SlideShare a Scribd company logo
Secure Mail Applications
Presented by:-
Ashok Panwar
Technical Officer in ECIL (NPCIL)
Tarapur, Mumbai
1
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 2
From both, PGP has been the one that became an standard for
secure e-mail clients on closed environments.
Therefore we'll see only some of the generic aspects of PEM and we
will analyze PGP in deeply.
The secure e-mail
In the beginning of the 90´s two systems or applications of secure
email appear:
 PEM: Private Enhanced Mail
 PGP: Pretty Good Privacy
On open systems as in the case of the Internet, the secure email is
achieved through the plataform S/MIME which means Secure
Multipurpose Internet Mail Extensions.
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 3
• It is a proposal of the IETF Internet Engineering Task Force in
1985. The technic document is published in 1993.
• The technic specifications are in RFCs Request For Comments
numbers 1421, 1422, 1423 and 1424.
• It used to link to protocol SMTP Simple Mail Internet Protocol.
• Encryption of the information: DES in CBC mode.
• Generation and key management: RSA from 508 to 1024 bits.
Structure of certificates as per the X.509 rule.
• Session key: DES in CBC mode, Triple DES-EDE.
• Digital signature: RSA, MD2, MD5.
Private Enhanced Mail PEM
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 4
 It is compatible with other engineering models like, for
example, X.400.
 PEM is implemented at the application level:
It is independent from the protocols of the OSI levels
or from lower TCP/IP levels.
It is independent from the operating systems or from
the computer.
 It can be implemented as an independent module that
works with the common email client for the user.
PEM Implementation
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 5
 Security services contemplated:
Source authentication.
Confidentiality.
Integrity of the message.
Non repudiation of the source when key management
with asymmetric key algorithm is used.
 Security services not contemplated:
Access control.
Confidentiality in the traffic of the messages.
Non repudiation of the message by the receiver.
Security services in PEM
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 6
 TIS/PEM
UNIX Plataforms UNIX. Trusted
Information System. Source code
available for citizens or companies from
USA or Canada. It uses a hierarchy of
multilple certification.
 RIPEM
It implements part of the PEM protocols
without certificates for keys
authentication. Free for non commercial
applications. Export forbidden out of the
United States. There are versions
utilized all over the world.
Format and implementation of PEM
Header of the E-mail Service
(Headers of RFC822)
Encapsuled header
Fields related to authentication,
integrity and confidentiality
Encapsuled text
User's message with some optional
fields
Blank line
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 7
 Philip Zimmermann publishes the version 1.0 of PGP in 1991
with minimum requirements of hardware and software.
 In 1992 appears version 2.0 on which programmers from all
over the world participate. Its code it's written out of USA to
avoid the restrictive laws regarding cryptography software and
its legal problems.
 In 1993 version 2.3a appears that is very popular on FTP sites
and valid for several platforms of operating systems.
 In 1994 the Massachusetts Institute of Technology MIT
participates on the project and versions 2.4, 2.5 and 2.6 appear.
 Version 2.6.3i is popularized globally.
Pretty Good Privacy (PGP)
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 8
Though there is more than a software offer for secure mail
besides the PGP program, this became an standard in fact.
Although the last versions of the program oriented to
Windows environments present high capability, the basic
operations continue being the same as in knowing version
2.6.3i.
The new PGP versions on the Windows environment change
very fast therefore it is very difficult to have up-to-date
notes permanently. That's why the version 2.6.3i will be
used as a simple version for explanation of the cipher and
signing operations with PGP and, subsequently, we'll go
through the characteristics of versions 6.5.1 and 8.0, one of
the lasts.
Explanatory note about PGP versions
The philosophy of new versions is exactly the same...
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 9
 If you don´t know PGP or you have never worked with this
environment, I recommend you to download from the Web
page of the Thematic Netowork CriptoRed the file of PGP
2.6.3i Guide on html format indicated. (SW in Spanish).
 This application will be useful to lern quickly the
commands and utilities of this PGP version, very similar to
the current ones. PGP 2.6.3i has a size less than a 1,4 MB
diskette, though all its operations are in command mode.
PGP Guide 2.6.3i


Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 10
 PGP, on version 2.6.3i (international) became in the
middle of 90´s on a standard. In fact, many users “are still
faithful” to this version.
 It encrypts all different type of data on MS-DOS and
UNIX environments. Its main orientation is the encryption
of the data and the digital signature on electronic mail.
 The basic algorithms that it uses are:
 IDEA to encrypt with secret key system.
 RSA for key agreement and digital signature.
 MD5 for obtaining the hash function of the digital
signature to recover asymmetric private keys and local
encryption.
Characteristics of PGP 2.6.3i
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 11
Compression ZIP • The plaintext and the signature are compressed in order
to be stored or transmitted.
Generation of Keys RSA, MD5 • It generates a public and a private key, finding two prime
numbers very high. The private value is kept encrypted
with IDEA using as the key an MD5 hash of the secret
pass sentence.
Conventional Cipher IDEA • It encrypts the message with a random session key of
128 bits (unique) generated on the sender randomly.
Key Agreement IDEA, RSA • It encrypts the IDEA session key with the public key of
the receiver with RSA and add it to the cryptogram.
Digital Signature MD5, RSA • Hash function MD5 generates a hash of 128 bits, that
represents the complete plaintext, and that is encrypted
with RSA with the private key of the sender. It is added to
the sent message.
E-mail Compatibility Base-64 • It permits to transmit the message to every type of e-mail
applications. It converts the octets into printable
characters.
Segmentation • It divides the final cryptogram into blocks less than
50.000 bytes so that they are transmitted correctly on the
Internet and also recovered right.
Algorithms used in PGP 2.6.3i
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 12
 This operation is useful to maintain protected
files, for instance on the hard drive.
 The access to the plaintext will only be possible if
a key or passphrase that is the passphrase used for
encrypting is known.
 Remember that if after encrypting the file you
physically delete the plaintext -operation that
makes a recording of random ones and zeros on
the storage zone of the disk. it will be impossible
to recover it if you forget the passphrase or secret
key.
Characteristics of local encryption
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 13
Steps:
1. PGP requests a passphrase: this must be long
enough to avoid combination attacks.
2. The hash algorithm MD5 is applied to that
passphrase, generating so a 128 bits key.
3. With that key, PGP encrypts the document with
algorithm IDEA and makes its extension .pgp.
4. As an option, it permits then to make a physical
erase of the plainfile.
Steps of local encryption with IDEA
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 14
Plain Text
PASSWORD
Local Key
with 128 bits
Encrypted
Text
The password is a passphrase. It is
recommended that it has spaces, signs
and punctuation characters
The document is compressed with
ZIP algorithm
The encrypted file
can be saved, for
example, on the
disk.
Optional erase of
the plaintext
Every new cipher requires a password. This can be equal or different.
Remember that with equal password (passphrase), we'll have equal hash.
Scheme of local encryption with IDEA
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 15
 PGP operations to encrypt, decrypt, sign and the
subsequent checking of the digital signature, use the
algorithms of the hash functions, with public key and
secret key seen in previous chapters of this book.
 In order to send and receive secure mail, it is necessary to
count at least with the following keys:
Public key of the receiver.
Pair of asymmetric keys of sender.
Generation of keys with RSA
Operations with asymmetric keys
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 16
Steps:
1. PGP generates a random number of 128 bits that will be the
session key.
2. The message is encrypted with such key using IDEA.
3. The session key is encrypted with the RSA public key of the
receiver and is added to the cryptogram.
