SlideShare a Scribd company logo
1 of 10
Email Security &
Development
By: Yosef Gamble
CS 325
https://commons.wikimedia.org/wiki/File:Crypto_key.svg
Table of Contents
Email Security Flaws
Encryption Techniques
Public key Infrastructure (PKI)
Pretty Good Privacy (PGP)
Application
Future Development
Email Security Flaws
Email is sent in plain text.
Email uses outdated protocol, Simple Mail
Transfer Protocol (SMTP).
Includes a header full of revealing metadata.
Can easily become intercepted.
Encryption Techniques - PKI
Public Key Infrastructure
Introduced public/private key encryption using
certificates
Relied on Third-Party vendors
Widely used in Corporate environment
https://en.wikipedia.org/wiki/Public_key_infrastructure#mediaviewer/File:Public-Key-Infrastructure.svg
Encryption Technique - PGP
Pretty Good Privacy
Decentralised version of PKI
Removed Third-Party Involvement
Uses ‘Web of Trust’ authentication
https://www.sandboxgeneral.com/?p=974
Applications
GNU Privacy Guard (GnuPG)
Hushmail
Lavabit, Silent Circle, & PrivateSky
Third-Party Plugins Webmail
https://en.wikipedia.org/wiki/GNU_Privacy_Guard#mediaviewer/File:Gnupg_logo.svg
Future Development
Focus on End-to-End Email Encryption and
Usability
Dark Mail Project
Extensible Messaging and Presence Protocol
(XMPP)
http://www.darkmail.info
Conclusion
Email Security Flaws
Encryption Techniques
Public key Infrastructure (PKI)
Pretty Good Privacy (PGP)
Application
Future Development
Questions?
?
Works Cited
Bradbury, D. (2014, March). Can we make email secure? Network Security, 2014(3), 13-16.
Retrieved May 27, 2014, from ACM Database.
Ellison, C., & Schneier, B. (2000). Risks of pki: Secure email. Communications of the ACM,
43(1), 160.
Hallam-Baker P. (2014). Privacy protected email. Retrieved from
https://www.w3.org/2014/strint/papers/01.pdf
Nguyen P. (2004). Can we trust cryptographic software? cryptographic flaws in gnu privacy guard
V1.2.3. In C. Cachin and J. Camenisch (Eds.), Advances in Cryptology - EUROCRYPT 2004, 3027, 555-
570.
Shelley L. I. (2003). Organized crime, terrorism and cybercrime. In A. Bryden, P. Fluri (Eds.),
Security sector reform: Institutions, society and good governance (pp. 303-312).
Baden-Baden, DE: Nomos Verlagsgesellschaft.
Yu J., Cheval V., Ryan M. (2014). Challenges with end-to-end email encryption. Retrieved from
https://www.w3.org/2014/strint/papers/08.pdf

More Related Content

What's hot

Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Email security
Email securityEmail security
Email securitySultanErbo
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Samip jain
 
Email security
Email securityEmail security
Email securitykumarviji
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat LandscapeNuspire Networks
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolVishal Kumar
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 

What's hot (20)

Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Email security
Email securityEmail security
Email security
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Email security
Email securityEmail security
Email security
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Kerberos
KerberosKerberos
Kerberos
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat Landscape
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Pgp
PgpPgp
Pgp
 
Steganography
SteganographySteganography
Steganography
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
 
Cryptography
CryptographyCryptography
Cryptography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 

Viewers also liked

Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 
Email Security
Email SecurityEmail Security
Email Securitylaleh7891
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)Vishal Kumar
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocolAnagha Ghotkar
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Protocolo SMTP (Simple Mail Transfer Protocol)
Protocolo  SMTP (Simple Mail Transfer Protocol)Protocolo  SMTP (Simple Mail Transfer Protocol)
Protocolo SMTP (Simple Mail Transfer Protocol)Luis Alfredo Sanchez
 

Viewers also liked (12)

Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 
Network security
Network securityNetwork security
Network security
 
Email Security
Email SecurityEmail Security
Email Security
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Protocolo SMTP (Simple Mail Transfer Protocol)
Protocolo  SMTP (Simple Mail Transfer Protocol)Protocolo  SMTP (Simple Mail Transfer Protocol)
Protocolo SMTP (Simple Mail Transfer Protocol)
 
Smtp
SmtpSmtp
Smtp
 

Similar to Email Security Techniques & Future Development

B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxikirkton
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosef Gamble
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Journals
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfDefine PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfxlynettalampleyxc
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...eSAT Publishing House
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkPriyanka Aash
 
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...RSIS International
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 

Similar to Email Security Techniques & Future Development (20)

Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_Security
 
Dica short
Dica shortDica short
Dica short
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfDefine PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
G43053847
G43053847G43053847
G43053847
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 

More from Yosef Gamble

Water Rights Documentation
Water Rights DocumentationWater Rights Documentation
Water Rights DocumentationYosef Gamble
 
Cainet Meeting August 20 2014 (2).pptx
Cainet Meeting August 20 2014 (2).pptxCainet Meeting August 20 2014 (2).pptx
Cainet Meeting August 20 2014 (2).pptxYosef Gamble
 
ASCWU BOT 13 May.pptx_2
ASCWU BOT 13 May.pptx_2ASCWU BOT 13 May.pptx_2
ASCWU BOT 13 May.pptx_2Yosef Gamble
 
COB Brother 2 Brother Funding
COB Brother 2 Brother FundingCOB Brother 2 Brother Funding
COB Brother 2 Brother FundingYosef Gamble
 

More from Yosef Gamble (7)

Design Report
Design ReportDesign Report
Design Report
 
Water Rights Documentation
Water Rights DocumentationWater Rights Documentation
Water Rights Documentation
 
BOT 3 Oct.pptx
BOT 3 Oct.pptxBOT 3 Oct.pptx
BOT 3 Oct.pptx
 
Cainet Meeting August 20 2014 (2).pptx
Cainet Meeting August 20 2014 (2).pptxCainet Meeting August 20 2014 (2).pptx
Cainet Meeting August 20 2014 (2).pptx
 
ASCWU BOT 13 May.pptx_2
ASCWU BOT 13 May.pptx_2ASCWU BOT 13 May.pptx_2
ASCWU BOT 13 May.pptx_2
 
B2B Consulting
B2B ConsultingB2B Consulting
B2B Consulting
 
COB Brother 2 Brother Funding
COB Brother 2 Brother FundingCOB Brother 2 Brother Funding
COB Brother 2 Brother Funding
 

Email Security Techniques & Future Development

  • 1. Email Security & Development By: Yosef Gamble CS 325 https://commons.wikimedia.org/wiki/File:Crypto_key.svg
  • 2. Table of Contents Email Security Flaws Encryption Techniques Public key Infrastructure (PKI) Pretty Good Privacy (PGP) Application Future Development
  • 3. Email Security Flaws Email is sent in plain text. Email uses outdated protocol, Simple Mail Transfer Protocol (SMTP). Includes a header full of revealing metadata. Can easily become intercepted.
  • 4. Encryption Techniques - PKI Public Key Infrastructure Introduced public/private key encryption using certificates Relied on Third-Party vendors Widely used in Corporate environment https://en.wikipedia.org/wiki/Public_key_infrastructure#mediaviewer/File:Public-Key-Infrastructure.svg
  • 5. Encryption Technique - PGP Pretty Good Privacy Decentralised version of PKI Removed Third-Party Involvement Uses ‘Web of Trust’ authentication https://www.sandboxgeneral.com/?p=974
  • 6. Applications GNU Privacy Guard (GnuPG) Hushmail Lavabit, Silent Circle, & PrivateSky Third-Party Plugins Webmail https://en.wikipedia.org/wiki/GNU_Privacy_Guard#mediaviewer/File:Gnupg_logo.svg
  • 7. Future Development Focus on End-to-End Email Encryption and Usability Dark Mail Project Extensible Messaging and Presence Protocol (XMPP) http://www.darkmail.info
  • 8. Conclusion Email Security Flaws Encryption Techniques Public key Infrastructure (PKI) Pretty Good Privacy (PGP) Application Future Development
  • 10. Works Cited Bradbury, D. (2014, March). Can we make email secure? Network Security, 2014(3), 13-16. Retrieved May 27, 2014, from ACM Database. Ellison, C., & Schneier, B. (2000). Risks of pki: Secure email. Communications of the ACM, 43(1), 160. Hallam-Baker P. (2014). Privacy protected email. Retrieved from https://www.w3.org/2014/strint/papers/01.pdf Nguyen P. (2004). Can we trust cryptographic software? cryptographic flaws in gnu privacy guard V1.2.3. In C. Cachin and J. Camenisch (Eds.), Advances in Cryptology - EUROCRYPT 2004, 3027, 555- 570. Shelley L. I. (2003). Organized crime, terrorism and cybercrime. In A. Bryden, P. Fluri (Eds.), Security sector reform: Institutions, society and good governance (pp. 303-312). Baden-Baden, DE: Nomos Verlagsgesellschaft. Yu J., Cheval V., Ryan M. (2014). Challenges with end-to-end email encryption. Retrieved from https://www.w3.org/2014/strint/papers/08.pdf