SlideShare a Scribd company logo
1 of 27
NADAR SARASWATHIC OLLEGE
OF
ARTS AND SCIENCE-THENI
EMAIL-SECURITY
presented by
M.JEYA VARTHINI-M.sc( cs )
E-MAIL
 Email is also a common entry point for attackers looking to gain
a foothold in an enterprise network and obtain valuable company
data.
 Email encryption involves encrypting, or disguising, the
content of email messages to protect potentially sensitive
information from being read by anyone other than intended
recipients.
W H AT I S EMA I L SECU RI TY I N N ETW O RK
SECU RI TY ?
 Email security is the process of ensuring the availability,
integrity and authenticity of email communications by
protecting against the risk of email threats.
FEATURES
 Spam Filters. A significant proportion of emails that you receive
daily are marketing emails
 Anti-virus Protection. Spam filters play the role of separating
the spam emails from the regular ones
 Image & Content Control
 Data Encryption.
W H AT I S T H E N E E D O F E M A I L S E C U R I T Y I N
C RY P TO G R A P H Y ?
 Email security in cryptography is the ideal security measure
because it denies any access to the hacker at any stage right
from the source to the recipient.
 One should install such email security features in information
systems today to tackle the menace of cybercriminals.
ELEC TR ON IC M A IL SEC U R ITY
• Pretty Good Privacy
(PGP)
• S/MIME
(Secure/Multipurpose
Internet Mail Extension)
PRETTY GOOD PRIVACY
1. Authentication
2. Confidentiality
3. Compression
4. Email Compatibility
5. Segmentation
1. AUTHENTICATION
Authentication basically means something that
is used to validate something as true or real. To
login into some sites sometimes we give our
account name and password, that is an
authentication verification procedure.
AUTHENTICATION
In the email world, checking the authenticity of an
email is nothing but to check whether it actually
came from the person it says. In emails,
authentication has to be checked as there are some
people who spoof the emails or some spams and
sometimes it can cause a lot of inconvenience.
T H E AU T H E N T I C A T I O N S E RV I C E I N P G P
SERVICE IN PGP
 As shown in the above figure, the Hash Function (H) calculates the
Hash Value of the message. For the hashing purpose, SHA-1 is used
and it produces a 160 bit output hash value. Then, using the sender’s
private key (KPa), it is encrypted and it’s called as Digital Signature.
 The Message is then appended to the signature. All the process
happened till now, is sometimes described as signing the message .
Then the message is compressed to reduce the transmission overhead
and is sent over to the receiver.
SERVICE IN PGP
 At the receiver’s end, the data is decompressed and the message,
signature are obtained. The signature is then decrypted using the sender’s
public key(P Ua) and the hash value is obtained. The message is again
passed to hash function and it’s hash value is calculated and obtained.
 Both the values, one from signature and another from the recent output
of hash function are compared and if both are same, it means that the email
is actually sent from a known one and is legit, else it means that it’s not a
legit one.
2. CONFIDENTIALITY
 Sometimes we see some packages labelled as ‘Confidential’,
which means that those packages are not meant for all the
people and only selected persons can see them. The same
applies to the email confidentiality as well. Here, in the email
service, only the sender and the receiver should be able to read
the message, that means the contents have to be kept secret from
every other person, except for those two.
PRETTY GOOD PRIVACY
S/MIME
S/MIME, or Secure/Multipurpose Internet Mail
Extensions, is a technology that allows you to
encrypt your emails.
 S/MIME is based on asymmetric cryptography
to protect your emails from unwanted access.
WHAT IS S MIME IN CRYPTOGRAPHY?
S/MIME (Secure/Multipurpose internet Mail
Extensions) is a widely accepted protocol for
sending digitally signed and encrypted
messages.
W H AT I S T H E R O L E O F S M I M E I N
S E C U R I T Y ?
S/MIME is based on asymmetric cryptography to
protect your emails from unwanted access.
It also allows you to digitally sign your emails to verify
you as the legitimate sender of the message, making it an
effective weapon against many phishing attacks out there.
K EY A LG O RI TH M U SED I N S MI ME
Messages are encrypted using symmetric
cryptography, with asymmetric cryptography used to
protect the secret key.
Advanced Encryption Standard (AES) is a
symmetric algorithm commonly used with S/MIME.
WHAT IS PGP AND S/MIME?
 The PGP (Pretty Good Privacy) and S/MIME (Secure
Multipurpose Internet Mail Extensions) are the security
protocols designed to serve for securing the electronic
mail facility.
 The prior difference between these protocols lies within
their security mechanism type of algorithms used.
PGP AND S/MIME
D IFFER EN C E BETWEEN PGP A N D
S/M IM E
 1. Pretty Good Privacy (PGP)
PGP is an open source software package that is designed for
the purpose of email security. Phil Zimmerman developed it.
It provides the basic or fundamental needs of cryptography.
In this multiple steps such are taken to secure the email,
these are,
PGP
 1. Confidentiality
 2. Authentication
 3. Compression
 4. Resemble
 5. Segmentation
 6. E-mail compatibility
S/MIME
 2. Secure/Multipurpose Internet Mail Extension
(S/MIME) : S/MIME is a security-enhanced version
of Multipurpose Internet Mail Extension (MIME). In
this, public key cryptography is used for digital sign, encrypt
or decrypt the email. User acquires a public-private key pair
with a trusted authority and then makes appropriate use of
those keys with email applications.
D I F F E R E N C E B E T W E E N P G P A N D S / M I M E
S.NO PGP S/MIME
1.
It is designed for
processing the plain
texts
While it is designed to
process email as well
as many multimedia
files.
2.
PGP is less costly as
compared to S/MIME.
While S/MIME is
comparatively
expensive.
3.
PGP is good for
personal as well as
office use.
While it is good for
industrial use.
D I F F E R E N C E B E T W E E N P G P A N D S / M I M E
4.
PGP is less efficient
than S/MIME.
While it is more
efficient than PGP.
5.
It depends on user key
exchange.
Whereas it relies on a
hierarchically valid
certificate for key
exchange.
6.
PGP is comparatively
less convenient.
While it is more
convenient than PGP
due to the secure
transformation of all the
applications.
D I F F E R E N C E B E T W E E N P G P A N D S / M I M E
7.
PGP contains 4096 public
keys.
While it contains only
1024 public keys.
8.
PGP is the standard for
strong encryption.
While it is also the
standard for strong
encryption but has some
drawbacks.
9.
PGP is also be used in
VPNs.
While it is not used in
VPNs, it is only used in
email services.
10.
PGP uses Diffier hellman
digital signature.
While it uses Elgamal
digital signature.
CRYPT.pptx

