NETWORK SECURITY.

Slides:



Advertisements
Similar presentations
1 Pretty Good Privacy (PGP) Security for Electronic .
Advertisements

Pretty Good Privacy “ To PGP or not to PGP? “ Phil Zimmermann.
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
03/21/06 Hofstra University – Network Security Course, CSC290A 1 Assignment 1 Pick sun.com and one other site. Using whois and ARIN, get as much information.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptographic Technologies
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Electronic mail security -- Pretty Good Privacy.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
Network Security Essentials Chapter 7 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Pretty Good Privacy (PGP) Security for Electronic .
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
1 Electronic Mail Security Behzad Akbari Fall 2009 In the Name of the Most High.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Electronic mail security
K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College
Security is one of the most widely used and regarded network services
Security Pretty Good Privacy (PGP)
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Electronic Mail Security
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Electronic Mail Security
Cryptography and Network Security
….for authentication and confidentiality PGP
Presentation transcript:

NETWORK SECURITY

Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Need for E-Mail Security E-mail is necessary for E-Commerce Daily communication E-Mail is also very public, allowing for access at each point form the sender’s computer to the recipient’s screen.

Pretty Good Privacy 1991 – Creation of a single person, Phil Zimmermann Provides confidentiality and authentication services for electronic mail and file storage applications

Pretty Good Privacy Selected best available cryptographic algorithms Integrated these algorithms into a general purpose application Source code and doc freely available on the net Agreement with company (Viacrypt) for low cost commercial version

Phil Zimmermann “PGP has spread like a prairie fire, fanned by countless people who fervently want their privacy restored in the information age” - Phil Zimmermann, 1996

Why Is PGP Popular? It is availiable free on a variety of platforms. Based on well known algorithms. Wide range of applicability Not developed or controlled by governmental or standards organizations

Operational Description PGP Consists of five services: Authentication Confidentiality Compression E-mail compatibility Segmentation and Reassembly The last three are transparent to the user

PGP: Authentication steps Sender: Creates a message Hashes it to 160-bits using SHA1 Encrypts the hash code using her private key, forming a signature PGP prompts the user for the passphrase to recover the private key Attaches the signature to message

PGP: Authentication steps Receiver: Decrypts attached signature using sender’s public key and recovers hash code Recomputes hash code using message and compares with the received hash code’ If they match, accepts the message

Authentication steps M = original message H = hash function | | = concatenation (join) Z = compression Z-1= decompression EP = public key encryption DP = public key decryption KRa = A’s private key KUa = A’s public key

PGP: Confidentiality Sender: Generates message and a random number (session key) only for this message Encrypts message with the session key using AES, 3DES, IDEA or CAST-128 Encrypts session key itself with recipient’s public key using RSA Attaches it to message

PGP: Confidentiality Receiver: Recovers session key by decrypting using his private key PGP prompts the user for the passphrase to recover the private key Decrypts message using the session key.

EC = symmetric encryption DC = symmetric decryption Ks = session key Z = compression Z-1 = Decompression Confidentiality

Confidentiality & Authentication Authentication and confidentiality can be combined A message can be both signed and encrypted That is called authenticated confidentiality Encryption/Decryption process is “nested” within the process shown for authentication alone

Confidentiality & Authenticity

Compression PGP compresses the message after applying the signature but before encryption Saves space for transmission and storage To speed up the process (less data to encrypt) The placement of the compression algorithm is critical. The compression algorithm used is ZIP (described in appendix 5A)

PGP Email compatibility PGP is designed to be compatible with all email systems Output of encryption and compression functions is divided into 6-bit blocks Each block is mapped onto an ASCII Character This is called RADIX-64 encoding Has the side-effect of increasing the size of the data by about 33%

E-mail Compatibility The scheme used is radix-64 conversion The use of radix-64 expands the message by 33%. 8 8 8 6 6 6 6 8 8 8 8

RADIX-64 encoding

Summary of PGP Services

Cryptographic Keys and Key Rings PGP makes use of 4 types of keys: One-time seeeion symmetric keys Public keys Private Keys Passphrase-based symmetric Keys

Key Requirements A Means of generating unpredictable session keys is needed A user is allowed to have multiple public/private key pairs and there must be a way to indetify particular keys Each PGP entity must maintain a file of its own public/private key pair as well as those of its correspondents (通信者)

PGP Key Identifiers What is a key identifier Consider this: A user may have many public/private key pairs He wishes to encrypt or sign a message using one of his keys How does he let the other party know which key he has used? Attaching the whole public key every time is inefficient Solution: Generate a key identifier (least significant 64-bits of the key)

PGP Key Rings PGP uses key rings to identify the key pairs that a user owns or trusts Private-key ring contains public/private key pairs of keys he owns Public-key ring contains public keys of others he trusts

PGP Public key management Key rings are different from certificate chains used in X.509 There the user only trusts CAs and the people signed by the CAs Here he or she can trust anyone and can add others signed by people he trusted Thus, users do not rely on external CAs A user is his/her own CA

PGP Public key management Approaches to minimize the risk that user’s public key ring contains false public keys: A physically gets key from B Verify key by phone Get B’s public key from mutually trusted individual Obtain B’s key from trusted certifying authority