Chapter 5 Electronic mail security

Size: px
Start display at page:

Download "Chapter 5 Electronic mail security"

Transcription

1 Chapter 5 Electronic mail security Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University bhargavigoswami@gmail.com

2 Topic List 1. Pretty good privacy 2. S/MIME

3 Pretty Good Privacy Philip R. Zimmerman is the creator of PGP. PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.

4 Y named Pretty Good Privacy? Best available cryptographic algorithms. Integrated these algorithms into a generalpurpose application. Independent of operating system and processor. Easy to use commands. Made the package and its documentation, including the source code, freely available via the Internet, bulletin boards, and commercial networks such as AOL (America On Line). Entered into an agreement with a company (Viacrypt, now Network Associates) to provide a fully compatible, low-cost commercial version of PGP

5 Why Is PGP Popular? It is availiable free on a variety of platforms. Based on well known algorithms which are extremely secure. Wide range of applicability. Not developed or controlled by governmental or standards organizations. Internet Standardized RFC 3156.

6 Notations: Ks = Session Key in symmetric encryption. PRa = Private key of A. PUa = Public key of A. EP = public key encryption DP = public key decryption EC = Symmetric encryption DC = Symmetric decryption H = Hash function = Concatenation Z = Compression using ZIP algorithm R64 = Conversion to radix 64 ASCII format.

7 Operational Description Consist of five services: 1. Authentication 2. Confidentiality 3. Compression 4. compatibility 5. Segmentation

8

9

10 1. Authentication 1. The sender creates a message. 2. SHA-1 is used to generate a 160-bit hash code of the message. 3. The hash code is encrypted with RSA using the sender s private key, and the result is prep ended to the message. 4. The receiver uses RSA with the sender s public key to decrypt and recover the hash code. 5. The receiver generates a new hash code for the message and compares it with the decrypted hash code. If the two match, the message is accepted as authentic. The combination of SHA-1 and RSA provides effective digital signature scheme. Alternative to above mentioned combination is DSS/SHA- 1.

11 2. Confidentiality 1. The sender generates a message and a random 128-bit number to be used as a session key for this message only. 2. The message is encrypted using CAST-128 (or IDEA or 3DES) with the session key. 3. The session key is encrypted with RSA using the recipient s public key and is prep ended to the message. 4. The receiver uses RSA with its private key to decrypt and recover the session key. 5. The session key is used to decrypt the message.

12 3. Compression PGP compresses the message after applying the signature but before encryption. Benefit of saving space both for transmission and for file storage. The placement of the compression algorithm is critical. The compression algorithm used is ZIP (described in appendix 5A). The signature is generated before compression for two reasons: one can store only the uncompressed message together with the signature for future verification. Applying the hash function and signature after compression would constrain all PGP implementations to the same version of the compression algorithm. Message encryption is applied after compression to strengthen cryptographic security.

13 4. Compatibility The scheme used is radix-64 conversion (see appendix 5B). The use of radix-64 expands the message by 33%.

14 5. Segmentation and Reassembly Often restricted to a maximum message length of 50,000 octets. Longer messages must be broken up into segments. PGP automatically subdivides a message that is to large. The receiver strip off all headers and reassemble the block.

15

16 PGP makes use of four types of keys: one-time session symmetric keys, public keys, private keys, and Pass phrase-based symmetric keys Three separate requirements: 1. A means of generating unpredictable session keys is needed. 2. We would like to allow a user to have multiple public-key/private-key pairs. One reason is that the user may wish to change his or her key pair from time to time. 3. Each PGP entity must maintain a file of its own public/private key pairs as well as a file of public keys of correspondents.

17 Format of PGP Message

18 A message consists of three components: 1. message component, 2. signature (optional), and 3. session key component (optional). 1. Message Component: Includes the actual data to be stored or transmitted, as well as a filename and a timestamp that specifies the time of creation. 2. Session Key: Includes the session key and the identifier of the recipient s public key that was used by the sender to encrypt the session key.