More Related Content

Similar to CRYPT.pptx (20)

Cryptography
CryptographyCryptography
Cryptography
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Email security
Email securityEmail security
Email security
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
 
Netwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of wwwNetwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of www
 
Network and information security
Network and information securityNetwork and information security
Network and information security
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail Messages
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
email security
email securityemail security
email security
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Ch15
Ch15Ch15
Ch15
 
Pgp
PgpPgp
Pgp
 
Email security
Email securityEmail security
Email security
 
Pgp
PgpPgp
Pgp
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

CRYPT.pptx

  • 1. NADAR SARASWATHIC OLLEGE OF ARTS AND SCIENCE-THENI EMAIL-SECURITY presented by M.JEYA VARTHINI-M.sc( cs )
  • 2. E-MAIL  Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.  Email encryption involves encrypting, or disguising, the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.
  • 3. W H AT I S EMA I L SECU RI TY I N N ETW O RK SECU RI TY ?  Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against the risk of email threats.
  • 4. FEATURES  Spam Filters. A significant proportion of emails that you receive daily are marketing emails  Anti-virus Protection. Spam filters play the role of separating the spam emails from the regular ones  Image & Content Control  Data Encryption.
  • 5. W H AT I S T H E N E E D O F E M A I L S E C U R I T Y I N C RY P TO G R A P H Y ?  Email security in cryptography is the ideal security measure because it denies any access to the hacker at any stage right from the source to the recipient.  One should install such email security features in information systems today to tackle the menace of cybercriminals.
  • 6. ELEC TR ON IC M A IL SEC U R ITY • Pretty Good Privacy (PGP) • S/MIME (Secure/Multipurpose Internet Mail Extension)
  • 7. PRETTY GOOD PRIVACY 1. Authentication 2. Confidentiality 3. Compression 4. Email Compatibility 5. Segmentation
  • 8. 1. AUTHENTICATION Authentication basically means something that is used to validate something as true or real. To login into some sites sometimes we give our account name and password, that is an authentication verification procedure.
  • 9. AUTHENTICATION In the email world, checking the authenticity of an email is nothing but to check whether it actually came from the person it says. In emails, authentication has to be checked as there are some people who spoof the emails or some spams and sometimes it can cause a lot of inconvenience.
  • 10. T H E AU T H E N T I C A T I O N S E RV I C E I N P G P
  • 11. SERVICE IN PGP  As shown in the above figure, the Hash Function (H) calculates the Hash Value of the message. For the hashing purpose, SHA-1 is used and it produces a 160 bit output hash value. Then, using the sender’s private key (KPa), it is encrypted and it’s called as Digital Signature.  The Message is then appended to the signature. All the process happened till now, is sometimes described as signing the message . Then the message is compressed to reduce the transmission overhead and is sent over to the receiver.
  • 12. SERVICE IN PGP  At the receiver’s end, the data is decompressed and the message, signature are obtained. The signature is then decrypted using the sender’s public key(P Ua) and the hash value is obtained. The message is again passed to hash function and it’s hash value is calculated and obtained.  Both the values, one from signature and another from the recent output of hash function are compared and if both are same, it means that the email is actually sent from a known one and is legit, else it means that it’s not a legit one.