4. The identifier ID of the public key of the receiver is added to
the session key encrypted on step 3 as an indicative of the
receiver's identity.
Encryption steps with destination public key
Remember that the e-mail usually is not a real time communication so,
though a key is sent to decrypt the cryptogram on the receiver's side, it is not a
session key in the same terms on which it is used, for instance, on an SSL
communication.
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 17
Plain
Text
Destination's
public key
EncryptedTe
xt
Encryptedse
ssion key
Session
Key
It is seeked on the sender's
public key ring
The document is compressed
before with the ZIP algorithm
We need a session
key ...
Because of compatibility
on e-mail client systems,
an armour (Base 64) is
added before transmitting
it
Encryption with destination public key
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 18
Steps:
1. PGP seeks on the head of the cryptogram the
identifier ID of the user (receiver) that has been
added on the encrypted session key.
2. The private key of the identifier ID is searched on
the private key ring of the receiver.
3. The private key in plain is accessed, decrypting it
with IDEA when the owner ID introduces its
passphrase and the MD5 hash brings the decryption
key.
4. With the private key the session key is decrypted.
5. With the session key the cryptogram is decrypted.
Decryption steps with destination private key
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 19
It is searched on the private
key ring of the receiver
Encrypted
Text
Encrypted
session
key
receiver private
key encrypted
PASSWORD
Decrypted
private key
Session
key
Plain
TextThe armour is finally removed and it is decompressed
Decryption with destination private key
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 20
Plain
Text
Digital
signature
block
Plain
Text
IDEA Encrypt-
ed Private key
PASSWORD
Decrypted
private key
A plain text will be encrypted
We need our private
key...
It can be sent encrypted
if needed as well
Digital signature RSA
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 21
Public key of the
sender
Digital
signature block
PlainText
received
EQUALS ?
Correct
signature
Incorrect
signature
The sender public key is seeked to
decrypt signature
The hash function of the message is calculated on
destination and then we start comparing
Yes
No
RSA digital signature checking
h(M) sent
h(M)
calculated
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 22
NAME OF THE FILE
IDENTIFIER OF PUBLIC KEY OF RECEIVER
SESSION KEY
SEAL OF TIME
IDENTIFIER OF PUBLIC KEY OF SENDER
HASH OF THE MESSAGE
TEXT OF THE USER
COMPONENTS
OF SIGNATURE
COMPONENTS
OF MESSAGE
TWO FIRST OCTETS OF THE HASH
SEAL OF TIME
COMPONENTS OF
SESSION KEY
ZIP
E(eB)
R64
Order of operations
Format of a PGP message addressed to B
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 23
 Generation of keys
RSA: 1.024 - 4.096 bits
Diffie & Hellman: 1.024 - 4.096 bits
 Digital signature
DSS (Digital Signature Standard): 1.024 bits
 Encryption
AES, CAST, IDEA, TripleDES, Twofish
 Hash
SHA-1 (160 bits) and MD5 (128 bits)
Algorithms on new PGP versions
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 24
From version 5.0 to the current ones (versions 8.0 and next) the local
encryption schemes, asymmetric cipher and digital signature have changed
very little though they present bigger capabilities. Nevertheless, remember
that some capabilities will only be activated on commercial versions.
Some versions of PGP in Windows
PGP 6.5.1 PGP 7.0.3 PGP 8.0
Presented by:- Ashok Panwar
Technical Officer in ECIL
Page 25
Secure mail through S/MIME
 S/MIME: Secure Multipurpose Internet Mail Extensions
 Unlike the standard PGP, that is based on the trust among users,
S/MIME uses digital certificates X.509 brought by a Certification
Authority that the e-mail clients must recognized as such.
 It will add encryption and signature services on the e-mail clients
(Outlook Express, Netscape Messenger, ...) in MIME format.
 It creates such an envelope on which the data are embedded
encrypted and/or signed.
 It uses platforms of standards PKCS, Public-Key Cryptography
Standards.

