC MAIL SECURITY
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
ELECTRONIC MAIL SECURITY
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Electronic Mail Security
….for authentication and confidentiality PGP
Presentation transcript:

16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and S/MIME

16.2 Objectives  To explain the general structure of an application program  To discuss how PGP can provide security services for  To discuss how S/MIME can provide security services for  To define trust mechanism in both PGP and S/MIME  To show the structure of messages exchanged in PGP and S/MIME Chapter 16

Let us first discuss the electronic mail ( ) system in general Architecture Security Topics discussed in this section:

Architecture Figure architecture

Security Cryptographic Algorithms In security, the sender of the message needs to include the name or identifiers of the algorithms used in the message. NoteCertificates It is obvious that some public-key algorithms must be used for security.

Continued Cryptographic Secrets In security, the encryption/decryption is done using a symmetric-key algorithm, but the secret key to decrypt the message is encrypted with the public key of the receiver and is sent with the message. Note

PGP Pretty Good Privacy (PGP) can be used to create a secure message or to store a file securely for future retrieval Scenarios Key Rings PGP Certificates Key Revocation Extracting Information from Rings PGP Packets PGP Messages Topics discussed in this section:

ScenariosPlaintext Figure 16.2 A plaintext message

Continued Message Integrity Figure 16.3 An authenticated message

ContinuedCompression Figure 16.4 A compressed message

Continued Confidentiality with One-Time Session Key Figure 16.5 A confidential message

Continued Code Conversion Another service provided by PGP is code conversion. PGP uses Radix-64 conversion. Segmentation PGP allows segmentation of the message.

Key Rings Figure 16.6 Key rings in PGP

Continued PGP Algorithms

Continued

Continued

Continued

PGP Certificates X.509 Certificates Protocols that use X.509 certificates depend on the hierarchical structure of the trust. In X.509, there is a single path from the fully trusted authority to any certificate. Note

Continued PGP Certificates In PGP, there is no need for CAs; anyone in the ring can sign a certificate for anyone else in the ring. In PGP, there can be multiple paths from fully or partially trusted authorities to any subject. Note Trusts and Legitimacy The entire operation of PGP is based on introducer trust, the certificate trust, and the legitimacy of the public keys.

Continued Figure 16.7 Format of private key ring table

Continued Let us show a private key ring table for Alice. We assume that Alice has only two user IDs, and We also assume that Alice has two sets of private/public keys, one for each user ID. Example 16.1

Continued Figure 16.8 Format of a public key ring table

Continued A series of steps will show how a public key ring table is formed for Alice. Example 16.2

Continued Example 16.2Continued

Continued Example 16.2Continued

Continued Example 16.2Continued

Continued Trust Model in PGP Figure 16.9 Trust model

Key Revocation It may become necessary for an entity to revoke his or her public key from the ring. This may happen if the owner of the key feels that the key is compromised (stolen, for example) or just too old to be safe.

Extracting Information from Rings Figure Extracting information at the sender site

Continued Figure Extracting information at the receiver site

PGP Packets Figure Format of packet header

Continued

Continued Figure Literal data packet

Continued Figure Compressed data packet

Continued Figure Encrypted data packet

Continued Figure Signature packet

Continued

Continued Figure Session-key packet

Continued Figure Public-key packet Public Key

Continued Figure User ID packet

PGP Messages Figure Encrypted message

Continued Figure Signed message

Continued Figure Certificate message

S/MIME Another security service designed for electronic mail is Secure/Multipurpose Internet Mail Extension (S/MIME). The protocol is an enhancement of the Multipurpose Internet Mail Extension (MIME) protocol MIME S/MIME Applications of S/MIME Topics discussed in this section:

Continued Figure MIME

Continued Figure Teledesic

ContinuedMIME-Version This header defines the version of MIME used. The current version is 1.1. Content-Type The content type and the content subtype are separated by a slash. Depending on the subtype, the header may contain other parameters.

Continued

Continued

Continued Figure Radix-64 conversion

Continued

Continued Figure Quoted-printable

S/MIME S/MIME adds some new content types to include security services to the MIME. All of these new types include the parameter “application/pkcs7-mime,” in which “pkcs” defines “Public Key Cryptography Specification.” Cryptographic Message Syntax (CMS) To define how security services, such as confidentiality or integrity, can be added to MIME content types, S/MIME has defined Cryptographic Message Syntax (CMS). The syntax in each case defines the exact encoding scheme for each content type. For details, the reader is referred to RFC 3369 and 3370.

Continued Figure Signed-data content type

Continued Figure Enveloped-data content type

Continued Figure Digest-data content type

Continued Figure Authenticated-data content type

Continued Cryptographic Algorithms S/MIME defines several cryptographic algorithms. The term “must” means an absolute requirement; the term “should” means recommendation.

Continued The following shows an example of an enveloped-data in which a small message is encrypted using triple DES. Example 16.3