  • 13. 2. CONFIDENTIALITY  Sometimes we see some packages labelled as ‘Confidential’, which means that those packages are not meant for all the people and only selected persons can see them. The same applies to the email confidentiality as well. Here, in the email service, only the sender and the receiver should be able to read the message, that means the contents have to be kept secret from every other person, except for those two.
  • 15. S/MIME S/MIME, or Secure/Multipurpose Internet Mail Extensions, is a technology that allows you to encrypt your emails.  S/MIME is based on asymmetric cryptography to protect your emails from unwanted access.
  • 16. WHAT IS S MIME IN CRYPTOGRAPHY? S/MIME (Secure/Multipurpose internet Mail Extensions) is a widely accepted protocol for sending digitally signed and encrypted messages.
  • 17. W H AT I S T H E R O L E O F S M I M E I N S E C U R I T Y ? S/MIME is based on asymmetric cryptography to protect your emails from unwanted access. It also allows you to digitally sign your emails to verify you as the legitimate sender of the message, making it an effective weapon against many phishing attacks out there.
  • 18. K EY A LG O RI TH M U SED I N S MI ME Messages are encrypted using symmetric cryptography, with asymmetric cryptography used to protect the secret key. Advanced Encryption Standard (AES) is a symmetric algorithm commonly used with S/MIME.
  • 19. WHAT IS PGP AND S/MIME?  The PGP (Pretty Good Privacy) and S/MIME (Secure Multipurpose Internet Mail Extensions) are the security protocols designed to serve for securing the electronic mail facility.  The prior difference between these protocols lies within their security mechanism type of algorithms used.
  • 21. D IFFER EN C E BETWEEN PGP A N D S/M IM E  1. Pretty Good Privacy (PGP) PGP is an open source software package that is designed for the purpose of email security. Phil Zimmerman developed it. It provides the basic or fundamental needs of cryptography. In this multiple steps such are taken to secure the email, these are,
  • 22. PGP  1. Confidentiality  2. Authentication  3. Compression  4. Resemble  5. Segmentation  6. E-mail compatibility
  • 23. S/MIME  2. Secure/Multipurpose Internet Mail Extension (S/MIME) : S/MIME is a security-enhanced version of Multipurpose Internet Mail Extension (MIME). In this, public key cryptography is used for digital sign, encrypt or decrypt the email. User acquires a public-private key pair with a trusted authority and then makes appropriate use of those keys with email applications.
  • 24. D I F F E R E N C E B E T W E E N P G P A N D S / M I M E S.NO PGP S/MIME 1. It is designed for processing the plain texts While it is designed to process email as well as many multimedia files. 2. PGP is less costly as compared to S/MIME. While S/MIME is comparatively expensive. 3. PGP is good for personal as well as office use. While it is good for industrial use.
  • 25. D I F F E R E N C E B E T W E E N P G P A N D S / M I M E 4. PGP is less efficient than S/MIME. While it is more efficient than PGP. 5. It depends on user key exchange. Whereas it relies on a hierarchically valid certificate for key exchange. 6. PGP is comparatively less convenient. While it is more convenient than PGP due to the secure transformation of all the applications.
  • 26. D I F F E R E N C E B E T W E E N P G P A N D S / M I M E 7. PGP contains 4096 public keys. While it contains only 1024 public keys. 8. PGP is the standard for strong encryption. While it is also the standard for strong encryption but has some drawbacks. 9. PGP is also be used in VPNs. While it is not used in VPNs, it is only used in email services. 10. PGP uses Diffier hellman digital signature. While it uses Elgamal digital signature.