Any Questions ???
Thanks !!!
26

More Related Content

What's hot

Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
PACHIYAPPAN PACHIYAPPAS
 
ip security
ip securityip security
ip security
Chirag Patel
 
Pgp
PgpPgp
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Ip security
Ip security Ip security
Ip security
Dr.K.Sreenivas Rao
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
Infinity Tech Solutions
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Pgp
PgpPgp
Pgp
precy02
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
Mohibullah Saail
 
Ipsec
IpsecIpsec
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
Avadhesh Agrawal
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
Gianni Fiore
 
IP Security
IP SecurityIP Security
IP Security
Ambo University
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 

What's hot (19)

Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
ip security
ip securityip security
ip security
 
Pgp
PgpPgp
Pgp
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Ip security
Ip security Ip security
Ip security
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Pgp
PgpPgp
Pgp
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
Ipsec
IpsecIpsec
Ipsec
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
I psec
I psecI psec
I psec
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 
Wi fi
Wi fiWi fi
Wi fi
 
IP Security
IP SecurityIP Security
IP Security
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 

Similar to Secure Mail Application's by Ashok Panwar

Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
Matthew Chang
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
prateekPallav2
 
G43053847
G43053847G43053847
G43053847
IJERA Editor
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
ikirkton
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
MLG College of Learning, Inc
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Raju Raj
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
Mazin Alwaaly
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 

Similar to Secure Mail Application's by Ashok Panwar (20)

Pgp
PgpPgp
Pgp
 
Pgp
PgpPgp
Pgp
 
Unit 4
Unit 4Unit 4
Unit 4
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
 
G43053847
G43053847G43053847
G43053847
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
 
Ch15
Ch15Ch15
Ch15
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Email security
Email securityEmail security
Email security
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Pgp1
Pgp1Pgp1
Pgp1
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

More from Ashok Panwar

Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarSimulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Ashok Panwar
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Ashok Panwar
 
Routing Protocols in MANET's by Ashok Panwar
Routing Protocols in MANET's by Ashok PanwarRouting Protocols in MANET's by Ashok Panwar
Routing Protocols in MANET's by Ashok Panwar
Ashok Panwar
 
Quality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarQuality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok Panwar
Ashok Panwar
 
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok PanwarPerformance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Ashok Panwar
 
Network Management by Ashok Panwar
Network Management by Ashok PanwarNetwork Management by Ashok Panwar
Network Management by Ashok Panwar
Ashok Panwar
 
Introduction to Security Management by Ashok Panwar
Introduction to Security Management by Ashok PanwarIntroduction to Security Management by Ashok Panwar
Introduction to Security Management by Ashok Panwar
Ashok Panwar
 
Firewalls & Trusted Systems by Ashok Panwar
Firewalls & Trusted Systems by Ashok PanwarFirewalls & Trusted Systems by Ashok Panwar
Firewalls & Trusted Systems by Ashok Panwar
Ashok Panwar
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
Ashok Panwar
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ashok Panwar
 
Ad-hoc networking with AODV
Ad-hoc networking with AODVAd-hoc networking with AODV
Ad-hoc networking with AODV
Ashok Panwar
 

More from Ashok Panwar (11)

Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarSimulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
 
Routing Protocols in MANET's by Ashok Panwar
Routing Protocols in MANET's by Ashok PanwarRouting Protocols in MANET's by Ashok Panwar
Routing Protocols in MANET's by Ashok Panwar
 
Quality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarQuality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok Panwar
 
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok PanwarPerformance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
 
Network Management by Ashok Panwar
Network Management by Ashok PanwarNetwork Management by Ashok Panwar
Network Management by Ashok Panwar
 
Introduction to Security Management by Ashok Panwar
Introduction to Security Management by Ashok PanwarIntroduction to Security Management by Ashok Panwar
Introduction to Security Management by Ashok Panwar
 
Firewalls & Trusted Systems by Ashok Panwar
Firewalls & Trusted Systems by Ashok PanwarFirewalls & Trusted Systems by Ashok Panwar
Firewalls & Trusted Systems by Ashok Panwar
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
 
Ad-hoc networking with AODV
Ad-hoc networking with AODVAd-hoc networking with AODV
Ad-hoc networking with AODV
 

Recently uploaded

Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (20)

Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Secure Mail Application's by Ashok Panwar

