SlideShare a Scribd company logo
Electronic Mail Security
By
G NAVEEN
Types of electronic mail security
 Pretty Good Privacy
 S/Mime
Pretty Good Privacy
 Developed almost entirely by Phil
Zimmerman
 Free, worldwide, works across a variety of
platforms.
 Based on known algorithms such as RSA
Authentication
 The steps for authentication are as follows
– The sender creates a message
– SHA-1 is used to generate 160-bit hash code
– Hash code is encrypted with RSA using senders
private key
– Receiver uses RSA to decrypt the hash code
– Receiver generates a new hash code and
compares with the decrypted one
Confidentiality
 The steps to obtain confidentiality are as follows
– The sender generates a message and a random 128-bit
number called the session key
– The message is encrypted with CAST-128
– The session key is encrypted with recipients’ public key
using RSA
– The recipient uses RSA with its private key to decrypt the
session key
– The session key decrypts the message
Confidentiality and Authentication
 To have both confidentiality and
authentication
– The sender first signs the message using it’s own
private key
– Then encrypts the message with the session with
the session key
– Then encrypts the session key with the recipient’s
private key
Compression
 PGP compresses files using a ZIP algorithm
– The signature is generated before compression
 To store the uncompressed message with the signature
 Would interfere with compression because of multiple
compression algorithms exist.
– Message encryption is after compression
 To strengthen cryptographic security, as it reduces
redundancy
Compatibility
 E-mail sends only ASCII characters
– Because of this PGP converts message to ASCII
 Converts three octets into four ASCII characters
 Expands message by 33%
 After compression, there is a net reduction by a third
Segmentation and Reassembly
 Some mail providers impose a maximum
length of 50,000 octets
– PGP will automatically subdivide any message
too large into small enough segments to send via
e-mail
 This is done after all other processing
Cryptographic Keys
 PGP uses four types of keys
– Session keys
– Public keys
– Private Keys
– Passphrase keys
Cryptographic Keys
 Three requirements for the keys
– Needs a mean of generating unpredictable
session keys
– Would like a way to allow each user to have
multiple public/private key pairs
– Maintain a file of the public/private key pairs
Session Key Generation
 Random 128-bit numbers are generated
using CAST-128
 Input to the number generator takes in is a
128-bit key and two 64-bit blocks of plaintext.
– Input is determined by keystrokes and the times
the keystrokes are made
– Input is also effected by previous key outputs
Key identifiers
 With multiple private/public key pairs, there
needs to be a way for the receiver to know
which to use
– How this is done is through the combination of a
64 bit key ID, which is unique to a user ID.
 With this key ID, the receiver can retrieve the correct
public key of the sender to decrypt the message.
 A list of these key ID’s are placed in what is called a key
ring.
Key Rings
 There are both public and private key rings
– A user needs a passphrase key in order to retrieve a
private key, or to encrypt with a private key
– When creating a private key
 The user selects the passphrase to be used
 The system generates a new public/private key pair using
RSA, and using SHA-1 a 160-bit hash code is generated
from the passphrase
 The system encrypts the private key using CAST-128 with
the 128 bits of the hash code of the key and then the hash
code is discarded
Key Ring – Signing the message
 PGP retrieves sender’s private key using
user-id as an index.
 PGP prompts the user for the passphrase to
recover unencrypted private key
 Constructs signature component of the
message
Key Ring – Encrypting the Message
 PGP generates session key and uses it to
encrypt the message
 PGP retrieves the recipient’s public key from
it’s public-key ring using their user ID as an
index
 The session key of the message is
constructed
Key Ring – Decrypting the Message
 PGP retrieves the receiver’s private key from
the private-key ring using the key ID in the
session key component of the message as
an index
 PGP prompts the user for the passphrase to
recover the unencrypted private key
 PGP recovers the session key and decrypts
the message.
Key Ring – Authenticating the Message
 PGP retrieves the sender’s public key from
the public-key ring using the key ID from the
signature portion of the message as an
index.
 PGP recovers the transmitted message
digest
 PGP computers the message digest for the
received message
The Use of Trust
 Each public-key ring has a signature and a
signature trust entry for each public key
– This entry indicates the degree the PGP user
trusts the signer to certify public keys.
 Each public-key ring has a owner trust field
– This entry indicates the degree to which the public
key is trusted to sign other public key certificates.
S/MIME
 Stands for Secure/Multipurpose Internet Mail
Extension
 Security enhancement to the MIME internet
e-mail format
MIME – Header Files
 There are five message header fields
– MIME-Version
– Content-Type
– Content-Transferring Encoding
– Content-ID
– Content-Description
MIME – Content Types
 Text
– Plain
– Enriched
 Multipart
– Mixed
– Parallel
– Alternative
– Digest
MIME – Content Types
 Message
– Rfc822
– Partial
– External-body
 Image
– Jpeg
– Gif
 Video
– mpeg
Mime – Content Type
 Audio
– Basic
 Application
– PostScript
– Octet-stream
MIME – Content Transferring Encoding
 Two types
– Quoted printable
 Used when data consists largely of octets.
 Limits message lines to 76 characters.
– Base64 transfer encoding
 Common for encoding arbitrary binary data.
S/MIME Functionality
 S/MIME provides the following functions
– Enveloped Data
 Consists of encrypted content of any type of encrypted
content encryption keys
– Signed Data
 Contains a digital signature
– Clear-signed data
 Encoded digital signature
– Signed and enveloped data
 Encrypted and Signed data
S/MIME – Cryptographic Algorithms
 Create message digest to form digital
signature
– Must use SHA-1, Should support MD5
 Encrypt message digest to form signature
– Must support DSS, Should support RSA
 Encrypt session key for transmission
– Should support Diffie-Hellman, Must support RSA
S/MIME – Cryptographic Algorithms
 Encrypt message for transmission with one-
time session key
– Must support triple DES, Should support AES,
Should support RC2/40
 Create a message authentication code
– Must support HMAC with SHA-1, Should support
HMAC with SHA-1
S/MIME – User Agent Role
 Key generation
– Generating key with RSA
 Registration
– Register a user’s public key must be registered
with a certification authority
 Certificate storage and retrieval
– Access to a local list of certificates in order to
verify incoming signatures and encrypt outgoing
S/MIME – Enhanced Security Services
 Signed receipts
– The receiver returns a signed receipt back to the
sender to verify the message arrived
 Security labels
– Permission, priority or role of message being sent
 Secure mailing lists
– Sending to multiple recipients at once securely by
using a public key for the whole mailing list

More Related Content

Similar to S-MIMEemail-security.ppt

ch15.ppt
ch15.pptch15.ppt
ch15.ppt
witscollege
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
ssuser6602e0
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
qwerrew1
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Punnya Babu
 
Network security
Network securityNetwork security
Network security
SVijaylakshmi
 
Pgp1
Pgp1Pgp1
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
Tania Agni
 
Email sec11
Email sec11Email sec11
Email sec11
Athira Asakumar
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
ChaitanyaK65
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Pgp
PgpPgp
Pgp
PgpPgp
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
limsh
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
Venkatesh Iyer
 
Unit 4
Unit 4Unit 4
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.ppt
maniklal123
 

Similar to S-MIMEemail-security.ppt (20)

ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Email security
Email securityEmail security
Email security
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Network security
Network securityNetwork security
Network security
 
Pgp1
Pgp1Pgp1
Pgp1
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Email sec11
Email sec11Email sec11
Email sec11
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Pgp
PgpPgp
Pgp
 
Pgp
PgpPgp
Pgp
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Unit 4
Unit 4Unit 4
Unit 4
 
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.ppt
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 

S-MIMEemail-security.ppt

  • 2. Types of electronic mail security  Pretty Good Privacy  S/Mime
  • 3. Pretty Good Privacy  Developed almost entirely by Phil Zimmerman  Free, worldwide, works across a variety of platforms.  Based on known algorithms such as RSA
  • 4. Authentication  The steps for authentication are as follows – The sender creates a message – SHA-1 is used to generate 160-bit hash code – Hash code is encrypted with RSA using senders private key – Receiver uses RSA to decrypt the hash code – Receiver generates a new hash code and compares with the decrypted one
  • 5. Confidentiality  The steps to obtain confidentiality are as follows – The sender generates a message and a random 128-bit number called the session key – The message is encrypted with CAST-128 – The session key is encrypted with recipients’ public key using RSA – The recipient uses RSA with its private key to decrypt the session key – The session key decrypts the message
  • 6. Confidentiality and Authentication  To have both confidentiality and authentication – The sender first signs the message using it’s own private key – Then encrypts the message with the session with the session key – Then encrypts the session key with the recipient’s private key
  • 7. Compression  PGP compresses files using a ZIP algorithm – The signature is generated before compression  To store the uncompressed message with the signature  Would interfere with compression because of multiple compression algorithms exist. – Message encryption is after compression  To strengthen cryptographic security, as it reduces redundancy
  • 8. Compatibility  E-mail sends only ASCII characters – Because of this PGP converts message to ASCII  Converts three octets into four ASCII characters  Expands message by 33%  After compression, there is a net reduction by a third
  • 9. Segmentation and Reassembly  Some mail providers impose a maximum length of 50,000 octets – PGP will automatically subdivide any message too large into small enough segments to send via e-mail  This is done after all other processing
  • 10. Cryptographic Keys  PGP uses four types of keys – Session keys – Public keys – Private Keys – Passphrase keys
  • 11. Cryptographic Keys  Three requirements for the keys – Needs a mean of generating unpredictable session keys – Would like a way to allow each user to have multiple public/private key pairs – Maintain a file of the public/private key pairs
  • 12. Session Key Generation  Random 128-bit numbers are generated using CAST-128  Input to the number generator takes in is a 128-bit key and two 64-bit blocks of plaintext. – Input is determined by keystrokes and the times the keystrokes are made – Input is also effected by previous key outputs
  • 13. Key identifiers  With multiple private/public key pairs, there needs to be a way for the receiver to know which to use – How this is done is through the combination of a 64 bit key ID, which is unique to a user ID.  With this key ID, the receiver can retrieve the correct public key of the sender to decrypt the message.  A list of these key ID’s are placed in what is called a key ring.
  • 14. Key Rings  There are both public and private key rings – A user needs a passphrase key in order to retrieve a private key, or to encrypt with a private key – When creating a private key  The user selects the passphrase to be used  The system generates a new public/private key pair using RSA, and using SHA-1 a 160-bit hash code is generated from the passphrase  The system encrypts the private key using CAST-128 with the 128 bits of the hash code of the key and then the hash code is discarded
  • 15. Key Ring – Signing the message  PGP retrieves sender’s private key using user-id as an index.  PGP prompts the user for the passphrase to recover unencrypted private key  Constructs signature component of the message
  • 16. Key Ring – Encrypting the Message  PGP generates session key and uses it to encrypt the message  PGP retrieves the recipient’s public key from it’s public-key ring using their user ID as an index  The session key of the message is constructed
  • 17. Key Ring – Decrypting the Message  PGP retrieves the receiver’s private key from the private-key ring using the key ID in the session key component of the message as an index  PGP prompts the user for the passphrase to recover the unencrypted private key  PGP recovers the session key and decrypts the message.
  • 18. Key Ring – Authenticating the Message  PGP retrieves the sender’s public key from the public-key ring using the key ID from the signature portion of the message as an index.  PGP recovers the transmitted message digest  PGP computers the message digest for the received message
  • 19. The Use of Trust  Each public-key ring has a signature and a signature trust entry for each public key – This entry indicates the degree the PGP user trusts the signer to certify public keys.  Each public-key ring has a owner trust field – This entry indicates the degree to which the public key is trusted to sign other public key certificates.
  • 20. S/MIME  Stands for Secure/Multipurpose Internet Mail Extension  Security enhancement to the MIME internet e-mail format
  • 21. MIME – Header Files  There are five message header fields – MIME-Version – Content-Type – Content-Transferring Encoding – Content-ID – Content-Description
  • 22. MIME – Content Types  Text – Plain – Enriched  Multipart – Mixed – Parallel – Alternative – Digest
  • 23. MIME – Content Types  Message – Rfc822 – Partial – External-body  Image – Jpeg – Gif  Video – mpeg
  • 24. Mime – Content Type  Audio – Basic  Application – PostScript – Octet-stream
  • 25. MIME – Content Transferring Encoding  Two types – Quoted printable  Used when data consists largely of octets.  Limits message lines to 76 characters. – Base64 transfer encoding  Common for encoding arbitrary binary data.
  • 26. S/MIME Functionality  S/MIME provides the following functions – Enveloped Data  Consists of encrypted content of any type of encrypted content encryption keys – Signed Data  Contains a digital signature – Clear-signed data  Encoded digital signature – Signed and enveloped data  Encrypted and Signed data
  • 27. S/MIME – Cryptographic Algorithms  Create message digest to form digital signature – Must use SHA-1, Should support MD5  Encrypt message digest to form signature – Must support DSS, Should support RSA  Encrypt session key for transmission – Should support Diffie-Hellman, Must support RSA
  • 28. S/MIME – Cryptographic Algorithms  Encrypt message for transmission with one- time session key – Must support triple DES, Should support AES, Should support RC2/40  Create a message authentication code – Must support HMAC with SHA-1, Should support HMAC with SHA-1
  • 29. S/MIME – User Agent Role  Key generation – Generating key with RSA  Registration – Register a user’s public key must be registered with a certification authority  Certificate storage and retrieval – Access to a local list of certificates in order to verify incoming signatures and encrypt outgoing
  • 30. S/MIME – Enhanced Security Services  Signed receipts – The receiver returns a signed receipt back to the sender to verify the message arrived  Security labels – Permission, priority or role of message being sent  Secure mailing lists – Sending to multiple recipients at once securely by using a public key for the whole mailing list