1 Electronic Mail Security Behzad Akbari Fall 2009 In the Name of the Most High.

Slides:



Advertisements
Similar presentations
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
Advertisements

Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Chapter 5 Electronic mail security. Outline Pretty good privacy S/MIME Recommended web sites.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
NS-H / Security. NS-H / Security is one of the most widely used and regarded network services currently message.
Electronic mail security
Electronic mail security -- Pretty Good Privacy.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Cryptography and Network Security Chapter 18
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Chap 81 Electronic mail security. Chap 82 Outline Pretty good privacy S/MIME Recommended web sites.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Cryptography, Authentication and Digital Signatures
Network Security Essentials Chapter 7 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Electronic mail security Ola Flygt Växjö University, Sweden
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Pretty Good Privacy (PGP) Security for Electronic .
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
ECE-8813 / CS Prof. John A. Copeland fax Office:
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Electronic mail security
K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College
Security is one of the most widely used and regarded network services
Chapter 15 – Electronic Mail Security
Security Pretty Good Privacy (PGP)
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
University of Houston Network Security Datacom II Lecture 8
Security at the Application Layer: PGP and S/MIME
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Electronic Mail Security
Cryptography and Network Security
….for authentication and confidentiality PGP
Presentation transcript:

1 Electronic Mail Security Behzad Akbari Fall 2009 In the Name of the Most High

2 Overview Need for security Threats to Pretty good privacy S/MIME Recommended web sites

3 Need for Security is necessary for  E-Commerce  Daily communication is also very public, allowing for access at each point form the sender’s computer to the recipient’s screen.

4 Threats to Message interception (confidentiality) Message interception (blocked delivery) Message interception and subsequent replay Message content modification Message origin modification Message content forgery by an outsider Message origin forgery by an outsider Message content forgery by recipient Message origin forgery by recipient Denial of message transmission

5 Pretty Good Privacy Philip R. Zimmerman is the creator of PGP. PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.

6 Secure Ideal secure would provide:  Message confidentiality (message contents not exposed en route)  Message integrity (message received is what was sent)  Sender authenticity (confident who sender is )  Non-repudiation (sender can’t deny sending) This level of security is not always needed

7 security security is important If messages are not secure,  They may be viewed in transit on the network  Viewed by suitably privleged users on destination systems (e.g. sys admins)  Easy to masquerade as someone There are ers you can use to send s claiming you are  Message integrity upon reception is not guaranteed

8 Current Security and PGP Currently programs are not secure  Especially web based  Programs such as Outlook and Eudora do offer encryption though PGP can be used for security  stands for Pretty Good Privacy  software application created by Phil Zimmermann  Available to try out for free at

9 Why Is PGP Popular? It is availiable free on a variety of platforms. Based on well known algorithms. Wide range of applicability Not developed or controlled by governmental or standards organizations

10 PGP Features It is based on the best available cryptographic algorithms  Considered very strong and secure Mainly used for and file storage applications Independent of governmental organizations Messages are automatically compressed

11 Operational Description PGP Consists of five services:  Authentication  Confidentiality  Compression  compatibility  Segmentation and Reassembly The last three are transparent to the user

12 PGP: Authentication steps Sender:  Creates a message  Hashes it to 160-bits using SHA1  Encrypts the hash code using her private key, forming a signature  Attaches the signature to message

13 PGP: Authentication steps Receiver:  Decrypts attached signature using sender’s public key and recovers hash code  Recomputes hash code using message and compares with the received hash code’  If they match, accepts the message

14 M= original message H= hash function | | = concatenation (join) Z= compression Z -1 = decompression EP= public key encryption DP= public key decryption KR a = A’s private key KU a = A’s public key Authentication steps Stallings, Fig 5.1a

15 PGP: Confidentiality Sender:  Generates message and a random number (session key) only for this message  Encrypts message with the session key using AES, 3DES, IDEA or CAST-128  Encrypts session key itself with recipient’s public key using RSA  Attaches it to message

16 PGP: Confidentiality Receiver:  Recovers session key by decrypting using his private key  Decrypts message using the session key.

17 EC= symmetric encryption DC= symmetric decryption K s = session key Z = compression Z -1 = Decompression Confidentiality Stallings, 5.1b

18 Confidentiality pitfall Note that confidentiality service provides no assurance to the receiver as to the identity of sender (i.e. no authentication) Only provides confidentiality for sender that only the recipient can read the message (and no one else)

19 Combining authentication and confidentiality in PGP Authentication and confidentiality can be combined  A message can be both signed and encrypted That is called authenticated confidentiality Encryption/Decryption process is “nested” within the process shown for authentication alone See next slide

20 Confidentiality and Authenticity

21

22 Compression PGP compresses the message after applying the signature but before encryption  Saves space for transmission and storage The placement of the compression algorithm is critical. The compression algorithm used is ZIP (described in appendix 5A)

23 PGP Compression Compression is done after signing the hash. Why?  Saves having to compress document every time you wish to verify its signature It is also done before encryption. Why?  To speed up the process (less data to encrypt)  Also improves security Compressed messages are more difficult to cryptanalyze as they have less redundancy

24 PGP compatibility PGP is designed to be compatible with all systems Makes no assumptions regarding ability to handle attachments etc.  Handles both the simplest system and the most complex system  Output of encryption and compression functions is divided into 6-bit blocks Each block is mapped onto an ASCII Character This is called RADIX-64 encoding Has the side-effect of increasing the size of the data by about 33%

25 Compatibility The scheme used is radix-64 conversion (see appendix 5B). The use of radix-64 expands the message by 33%.