  • 1. Secure Mail Applications Presented by:- Ashok Panwar Technical Officer in ECIL (NPCIL) Tarapur, Mumbai 1
  • 2. Presented by:- Ashok Panwar Technical Officer in ECIL Page 2 From both, PGP has been the one that became an standard for secure e-mail clients on closed environments. Therefore we'll see only some of the generic aspects of PEM and we will analyze PGP in deeply. The secure e-mail In the beginning of the 90´s two systems or applications of secure email appear:  PEM: Private Enhanced Mail  PGP: Pretty Good Privacy On open systems as in the case of the Internet, the secure email is achieved through the plataform S/MIME which means Secure Multipurpose Internet Mail Extensions.
  • 3. Presented by:- Ashok Panwar Technical Officer in ECIL Page 3 • It is a proposal of the IETF Internet Engineering Task Force in 1985. The technic document is published in 1993. • The technic specifications are in RFCs Request For Comments numbers 1421, 1422, 1423 and 1424. • It used to link to protocol SMTP Simple Mail Internet Protocol. • Encryption of the information: DES in CBC mode. • Generation and key management: RSA from 508 to 1024 bits. Structure of certificates as per the X.509 rule. • Session key: DES in CBC mode, Triple DES-EDE. • Digital signature: RSA, MD2, MD5. Private Enhanced Mail PEM
  • 4. Presented by:- Ashok Panwar Technical Officer in ECIL Page 4  It is compatible with other engineering models like, for example, X.400.  PEM is implemented at the application level: It is independent from the protocols of the OSI levels or from lower TCP/IP levels. It is independent from the operating systems or from the computer.  It can be implemented as an independent module that works with the common email client for the user. PEM Implementation
  • 5. Presented by:- Ashok Panwar Technical Officer in ECIL Page 5  Security services contemplated: Source authentication. Confidentiality. Integrity of the message. Non repudiation of the source when key management with asymmetric key algorithm is used.  Security services not contemplated: Access control. Confidentiality in the traffic of the messages. Non repudiation of the message by the receiver. Security services in PEM
  • 6. Presented by:- Ashok Panwar Technical Officer in ECIL Page 6  TIS/PEM UNIX Plataforms UNIX. Trusted Information System. Source code available for citizens or companies from USA or Canada. It uses a hierarchy of multilple certification.  RIPEM It implements part of the PEM protocols without certificates for keys authentication. Free for non commercial applications. Export forbidden out of the United States. There are versions utilized all over the world. Format and implementation of PEM Header of the E-mail Service (Headers of RFC822) Encapsuled header Fields related to authentication, integrity and confidentiality Encapsuled text User's message with some optional fields Blank line
  • 7. Presented by:- Ashok Panwar Technical Officer in ECIL Page 7  Philip Zimmermann publishes the version 1.0 of PGP in 1991 with minimum requirements of hardware and software.  In 1992 appears version 2.0 on which programmers from all over the world participate. Its code it's written out of USA to avoid the restrictive laws regarding cryptography software and its legal problems.  In 1993 version 2.3a appears that is very popular on FTP sites and valid for several platforms of operating systems.  In 1994 the Massachusetts Institute of Technology MIT participates on the project and versions 2.4, 2.5 and 2.6 appear.  Version 2.6.3i is popularized globally. Pretty Good Privacy (PGP)
  • 8. Presented by:- Ashok Panwar Technical Officer in ECIL Page 8 Though there is more than a software offer for secure mail besides the PGP program, this became an standard in fact. Although the last versions of the program oriented to Windows environments present high capability, the basic operations continue being the same as in knowing version 2.6.3i. The new PGP versions on the Windows environment change very fast therefore it is very difficult to have up-to-date notes permanently. That's why the version 2.6.3i will be used as a simple version for explanation of the cipher and signing operations with PGP and, subsequently, we'll go through the characteristics of versions 6.5.1 and 8.0, one of the lasts. Explanatory note about PGP versions The philosophy of new versions is exactly the same...
  • 9. Presented by:- Ashok Panwar Technical Officer in ECIL Page 9  If you don´t know PGP or you have never worked with this environment, I recommend you to download from the Web page of the Thematic Netowork CriptoRed the file of PGP 2.6.3i Guide on html format indicated. (SW in Spanish).  This application will be useful to lern quickly the commands and utilities of this PGP version, very similar to the current ones. PGP 2.6.3i has a size less than a 1,4 MB diskette, though all its operations are in command mode. PGP Guide 2.6.3i  