19 3. Signature Component: includes the following: Timestamp: The time at which the signature was made. Message digest: The 160-bit SHA-1 digest encrypted with the sender s private signature key. Leading two octets of message digest: Enables the recipient to determine if the correct public key was used to decrypt the message digest for authentication by comparing this plaintext copy of the first two octets with the first two octets of the decrypted digest. These octets also serve as a 16-bit frame check sequence for the message. Key ID of sender s public key: Identifies the public key that should be used to decrypt the message digest and, hence, identifies the private key that was used to encrypt the message digest. The entire block is usually encoded with radix-64 encoding.

20 Key Rings Keys need to be stored and organized in a systematic way for efficient and effective use by all parties. For this PGP provide a pair of data structures at each node: Private-Key Ring : to store the public/private key pairs owned by that node and Public-Key Ring : one to store the public keys of other users known at this node.

21 Private Key Ring Each row represents one of the public/private key pairs owned by this user. Can be indexed by either User ID or Key ID. Private key is encrypted using CAST-128 (or IDEA or 3DES) and then stored. Each row contains the entries: Timestamp: The date/time when this key pair was generated. Key ID: The least significant 64 bits of the public key for this entry. Public key: The public-key portion of the pair. Private key: The private-key portion of the pair; this field is encrypted. User ID: Typically, this will be the user s address (e.g., stallings@acm.org). However, the user may choose to associate a different name with each pair (e.g., Stallings, WStallings, WilliamStallings, etc.) or to reuse the same User ID more than once.

22

23 Public Key Ring Store public keys of other users. Public-key ring can be indexed by either User ID or Key ID. Each row contains the entries: Timestamp: The date/time when this entry was generated. Key ID: The least significant 64 bits of the public key for this entry. Public Key: The public key for this entry. User ID: Identifies the owner of this key. Multiple user IDs may be associated with a single public key.

24 Trust Flag byte of Public key Ring Key legitimacy field:indicates the extent to which PGP will trust that this is a valid public key for this user; the higher the level of trust, the stronger is the binding of this user ID to this key. This field is computed by PGP. Signature trust field: indicates the degree to which this PGP user trusts the signer to certify public keys. Owner trust field: indicates the degree to which this public key is trusted to sign other public-key certificates; this level of trust is assigned by the user. Now the question arise, how these rings are used in message transmission and reception?

25

26 PGP Steps: Message Generation: 1. Signing the message. 2. Encrypting the message Message Reception: 1. Decrypting the message. 2. Authenticating the message.

27 PGP Message Generation: 1. Signing the message: 1. PGP retrieves the sender s private key from the private-key ring using your_userid as an index. If your_userid was not provided in the command, the first private key on the ring is retrieved. 2. PGP prompts the user for the passphrase to recover the unencrypted private key. 3. The signature component of the message is constructed. 2. Encrypting the message: 1. PGP generates a session key and encrypts the message. 2. PGP retrieves the recipient s public key from the public-key ring using her_userid as an index. 3. The session key component of the message is constructed.

28

29 PGP Message Reception 1. Decrypting the message: 1. PGP retrieves the receiver s private key from the private-key ring using the Key ID field in the session key component of the message as an index. 2. PGP prompts the user for the passphrase to recover the unencrypted private key. 3. PGP then recovers the session key and decrypts the message. 2. Authenticating the message: 1. PGP retrieves the sender s public key from the publickey ring using the Key ID field in the signature key component of the message as an index. 2. PGP recovers the transmitted message digest. 3. PGP computes the message digest for the received message and compares it to the transmitted message digest to authenticate.

30

31

32 Public Key Management: PGP contains clever, efficient, interlocking set of functions & formats to provide an effective confidentiality & authentication service. Public Key Certificate: Has following fields. Key legitimacy field: Extent to which PGP trust validity of key. Signature trust field: Degree to which PGP trust signer to certify public key. Owner trust field: Degree to which PGP trust signer to certify other certificates.

33 PUBLIC KEY RING: The figure shows the structure of a public-key ring. The user has acquired a number of public keys some directly from their owners and some from a third party such as a key server. The user (you) always trust D,E,F,L. User partially trust A & B. Tree structure indicate which key is signed by which user. Question mark indicate signatory is unknown to this user. E s key is already signed by F, user chose to sign directly. Partially trusted signatories are enough to certify key. See H partially trusted by A and B. N s key is legitimate because it is signed by E but N is not trusted to sign other keys. Although R s key is signed by N, PGP does not consider R s key legitimate. Detached orphan node S, with two unknown signatures may be acquired by key server.

34

35 Revoking Public Keys The owner issue a key revocation certificate. Normal signature certificate with a revote indicator. Corresponding private key is used to sign the certificate.

36 S/MIME

37 S/MIME: Introduction Secure/Multipurpose Internet Mail Extension. Security enhancement to the MIME Internet format standard. S/MIME will probably emerge as the industry standard whereas, PGP for personal security. To understand S/MIME we need to learn RFC822 and MIME.

38 RFC 822/5322 Defines format of text message that is sent using electronic mail. Here, messages are viewed as having an envelope and contents. Envelop contains information for transmission and delivery. Contents compose of the object to be delivered. RFC 5322 standard applies only to the contents. Has parts: Header Body Msg ID (optional) The header is separated from the body by a blank line. The most frequently used keywords are From, To, Subject, and Date. A header line usually consists of a keyword, followed by a colon, followed by the keyword s arguments. One more optional field is Message-ID. This field contains a unique identifier associated with this message. Lets take one example.

39 Example: Date: October 8, :15:49 PM EDT From: William Stallings Subject: The Syntax in RFC 5322 To: Cc: Hello. This section begins the actual message body, which is delimited from the message heading by a blank line.

40 MIME Multipurpose Internet Mail Extension (MIME). Is an extension to the RFC 5322 framework. Address some of the problems and limitations of the use of Simple Mail Transfer Protocol (SMTP). What are limitations of SMTP?

41 Simple Mail Transfer Protocol (SMTP, RFC 822) SMTP Limitations - Can not transmit, or has a problem with: executable files, or other binary files (jpeg image) national language characters (non-ascii) messages over a certain size not allowed. ASCII to EBCDIC translation problems. lines longer than a certain length (72 to 254 characters) not accommodated. Can not handle non textual data included in X.400. SMTP to RFC 821 conversion has following problems: Deletion, addition or reordering of carriage. Truncating or wrapping more than 76 char. Removal of trailing white space. Padding of lines. Converting tab to space. Solution? MIME.

42 MIME Multipurpose Internet Mail Extension. Extension to RFC 822 framework. Address some limitations of SMTP (Simple Mail Transfer Protocol). MIME Elements: Header Fields (Info about body) Content Formats (standard representation & multimedia). Transfer Encodings (conversion & security).

43 Header fields in MIME MIME-Version: Must be 1.0 as parameter value. Confirms RFC 2045, RFC 2046 Content-Type: Describes data contained mechanism & agents. More types are being added by developers (application/word) Content-Transfer-Encoding: Indicate type of transformation used to represent body of msg. How message has been encoded (radix-64). Content-ID: Unique identifying character string. Content Description: Text descriptor of object. Needed when content is not readable text (e.g.,mpeg).

44 MIME Content Types: Dealing with wide variety of information representations in multimedia environment. Lets see its types, subtypes and Description.

45

46 Example:

47

48 MIME Transfer Encoding: Objective: Provide reliable delivery across largest range of environment. Content-Transfer-Encoding field can actually take on 6 values, out of which 3 values (7bit, 8bit, binary) indicate no encoding done. MIME Transfer Encoding Types:

49

50 Native v/s Canonical form The body to be transmitted is created in system s Native format. Body may be unix style text file. Native character set is used and local end of line conversations are used. Un-standardized. Peculiar to particular system. Entire body include out of band information & file attribute information. Body may be rich text word file. Character set conversion, transformation of audio data compression are used. Standardized. Appropriate for all content type.

51 SMIME: Sub Topic List: a) S/MIME Functionality b) Cryptographic Algorithm c) S/MIME Message d) Certificate Processing

52 a) S/MIME Functions Similar to PGP. Offer ability to sign and/or encrypt message. Functions: 1. Enveloped Data: Encrypted content and encrypted session keys for recipients. 2. Signed Data: Message Digest encrypted with private key of signer. 3. Clear-Signed Data: Signed but not encrypted. 4. Signed and Enveloped Data: Various orderings for encrypting and signing.

53 b) Cryptographic Algorithms: Two Imp Terms need to be understood before moving forward: MUST: Absolute requirement of specification must include feature in implementation. SHOULD: May ignore in particular circumstances. Recommended to include feature in implementation.

54

55 c) S/MIME Message: Lets have a look over general procedures for S/MIME message preparation: 1. Securing a MIME Entity. 2. Enveloped Data. 3. Signed Data. 4. Clear Signing. 5. Registration Request. 6. Certificates-Only Message.

56 1. Securing MIME Entity: S/MIME secure MIME entity using encryption and/or signature. Step 1: With normal rules, MIME entity is prepared. Step 2: Then over that algorithm identifiers and certificates are processed by SMIME producing PKCS objects (Public Key Cryptographic Specification). Step 3: PKCS is treated as message content, wrapped around in MIME (adding headers) and sent after converting to canonical form.

57 2. Enveloped Data Object is represented in form BER (Basic Encoding Rules). Step1: Generate a pseudorandom session key for a particular symmetric encryption algorithm (RC2/40 or triple DES). Step2: encrypt the session key with the recipient s public RSA key. Step 3: prepare a block known as RecipientInfo that contains an identifier of the recipient s public-key certificate,3 an identifier of the algorithm used to encrypt the session key, and the encrypted session key. Step4: Encrypt the message content with the session key. The RecipientInfo blocks followed by the encrypted content constitute the envelopeddata. This information is then encoded into base64.

58 Eg: Content-Type: application/pkcs7-mime; smimetype=envelopeddata; name=smime.p7m Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=smime.p7m rfvbnj756tbbghyhhhuujhjhjh77n8hhgt9hg4v QpfyF467GhIGfHfYT67n8HHGghyHhHUujhJh 4VQpfyF467GhIGfHfYGTrfvbnjT6jH7756tbB9 Hf8HHGTrfvhJhjH776tbB9HG4VQbnj7567GhI GfHfYT6ghyHhHUujpfyF40GhIGfHfQbnj756Y T64V

59 3. Signed Data Can be used with one or more signers. We consider single digital signature. Step 1: Select a message digest algorithm (SHA or MD5). Step 2: Compute the message digest (hash function) of the content to be signed. Step 3: Encrypt the message digest with the signer s private key. Step 4: Prepare a block known as SignerInfo that contains the signer s publickey certificate, an identifier of the message digest algorithm, an identifier of the algorithm used to encrypt the message digest, and the encrypted message digest.

60 Eg: Content-Type: application/pkcs7-mime; smimetype=signeddata; name=smime.p7m Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=smime.p7m 567GhIGfHfYT6ghyHhHUujpfyF4f8HHGTrfvhJh jh776tbb9hg4vqbnj777n8hhgt9hg4vqpfyf 467GhIGfHfYT6rfvbnj756tbBghyHhHUujhJhj HHUujhJh4VQpfyF467GhIGfHfYGTrfvbnjT6j H7756tbB9H7n8HHGghyHh6YT64V0GhIGfHfQ bnj75

61 4. Clear Signing: achieved using the multipart content type with a signed subtype. recipients with MIME capability but not S/MIME capability are able to read the incoming message. Two Parts: MIME type but must be prepared so that it will not be altered during transfer. Second part has a MIME content type of application and a subtype of pkcs7- signature.

62 Eg: Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary=boundary42 boundary42 Content-Type: text/plain This is a clear-signed message. boundary42 Content-Type: application/pkcs7-signature; name=smime.p7s Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=smime.p7s ghyhhhuujhjhjh77n8hhgtrfvbnj756tbb9hg4vqpfyf467ghi GfHfYT64VQpfyF467GhIGfHfYT6jH77n8HHGghyHhHUujhJ h756tbb9hgtrfvbnjn8hhgtrfvhjhjh776tbb9hg4vqbnj75 67GhIGfHfYT6ghyHhHUujpfyF47GhIGfHfYT64VQbnj756 boundary42

63 5. Registration Request: an application or user will apply to a certification authority for a public-key certificate. The certification request includes Certification RequestInfo block, followed by an identifier of the public-key encryption algorithm, followed by the signature of the certificationrequestinfo block made using the sender s private key. certificationrequestinfo block includes a name of the certificate subject (the entity whose public key is to be certified) and a bit-string representation of the user s public key. 6. Certificates Only Message: A message containing only certificates or a certificate revocation list (CRL) can be sent in response to a registration request. The steps involved are the same as those for creating a signeddata message.

64 c) S/MIME Message: S/MIME secure MIME entity using encryption and/or signature. Step 1: With normal rules, MIME entity is prepared. Step 2: Then over that algorithm identifiers and certificates are processed by SMIME producing PKCS objects (Public Key Cryptographic Specification). Step 3: PKCS is treated as message content, wrapped around in MIME (adding headers) and sent after converting to canonical form.

65

66 6. S/MIME Certificate Processing: S/MIME uses public key certificates that confirm to version 3 of X.509. S/MIME managers and users must configure each client with a list of trusted keys with CRL(certificate revocation list). Sub topics: User Agent Role VeriSign Certificates Enhanced Security Services

67 Algorithms Used Message Digesting: SHA-1 and MDS Digital Signatures: DSS Secret-Key Encryption: Triple-DES, RC2/40 (exportable) Public-Private Key Encryption: RSA with key sizes of 512 and 1024 bits, and Diffie- Hellman (for session keys).

68 User Agent Role Functions: Key Generation - Diffie-Hellman, DSS, and RSA key-pairs. Registration - Public keys must be registered with X.509 CA. Certificate Storage - Local (as in browser application) for different services. Signed and Enveloped Data - Various orderings for encrypting and signing.

69 VeriSign Certificates: There are several companies that provide certification authority (CA) services compatible with S/MIME. VeriSign issues X.509 certificates with the product name VeriSign Digital ID. Over 35,000 commercial Web sites were using VeriSign Server Digital Ids in 1998.

70 Digital ID contains: Owner s public key Owner s name or alias Expiration date of the Digital ID Serial number of the Digital ID Name of the certification authority that issued the Digital ID Digital signature of the certification authority that issued the Digital ID Digital IDs can also contain other usersupplied information, including Address address Basic registration information (country, zip code, age, and gender)

71 Procedures followed: Class-1: Buyer s address confirmed by ing vital info. Class-2: Postal address is confirmed as well, and data checked against directories. Class-3: Buyer must appear in person, or send notarized documents. Lets see the difference between them each three class. Remember following terms: IA = Issuing Authority CA = Certification Authority PCA = VeriSign public primary certification authority PIN = Personal Identification Number LRAA = Local Registration Authority Administrator

72

73 Enhanced Security Services: 3 enhanced security services have been proposed in an Internet draft: Signed receipt: A signed receipt may be requested in a SignedData object. Returning a signed receipt provides proof of delivery to the originator of a message. Security labels: included in SignedData object. A security label is a set of security information regarding the sensitivity of the content that is protected by S/MIME encapsulation. Secure mailing lists: When a user sends a message to multiple recipients, a certain amount of per-recipient processing is required. S/MIME Mail List Agent (MLA). An MLA can take a single incoming message, perform the recipient-specific encryption for each recipient, and forward the message.

74 Chapter 5/7 Ends Here So remain ready with the assignments and test. Its high time, start preparing for Network Security and other subjects. Also learn current technology like Android, Iphone, PHP,.NET.

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 19 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear, the Board's access to other sources

More information

Summary of PGP Services

Summary of PGP Services Table 15.1 Summary of PGP Services Function Algorithms Used Description Digital signature Message encryption Compression Email compatibility DSS/SHA or RSA/SHA CAST or IDEA or Three-key Triple DES with

More information

Electronic mail security

Electronic mail security Electronic mail security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Pretty Good Privacy (PGP) S/MIME 2 1 Pretty Good Privacy Philip R.

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Pretty Good Privacy (PGP

Pretty Good Privacy (PGP PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) -- PGP services -- PGP key management (c) Levente Buttyán (buttyan@crysys.hu) What is PGP? general purpose application to protect (encrypt and/or sign) files can be used to protect

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

Internet Security Enhanced Security Services for S/MIME. Thomas Göttlicher

Internet Security Enhanced Security Services for S/MIME. Thomas Göttlicher Internet Security Enhanced Security Services for S/MIME Thomas Göttlicher April 20, 2004 Contents 1 Introduction 3 2 Technical 4 2.1 Internet Layer........................... 4 2.2 Compatibility...........................

More information

Key management. Pretty Good Privacy

Key management. Pretty Good Privacy ECE 646 - Lecture 4 Key management Pretty Good Privacy Using the same key for multiple messages M 1 M 2 M 3 M 4 M 5 time E K time C 1 C 2 C 3 C 4 C 5 1 Using Session Keys & Key Encryption Keys K 1 K 2

More information

Telemetry Data Sharing Using S/MIME

Telemetry Data Sharing Using S/MIME Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

draft-ietf-smime-msg-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Message Specification Status of this memo

draft-ietf-smime-msg-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Message Specification Status of this memo Internet Draft draft-ietf-smime-msg-06.txt December 14, 1998 Expires in six months Editor: Blake Ramsdell, Worldtalk Status of this memo S/MIME Version 3 Message Specification This document is an Internet-Draft.

More information

S/MIME Security Services

S/MIME Security Services This chapter contains the following sections: Overview of, page 1 in Email Security Appliance, page 1 Signing, Encrypting, or Signing and Encrypting Outgoing Messages using S/MIME, page 5 Verifying, Decrypting,

More information

S/MIME Security Services

S/MIME Security Services This chapter contains the following sections: Overview of, on page 1 in Email Security Appliance, on page 1 Signing, Encrypting, or Signing and Encrypting Outgoing Messages using S/MIME, on page 4 Verifying,

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Lecture 4: Cryptography III; Security. Course Administration

Lecture 4: Cryptography III;  Security. Course Administration Lecture 4: Cryptography III; Email Security CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Course Administration HW/Lab 1 Posted Due at 11am on Sep 29 Labs are active starting this week

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E ECE 646 Lecture 4 Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 18.1 or 19.1 Pretty Good Privacy (PGP) On-line Chapters

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

ECE 646 Lecture 4. Pretty Good Privacy PGP

ECE 646 Lecture 4. Pretty Good Privacy PGP ECE 646 Lecture 4 Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 6/E or 7/E Chapter 19.1 Pretty Good Privacy (PGP) On-line Chapters (available

More information

IBM Systems and Technology Group

IBM Systems and Technology Group IBM Systems and Technology Group Encryption Facility for z/os Update Steven R. Hart srhart@us.ibm.com 2013 IBM Corporation Topics Encryption Facility for z/os EF OpenPGP Support X.509 vs. OpenPGP Certificates

More information

Category: Standards Track Drummond Group C. Shih Gartner Group September 2002

Category: Standards Track Drummond Group C. Shih Gartner Group September 2002 Network Working Group Request for Comments: 3335 Category: Standards Track T. Harding Cyclone Commerce R. Drummond Drummond Group C. Shih Gartner Group September 2002 Status of this Memo MIME-based Secure

More information

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

SECURE SYSTEM USING S/MIME AND IB-PKC

SECURE  SYSTEM USING S/MIME AND IB-PKC SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC S. T. Faraj College of IT, Nahrain University, Al-Jaderiya, Baghdad, Iraq M. T. Ibrahem Dept. of Computer Engineering, University of Baghdad, Al-Jaderiya, Baghdad,

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen October 31, 2007 Pekka Jäppinen, Lappeenranta University of Technology: October 31, 2007 Secured Communications: Key exchange Schneier, Applied Cryptography:

More information

The Research on PGP Private Key Ring Cracking and Its Application

The Research on PGP Private Key Ring Cracking and Its Application The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading ECE 646 Lecture 4A Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 18.1 or 19.1 Pretty Good Privacy (PGP) On-line Chapters

More information

Gestion et sécurité des réseaux informatiques. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Gestion et sécurité des réseaux informatiques. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice: Gestion et sécurité des réseaux informatiques Guy Leduc Chapter 3: Securing applications Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. (section

More information

Chapter 3: Securing applications

Chapter 3: Securing applications Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing applications Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross AddisonWesley, April 2016. (section 8.5)

More information

CSCE 813 Internet Security Secure Services I

CSCE 813 Internet Security Secure  Services I CSCE 813 Internet Security Secure E-Mail Services I Professor Lisa Luo Fall 2017 Previous Class Why do we need cloud computing? Three models of cloud service Software as a service (SaaS) Platform as a

More information

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0) To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0

More information

COMPARISON OF PGP AND S/MIME SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE

COMPARISON OF PGP AND S/MIME  SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE COMPARISON OF PGP AND S/MIME EMAIL SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE TOM KRAMLIK ECE 590:003 MAY 1, 1999 TABLE OF CONTENTS SECTION PAGE NUMBER 1. INTRODUCTION...1 1.1 PURPOSE...1

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

How to make Secure Easier to use

How to make Secure  Easier to use How to make Secure Email Easier to use Simson L. Garfinkel (MIT) Jeffrey I. Schiller (MIT) Erik Nordlander (MIT) David Margrave (Amazon) Robert C. Miller (MIT) http://www.simson.net/smime-survey.html/

More information

Sharing Secrets using Encryption Facility - Handson

Sharing Secrets using Encryption Facility - Handson Sharing Secrets using Encryption Facility - Handson Lab Steven R. Hart IBM March 12, 2014 Session Number 14963 Encryption Facility for z/os Encryption Facility for z/os is a host based software solution

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo HTTP/1.1 200 OK Date: Mon, 08 Apr 2002 23:44:46 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Wed, 20 Mar 1996 23:00:00 GMT ETag: "2e98da-36ef-31508df0" Accept-Ranges: bytes Content-Length: 14063 Connection:

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

Lecture 2 Applied Cryptography (Part 2)

Lecture 2 Applied Cryptography (Part 2) Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo SIP WG J. Peterson Internet-Draft NeuStar Expires: August 2, 2003 February 2003 Status of this Memo SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01 This document is an Internet-Draft

More information

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

draft-ietf-smime-cert-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Certificate Handling Status of this memo

draft-ietf-smime-cert-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Certificate Handling Status of this memo Internet Draft draft-ietf-smime-cert-06.txt December 14, 1998 Expires in six months Editor: Blake Ramsdell, Worldtalk Status of this memo S/MIME Version 3 Certificate Handling This document is an Internet-Draft.

More information

Version 3 X.509 Certificates

Version 3 X.509 Certificates Entrust Technologies White Paper Author: Ian Curry Date: July 1996 Version: 1.0 Entrust Technologies, 1997. All rights reserved. 1 1. Introduction This document provides a description of the version 3

More information

DirectLine for Business AS2 USER GUIDE

DirectLine for Business AS2 USER GUIDE DirectLine for Business AS2 USER GUIDE Contents BMO AS2 Service...1 Introduction... 1 Overview... 1 ICS AS2 Mailbox User... 2 AS2 Mailbox Service Setup...3 Before You Begin... 3 Connectivity Testing...

More information

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33 Background Network Security - Certificates, Keys and Signatures - Dr. John Keeney 3BA33 Slides Sources: Karl Quinn, Donal O Mahoney, Henric Johnson, Charlie Kaufman, Wikipedia, Google, Brian Raiter. Recommended

More information

PKCS #7: Cryptographic Message Syntax Standard

PKCS #7: Cryptographic Message Syntax Standard PKCS #7: Cryptographic Message Syntax Standard An RSA Laboratories Technical Note Version 1.5 Revised November 1, 1993 * 1. Scope This standard describes a general syntax for data that may have cryptography

More information

Internet Engineering Task Force (IETF) Request for Comments: 6032 Category: Standards Track. December 2010

Internet Engineering Task Force (IETF) Request for Comments: 6032 Category: Standards Track. December 2010 Internet Engineering Task Force (IETF) Request for Comments: 6032 Category: Standards Track ISSN: 2070-1721 S. Turner IECA R. Housley Vigil Security December 2010 Cryptographic Message Syntax (CMS) Encrypted

More information

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University Chapter 6 IP Security Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University +91 9426669020 bhargavigoswami@gmail.com Topic List 1. IP Security Overview 2. IP Security Architecture 3.

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

ICS 180 May 4th, Guest Lecturer: Einar Mykletun

ICS 180 May 4th, Guest Lecturer: Einar Mykletun ICS 180 May 4th, 2004 Guest Lecturer: Einar Mykletun 1 Symmetric Key Crypto 2 Symmetric Key Two users who wish to communicate share a secret key Properties High encryption speed Limited applications: encryption

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename 6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename Certificate formats (DER, PEM, PKCS #12) 6.2 Certificate Authorities

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Accessing the Ministry Secure File Delivery Service (SFDS)

Accessing the Ministry Secure File Delivery Service (SFDS) Ministry of Health Services Accessing the Ministry Secure File Delivery Service (SFDS) A Guide for New Users To SFDS And Digital Certificate Installation May 2004 Preface Purpose Audience Structure This

More information

PKCS #10 v1.7: Certification Request Syntax Standard (Final draft)

PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) RSA Laboratories May 4 th, 2000 Editor s note: This is the final draft of PKCS #10 v1.7, which is available for a 14-day public review

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

Securing Communications

Securing Communications Securing Communications Overview Client/Server Authentication (Kerberos) Remote User Authentication Service (RADIUS) Public-Key Infrastructure (PKI) IP Layer Security (IPSec) Web Access Security (SSL)

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4 Lotus Protector Mail Security and Mail Encryption Interop Guide Lotus Protector Interop Guide Mail Encryption 2.1.0.1 Mail Security 2.5.1 Version 1.4 Lotus Protector Mail Security and Mail Encryption Configuration

More information

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Ralph Durkee Independent Consultant  Security Consulting, Security Training, Systems Administration, and Software Development Ralph Durkee Independent Consultant www.rd1.net Security Consulting, Security Training, Systems Administration, and Software Development PGP and GnuPG Rochester OWASP Agenda: Generic Public Key Encryption

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

Contents Digital Signatures Digital Signature Properties Direct Digital Signatures

Contents Digital Signatures Digital Signature Properties Direct Digital Signatures Contents Digital Signatures... 197 Digital Signature Properties... 198 Direct Digital Signatures... 198 199...قابلداوری Arbitrated Digital Signatures Arbitrated Digital Signature Technaiques... 200 Authentication

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Chapter 6/8. IP Security

Chapter 6/8. IP Security Chapter 6/8 IP Security Prof. Bhargavi H Goswami Department of MCA, Sunshine Group of Institutes, Rajkot, Gujarat, India. Mob: +918140099018. Email: bhargavigoswami@gmail.com Topic List 1. IP Security

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Sicurezza Informatica: esercitazione 2

Sicurezza Informatica: esercitazione 2 Sicurezza Informatica: esercitazione 2 Cataldo Basile < cataldo.basile @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Outline two main topics inspection of PKCS#7 messages certificate

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Introduction to Cryptography. Vasil Slavov William Jewell College

Introduction to Cryptography. Vasil Slavov William Jewell College Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: January 2010

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: January 2010 Internet Engineering Task Force (IETF) S. Turner Request for Comments: 5753 IECA Obsoletes: 3278 D. Brown Category: Informational Certicom ISSN: 2070-1721 January 2010 Abstract Use of Elliptic Curve Cryptography

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

PKI Trustpool Management

PKI Trustpool Management PKI Trustpool Management Last Updated: October 9, 2012 The PKI Trustpool Management feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information