26 RADIX-64 encoding

27 Segmentation and Reassembly Often restricted to a maximum message length of 50,000 octets. Longer messages must be broken up into segments. PGP automatically subdivides a message that is to large. (See 5.2a) Segementation is done after all other processing The receiver strips off all headers and reassemble the block. (See 5.2b)

28

29 Summary of PGP Services

30 Cryptographic Keys and Key Rings PGP makes use of 4 types of keys:  One-time seeeion symmetric keys  Public keys  Private Keys  Passphrase-based symmetric Keys

31 Key Requirements A Means of generating unpredictable session keys is needed A user is allowed to have multiple public/private key pairs and there must be a way to indetify particular keys Each PGP entity must maintain a file of its own public/private key pair as well as those of its correspondents

32 Session keys Each session key is associated with a single message and is used only once to encrypt and decrypt that message Messsage encryption is done with a symmetric encryption algorithm  CAST, IDEA use 128 bit keys  3DES uses a 168 bit key  Keystrokes and timeing are used to generate a “random” stream, which is combined with previous session key toproduce a new unpredictable one.

33 PGP Key Identifiers What is a key identifier Consider this:  A user may have many public/private key pairs  He wishes to encrypt or sign a message using one of his keys  How does he let the other party know which key he has used?  Attaching the whole public key every time is inefficient Solution: Generate a key identifier (least significant 64-bits of the key)  This will most likely be unique and can also be used for signatures

34 Format of PGP Message A message may consist of: A Message component – data to be stored or transmitted A Signature component (optional)  Timestamp  Message digest encrypted with sender’s private signature key A Session key (optional)  Session key as well as the key used to encrypt the session key  ZIPPED and then encoded with radix-64 encoding

35 Format of PGP Message

36 PGP Key Rings PGP uses key rings to identify the key pairs that a user owns or trusts Private-key ring contains public/private key pairs of keys he owns Public-key ring contains public keys of others he trusts

37

38

39

40 PGP Public key management Key rings are different from certificate chains used in X.509  There the user only trusts CAs and the people signed by the CAs  Here he or she can trust anyone and can add others signed by people he trusted Thus, users do not rely on external CAs  A user is his/her own CA

41 PGP Public key management Why is there a problem? (See p. 137) Approaches to minimize the risk that user’s public key ring contains false public keys:  A physically gets key from B  Verify key by phone  Get B’s public key from mutually trusted individual  Obtain B’s key from trusted certifying authority

42 The Use of Trust PGP provides a means of using trust, associating trust with public keys and exploiting trust information Each entry in the key ring is a public key certificate which has:  Key legitimacy field ( indicates level of trust)  Signature trust field ( degree to which user trusts signer)  Owner trust field ( degree to which public key is trusted to sign other certificates) ( See Stallings p. 139 Table 5.2)

43

44 Revoking Public Keys The owner issues a key revocation certificate. Normal signature certificate with a revote indicator. Corresponding private key is used to sign the certificate.

45 S/MIME Secure/Multipurpose Internet Mail Extension S/MIME will probably emerge as the industry standard. PGP for personal security

46 S/MIME Secure MIME is a specification not an application as PGP Based on MIME (Multipurpose Internet Mail Extensions) MIME Addresses limitations of SMTP  SMTP is Simple Mail Transfer Protocol  The de facto standard on the Internet

47 Simple Mail Transfer Protocol (SMTP, RFC 822) SMTP Limitations - Can not transmit, or has a problem with:  executable files, or other binary files (jpeg image)  “national language” characters (non-ASCII)  messages over a certain size  ASCII to EBCDIC translation problems  lines longer than a certain length (72 to 254 characters)

48 Header fields in MIME You can configure your system to produce all headers (that usually includes MIME headers) MIME headers include  MIME-Version  Content-Type, Content-Transfer-Encoding  Content-ID  Content Description

49 Header fields in MIME More message structure included, more information about message transmitted S/MIME simply specifies more structure elements added to MIME elements  For security of the message contents

50 Header fields in MIME MIME-Version: Must be “1.0” -> RFC 2045, RFC 2046 Content-Type: More types being added by developers (application/word) Content-Transfer-Encoding: How message has been encoded (radix-64) Content-ID: Unique identifying character string. Content Description: Needed when content is not readable text (e.g.,mpeg)

51 S/MIME Functions Enveloped Data: Encrypted content and encrypted session keys for recipients. Signed Data: Message Digest encrypted with private key of “signer.” Clear-Signed Data: Signed but not encrypted. Signed and Enveloped Data: Various orderings for encrypting and signing

52 Algorithms Used in S/MIME Message Digesting: SHA-1 and MDS Digital Signatures: DSS Secret-Key Encryption: Triple-DES, RC2/40 (exportable) Public-Private Key Encryption: RSA with key sizes of 512 and 1024 bits, and Diffie-Hellman (for session keys).

53 Recommended Web Sites PGP home page: MIT distribution site for PGP S/MIME Charter S/MIME Central: RSA Inc.’s Web Site