  • 10. Presented by:- Ashok Panwar Technical Officer in ECIL Page 10  PGP, on version 2.6.3i (international) became in the middle of 90´s on a standard. In fact, many users “are still faithful” to this version.  It encrypts all different type of data on MS-DOS and UNIX environments. Its main orientation is the encryption of the data and the digital signature on electronic mail.  The basic algorithms that it uses are:  IDEA to encrypt with secret key system.  RSA for key agreement and digital signature.  MD5 for obtaining the hash function of the digital signature to recover asymmetric private keys and local encryption. Characteristics of PGP 2.6.3i
  • 11. Presented by:- Ashok Panwar Technical Officer in ECIL Page 11 Compression ZIP • The plaintext and the signature are compressed in order to be stored or transmitted. Generation of Keys RSA, MD5 • It generates a public and a private key, finding two prime numbers very high. The private value is kept encrypted with IDEA using as the key an MD5 hash of the secret pass sentence. Conventional Cipher IDEA • It encrypts the message with a random session key of 128 bits (unique) generated on the sender randomly. Key Agreement IDEA, RSA • It encrypts the IDEA session key with the public key of the receiver with RSA and add it to the cryptogram. Digital Signature MD5, RSA • Hash function MD5 generates a hash of 128 bits, that represents the complete plaintext, and that is encrypted with RSA with the private key of the sender. It is added to the sent message. E-mail Compatibility Base-64 • It permits to transmit the message to every type of e-mail applications. It converts the octets into printable characters. Segmentation • It divides the final cryptogram into blocks less than 50.000 bytes so that they are transmitted correctly on the Internet and also recovered right. Algorithms used in PGP 2.6.3i
  • 12. Presented by:- Ashok Panwar Technical Officer in ECIL Page 12  This operation is useful to maintain protected files, for instance on the hard drive.  The access to the plaintext will only be possible if a key or passphrase that is the passphrase used for encrypting is known.  Remember that if after encrypting the file you physically delete the plaintext -operation that makes a recording of random ones and zeros on the storage zone of the disk. it will be impossible to recover it if you forget the passphrase or secret key. Characteristics of local encryption
  • 13. Presented by:- Ashok Panwar Technical Officer in ECIL Page 13 Steps: 1. PGP requests a passphrase: this must be long enough to avoid combination attacks. 2. The hash algorithm MD5 is applied to that passphrase, generating so a 128 bits key. 3. With that key, PGP encrypts the document with algorithm IDEA and makes its extension .pgp. 4. As an option, it permits then to make a physical erase of the plainfile. Steps of local encryption with IDEA
  • 14. Presented by:- Ashok Panwar Technical Officer in ECIL Page 14 Plain Text PASSWORD Local Key with 128 bits Encrypted Text The password is a passphrase. It is recommended that it has spaces, signs and punctuation characters The document is compressed with ZIP algorithm The encrypted file can be saved, for example, on the disk. Optional erase of the plaintext Every new cipher requires a password. This can be equal or different. Remember that with equal password (passphrase), we'll have equal hash. Scheme of local encryption with IDEA
  • 15. Presented by:- Ashok Panwar Technical Officer in ECIL Page 15  PGP operations to encrypt, decrypt, sign and the subsequent checking of the digital signature, use the algorithms of the hash functions, with public key and secret key seen in previous chapters of this book.  In order to send and receive secure mail, it is necessary to count at least with the following keys: Public key of the receiver. Pair of asymmetric keys of sender. Generation of keys with RSA Operations with asymmetric keys
  • 16. Presented by:- Ashok Panwar Technical Officer in ECIL Page 16 Steps: 1. PGP generates a random number of 128 bits that will be the session key. 2. The message is encrypted with such key using IDEA. 3. The session key is encrypted with the RSA public key of the receiver and is added to the cryptogram. 4. The identifier ID of the public key of the receiver is added to the session key encrypted on step 3 as an indicative of the receiver's identity. Encryption steps with destination public key Remember that the e-mail usually is not a real time communication so, though a key is sent to decrypt the cryptogram on the receiver's side, it is not a session key in the same terms on which it is used, for instance, on an SSL communication.
  • 17. Presented by:- Ashok Panwar Technical Officer in ECIL Page 17 Plain Text Destination's public key EncryptedTe xt Encryptedse ssion key Session Key It is seeked on the sender's public key ring The document is compressed before with the ZIP algorithm We need a session key ... Because of compatibility on e-mail client systems, an armour (Base 64) is added before transmitting it Encryption with destination public key
  • 18. Presented by:- Ashok Panwar Technical Officer in ECIL Page 18 Steps: 1. PGP seeks on the head of the cryptogram the identifier ID of the user (receiver) that has been added on the encrypted session key. 2. The private key of the identifier ID is searched on the private key ring of the receiver. 3. The private key in plain is accessed, decrypting it with IDEA when the owner ID introduces its passphrase and the MD5 hash brings the decryption key. 4. With the private key the session key is decrypted. 5. With the session key the cryptogram is decrypted. Decryption steps with destination private key
  • 19. Presented by:- Ashok Panwar Technical Officer in ECIL Page 19 It is searched on the private key ring of the receiver Encrypted Text Encrypted session key receiver private key encrypted PASSWORD Decrypted private key Session key Plain TextThe armour is finally removed and it is decompressed Decryption with destination private key
  • 20. Presented by:- Ashok Panwar Technical Officer in ECIL Page 20 Plain Text Digital signature block Plain Text IDEA Encrypt- ed Private key PASSWORD Decrypted private key A plain text will be encrypted We need our private key... It can be sent encrypted if needed as well Digital signature RSA
  • 21. Presented by:- Ashok Panwar Technical Officer in ECIL Page 21 Public key of the sender Digital signature block PlainText received EQUALS ? Correct signature Incorrect signature The sender public key is seeked to decrypt signature The hash function of the message is calculated on destination and then we start comparing Yes No RSA digital signature checking h(M) sent h(M) calculated
  • 22. Presented by:- Ashok Panwar Technical Officer in ECIL Page 22 NAME OF THE FILE IDENTIFIER OF PUBLIC KEY OF RECEIVER SESSION KEY SEAL OF TIME IDENTIFIER OF PUBLIC KEY OF SENDER HASH OF THE MESSAGE TEXT OF THE USER COMPONENTS OF SIGNATURE COMPONENTS OF MESSAGE TWO FIRST OCTETS OF THE HASH SEAL OF TIME COMPONENTS OF SESSION KEY ZIP E(eB) R64 Order of operations Format of a PGP message addressed to B
  • 23. Presented by:- Ashok Panwar Technical Officer in ECIL Page 23  Generation of keys RSA: 1.024 - 4.096 bits Diffie & Hellman: 1.024 - 4.096 bits  Digital signature DSS (Digital Signature Standard): 1.024 bits  Encryption AES, CAST, IDEA, TripleDES, Twofish  Hash SHA-1 (160 bits) and MD5 (128 bits) Algorithms on new PGP versions
  • 24. Presented by:- Ashok Panwar Technical Officer in ECIL Page 24 From version 5.0 to the current ones (versions 8.0 and next) the local encryption schemes, asymmetric cipher and digital signature have changed very little though they present bigger capabilities. Nevertheless, remember that some capabilities will only be activated on commercial versions. Some versions of PGP in Windows PGP 6.5.1 PGP 7.0.3 PGP 8.0
  • 25. Presented by:- Ashok Panwar Technical Officer in ECIL Page 25 Secure mail through S/MIME  S/MIME: Secure Multipurpose Internet Mail Extensions  Unlike the standard PGP, that is based on the trust among users, S/MIME uses digital certificates X.509 brought by a Certification Authority that the e-mail clients must recognized as such.  It will add encryption and signature services on the e-mail clients (Outlook Express, Netscape Messenger, ...) in MIME format.  It creates such an envelope on which the data are embedded encrypted and/or signed.  It uses platforms of standards PKCS, Public-Key Cryptography Standards. 

Editor's Notes

  1. NOTAS SOBRE EL TEMA:
  2. NOTAS SOBRE EL TEMA:
  3. NOTAS SOBRE EL TEMA:
  4. NOTAS SOBRE EL TEMA:
  5. NOTAS SOBRE EL TEMA:
  6. NOTAS SOBRE EL TEMA:
  7. NOTAS SOBRE EL TEMA:
  8. NOTAS SOBRE EL TEMA:
  9. NOTAS SOBRE EL TEMA:
  10. NOTAS SOBRE EL TEMA:
  11. NOTAS SOBRE EL TEMA:
  12. NOTAS SOBRE EL TEMA:
  13. NOTAS SOBRE EL TEMA:
  14. NOTAS SOBRE EL TEMA:
  15. NOTAS SOBRE EL TEMA:
  16. NOTAS SOBRE EL TEMA:
  17. NOTAS SOBRE EL TEMA:
  18. NOTAS SOBRE EL TEMA:
  19. NOTAS SOBRE EL TEMA:
  20. NOTAS SOBRE EL TEMA:
  21. NOTAS SOBRE EL TEMA:
  22. NOTAS SOBRE EL TEMA:
  23. NOTAS SOBRE EL TEMA:
  24. NOTAS SOBRE EL TEMA: