COMPARISON OF PGP AND S/MIME SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE

Size: px
Start display at page:

Download "COMPARISON OF PGP AND S/MIME SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE"

Transcription

1 COMPARISON OF PGP AND S/MIME SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE TOM KRAMLIK ECE 590:003 MAY 1, 1999

2 TABLE OF CONTENTS SECTION PAGE NUMBER 1. INTRODUCTION PURPOSE SCOPE DOCUMENT ORGANIZATION PGP OVERVIEW CIPHERS AND ALGORITHMS USED PGP PUBLIC KEY CERTIFICATION HIERARCHY IMPLEMENTATIONS OF PGP STRENGTHS AND WEAKNESSES OF PGP OpenPGP Incorporation of X.509 Certificates Use of Non-proprietary Ciphers and Algorithms Compatibility with MIME Export and Import of PGP Free PGP S/MIME OVERVIEW CIPHERS AND ALGORITHMS USED S/MIME PUBLIC KEY CERTIFICATION HIERARCHY IMPLEMENTATIONS OF S/MIME STRENGTHS AND WEAKNESSES OF S/MIME Use of Non-proprietary Standards Compatibility with MIME Incorporation in Commercial Communications Software Costs of Public Key Infrastructure APPLICATION TO CORPORATE ORGANIZATIONS APPLICATION TO LESS THAN 100 USERS APPLICATION TO 1,000 USERS APPLICATION TO 5,000 TO 20,000 USERS CONCLUSIONS ii

3 SECTION 1 INTRODUCTION Competing standards are vying for dominance among users of electronic mail ( ). Today, proponents of secure multipurpose internet mail extension (S/MIME) and pretty good privacy (PGP) are evolving these competing standards to capture a majority share of the corporate market for products. This report provides a summary view of the competition and addresses which standard will likely win. 1.1 PURPOSE This report provides a concise summation of the technical and market strengths and weaknesses of PGP and S/MIME that enables the reader to make an informed choice on which standard will become the defacto option. Further, the report can assist a reader who wishes to choose the best standard for an organization of specific size. 1.2 SCOPE This report considers the strengths and weaknesses of PGP and S/MIME for organizations ranging in size from under 100 users to 20,000 users. The specific ciphers, digital signatures, and certification schemes used are considered. Also, an overview of products using the competing standards are included. 1.3 DOCUMENT ORGANIZATION The report contains 5 sections, including this one. Section 2 provides details on the PGP standard and implementations. Section 3 provides details on the S/MIME standard and implementations. Section 4 provides a comparison of the standards when applied to various size organizations. Section 5 contains conclusions about the potential for each standard. 1

4 SECTION 2 PGP OVERVIEW Pretty good privacy (PGP) exists in several versions and has been evolving to meet the needs of larger organizations. Some industry experts are cited as estimating that percent of all encrypted messages are encrypted with PGP. Pre-existing versions, including PGP 2.6.x which has many variations, and PGP 5.x, also referred to as PGP3, have been used for several years. A new standard, OpenPGP, is based on the PGP version 5.x and is being promoted for widespread use. This section provides an overview of PGP with particular emphasis on the OpenPGP standard. The ciphers, digital signature algorithms, and hierarchy of public key certificates are discussed. Also, particular strengths and weaknesses of the standard are identified. Finally, products using the PGP standard are identified, along with the software market representation of PGP. 2.1 CIPHERS AND ALGORITHMS USED BY PGP OpenPGP uses three key (168-bit total) triple DES (DES EDE3) using the ciphertext feedback (CFB) mode. PGP also includes options for use of IDEA or CAST-128 with 128-bit keys. The movement in development of OpenPGP to triple DES is intended to free the standard from patent issues associated with the use of CAST-128. OpenPGP provides for compression of messages to speed transmission. Messages are compressed before encryption using the ZIP algorithm. This reduces the number of bits and the redundancy in the message, and makes it more difficult to cryptanalyze the message than encrypting alone. Message length is reduced by 50 percent using the ZIP algorithm. OpenPGP uses the hash algorithm SHA-1 and the DSS signature algorithm for generating digital signatures. Older versions of PGP used the MD5 hash algorithm and RSA for signing, but as with CAST-128 this involved patent issues that the proponents of Open PGP are attempting to avoid in promoting the new standard. Table 2-1: Ciphers and Algorithms Used in OpenPGP Algorithm Mandatory Optional Digest Algorithm SHA-1 MD5 Signature Algorithm DSS RSA Session Key Encryption Diffie-Hellman (ElGamal) RSA Content Encryption Triple-DES (CFB-mode) IDEA, CAST-128 Message Authentication Codes HMAC with SHA-1 None Message formats are driven by compatibility with older versions of PGP. The intention, as with many standards enhancements, is to provide backwards compatibility with older PGP products. Also, many systems restrict messages to ASCII characters. Thus, messages secured by PGP undergo Radix-64 conversion to convert to all ASCII characters. This increases the compressed message length by 33 percent. 2

5 2.2 PUBLIC KEY CERTIFICATION HIERARCHY Originally PGP determined the legitimacy of public keys based on a system of trust, referred to as a web of trust, rather than using a standardized and formal system using certification authorities. Three areas are rated according to trust: the legitimacy of the key, the legitimacy of a signature certifying a given key, and the credibility of a particular key owner to attest to the legitimacy of a third party s key. Users can allow others that they trust to vouch for the legitimacy of keys from third parties, and thus build up a set of public key users whom they are confident interacting with. The approach is sensible and, by not involving a centralized certification authority, in keeping with the motivations behind PGP: putting strong cryptographic capabilities in citizens hands and insulating it from interference or weakening by government or industry. PGP public keys owners revoke their key by issuing a signed certificate to all parties they communicate with, and these parties are then responsible for updating their public key rings. It is possible that the person who compromised the key could issue such a revocation, but the current assumption for PGP is that it would be of no benefit to the adversary to do so and only highlights the fact that the key has been compromised. As OpenPGP attempts to gain acceptance, incorporation of X.509 standardized public key certificates is being pursued in products. Network Associates has introduced its Enterprise Security 3.0 suite of applications incorporating X.509 certificates for assessing the legitimacy of other user s public keys. Company representatives cite the need to appeal to a broader market, including large enterprises, as the reason for incorporating use of these certificates with the version 3.0 release. 2.3 IMPLEMENTATIONS OF PGP PGP was originally distributed as free encryption software. PGP s creator, Phil Zimmerman, was motivated by a desire to ensure that ordinary citizens had access to state-ofthe-art cryptographic capabilities for encrypting electronic messages. The creation of PGP was strictly outside of the influence of government to protect it from being weakened to suit its interests. Commercial offerings of PGP are available, and the Enterprise Security software from Network Associates is a good example. The software incorporates the use of X.509 public key certificates, as noted in the previous section. This modification allows the suite to be scaled to whatever size organization may wish to use it; instead of requiring users to maintain their own lists of trusted keys and users, or developing their own enterprise-wide system for administering a list of trusted keys, X.509 certificates can be imported. Thus, the need for a sophisticated corporate effort to certify the keys of other entities is greatly reduced. Table 2-1 provides summary cost information on the Enterprise Security software. 3

6 Table 2-1: Annual Cost For Enterprise-wide PGP Security Software Company Product Price per Enterprise Costs Node 25 Users 100 Users 500 Users 1,000 Users 5,000 Users Network Associates Enterprise Security 3.0 $26 $84 $2,100 $8,400 $13,000 $26,000 $26,000 $130,000 PGP software for security interoperates with software from multiple vendors. Table 2-2 identifies software that can be used as plug-ins with PGP. Table 2-2: Products Compatible with PGP Product Platforms Claris er Macintosh Microsoft Exchange Windows 95 Windows NT 4.0 Microsoft Outlook Windows 95 Windows NT 4.0 Novell Group Wise Windows Lotus Notes Windows Qualcomm Eudora Windows 95 Windows NT 4.0 Macintosh Older commercial implementations of PGP also exist in ViaCrypt PGP software versions 2.7.1, and COMMERCIAL STRENGHTS AND WEAKNESSES OF PGP OpenPGP has been positioned to address several of the major concerns that existed with previous versions. The mandated use of proprietary technologies and other issues have been addressed as discussed in this section. The primary hurdle for PGP at this point appears to be that it lags in the corporate market, and this may be driven by older versions of PGP not being as scalable as the new OpenPGP standard. Hence, the installed base of corporate systems that use PGP appears to be small, as estimated from the lack of major applications that incorporate it PGP Incorporation of X.509 Certificates The primary weakness of older versions of PGP when applied to large organizations was the inability to use X.509 certificates for public keys, as would be generated from a centralized certification authority. Thus, organizations could be faced with a complex challenge of tracking the validity of thousands of keys and the trustworthiness of their users. Such an endeavor could have considerable administrative impacts. 4

7 The original motivation for PGP focused on the individual user. Thus, a system that relied on the trustworthiness of users known to one s self, and the trustworthiness of those these individuals could vouch for was reasonable. Newer PGP implementations and the OpenPGP standard appear to be embracing the use of X.509 certificates, clearing the way to implementations that can scale to large organizations without extensive in-house administrative effort to track public keys of outside organizations and their personnel. Further, a PGP certificate server can still be maintained for keys used within the corporation, or for interaction with others who use PGP Use of Non-proprietary Ciphers and Algorithms PGP uses strong cryptographic techniques, and the OpenPGP standard is free from any patent restrictions associated with particular ciphers. Only publicly available ciphers and hash and signature algorithms are mandated by the OpenPGP standard however, additional ciphers and algorithms may be included as options, or to support compatibility with older implementations. Backwards compatibility for PGP, as with many other technology products, presents a dual challenge: to continue serving existing PGP clients new products must incorporate some of the proprietary technologies used in older versions, or simply give new versions to these users for free. At the same time, to free themselves from patent restrictions, vendors may favor developing PGP products without proprietary technologies, and may consider other security standards if the challenges with developing backwards compatible PGP products are too great Compatibility with MIME OpenPGP is compatible with MIME formats, broadening its appeal. Details are specified in RFC 2015 issued in October This compatibility is important to PGP s potential success in competition with S/MIME, and its ability to add security to MIME messages. Messages consist of an encrypted MIME message content and a digital signature. The signature is generated from both the message content and its headers. Encryption of the MIME message content follows generation of the signature Export and Import of PGP United States export laws limit the extent to which cryptographic products can be distributed to entities and nationals in other countries, even in the cases where such cryptographic information and tools already exists in both places. Further, the import laws of some countries restrict the strength of cryptographic technology that can be imported. Special implementations of PGP security software exist for sale in international markets Free PGP Finally, while commercial PGP products are priced consistent with other computer utilities, PGP for individual users is available in free versions. This could have some appeal for a small segment of corporate decision makers who want to be able to occasionally do some work from home and secure it to it to colleagues at the office. 5

8 SECTION 3 S/MIME OVERVIEW This section provides an overview of S/MIME, with a particular focus placed on version 3 of the standard. The ciphers, digital signature algorithms, and hierarchy of public key certificates are discussed. Also, particular strengths and weaknesses of the standard are identified. Finally, products using the S/MIME standard are identified, along with the software market representation of S/MIME. 3.1 CIPHERS AND ALGORITHMS USED BY S/MIME S/MIME version 3 incorporates triple-des in the ciphertext block chaining mode of operation to encrypt message content. The S/MIME standard is a security addition to the multipurpose internet mail extension (MIME) standard for . S/MIME uses the SHA-1 hash algorithm and the DSA for generating digital signatures. Table 3-1 provides summary information on the mandatory and optional components of S/MIME. Table 3-1: Ciphers and Algorithms Used in S/MIME Version 3 Algorithm Mandatory Optional Digest Algorithm SHA-1 MD5 Signature Algorithm DSS RSA Session Key Encryption Diffie Hellman (ElGamal) RSA Content Encryption Triple-DES (CBC-mode) RC2 (CBC-mode) Message Authentication Codes HMAC with SHA-1 None A MIME message plus information identifying security algorithms used and certificate information is secured with S/MIME to produce a public key cryptography standard (PKCS) object. Appropriate MIME headers are then added to the PKCS object and the whole message is then encoded into base64 for transmission. In creating a signed message, S/MIME computes the hash value of the message content and encrypts with the signer s private key. A block of information is prepared that identifies the hash algorithm used, the public key certificate, an identifier of the content encryption algorithm, and the encrypted message digest. 3.2 PUBLIC KEY CERTIFICATION HIERARCHY FOR S/MIME S/MIME relies on the use of X.509 certificates for ensuring the validity of public keys of other parties. This makes administration easy because the effort involved with verifying these keys is handled by a third party. Users are still responsible for maintaining local copies of the certificates they need to validate the keys of those they communicate with, and they need to ensure that their copies of certificates are up to date. 6

9 S/MIME attempts to automate the use of certificate revocation lists. The S/MIME version 3 standard states that use of CRLs should be consistent with RFC 2459, which provides specific guidance on the format and use of certificates and CRLs. The S/MIME standard implies that incoming certificates and CRLs should be cached to ease their use in validating signing chains, and that they should be used every time a message is sent or received, even in cases where the certificate was recently verified. 3.3 IMPLEMENTATIONS OF S/MIME S/MIME is a security addition to the MIME standard. Rigorous testing of products is performed by RSA s interoperability center to ensure product compatibility with S/MIME. Some products are available for the international markets that use S/MIME, including NEL s Mahobin. Also noteworthy is Worldtalk s WorldSecure server firewall that provides security for all in-coming and outgoing traffic. It works with a Windows NT platform, and enterprise prices start at $10,000. Table 3-2 identifies the vendors and products that include S/MIME security. Table 3-2: S/MIME Product Implementations Vendor Product Baltimore Technologies MailSecure Microsoft Outlook 98 Microsoft Outlook Express 4.0 Netscape Communicator OpenSoft ExpressMail SSE TrustedMIME 1.0 VeriSign Digital ID Entrust Technologies Entrust Express 4.0 NEL Mohobin Worldtalk WorldSecure Server RSA BSAFE S/MIME-C STRENGTHS AND WEAKNESSES OF S/MIME S/MIME is used within several of the dominant software communications applications, as noted in section 3.3. While this does not guarantee success for the standard, it does add a considerable momentum to its acceptance. Whether or not it is the superior standard, it can benefit from the same process that enabled VHS to beat Betamax in the market, and that enabled Microsoft products to become standard-issue in many applications. According to research supporting this paper, only S/MIME is supported by Netscape Communicator, one of the most commonly used internet communications application in the United States. Also, Microsoft communications products incorporate S/MIME, resulting in far reaching use of the standard. 7

10 3.4.1 Use of Non-proprietary Standards As with OpenPGP, S/MIME version 3 mandated technologies are publicly available and free from patent restrictions. However, RSA appears to be a big proponent of the standard, and may have a vested interest in its success because backwards compatible products will incorporate some of their patented technologies. However, RSA s patent on their public key algorithm expires in the year 2000, and so this may not present a significant licensing challenge Compatibility with MIME From its genesis as a security enhancement to MIME, S/MIME has been built for compatibility. S/MIME allows for several different message types to be sent: signed data, clear signing (message sent in the clear with a signature attached), registration requests (sent to certification authorities), and public key-certificate messages. There are no incompatibility issues that were revealed through the research Incorporation in Commercial Communications Software S/MIME is the incumbent commercial security offering, and benefits from promotion by RSA Security. It is also incorporated in several commercial internet communications applications ( , web-browsing, etc.). Thus, while PGP and other commercial applications can work together as plug-ins, S/MIME benefits from the perception of being part of the applications and from the distribution of them. Thus, it has an advantage in the commercial market versus PGP, and benefits from the extensive distribution influence of Netscape and Microsoft Costs of Public Key Infrastructure Use of S/MIME requires use of public key certificates for groups to communicate and use binding digital signatures. When applied at the applications level, this can have substantial costs. Table 3-3 provides summary data, courtesy of Worldtalk, on the costs associated with using a provider of public key infrastructure (PKI). PKI system costs is a one-time charge and includes either Entrust or Verisign certification authority software and secure software. Installation and maintenance costs listed are for supporting the specified number of nodes, and total support costs are the ongoing costs of providing CA services to the organization during a five-year period. The five-year total is a sum of all costs. 8

11 Table 3-3: Costs for Using Public Key Infrastructure Organization 5,000 Users 20,000 Users Entrust Verisign Entrust Verisign PKI System $587,000 $551,000 $1.8 M $1.44 M Installation $60,00 $82,000 $184,000 $180,000 Maintenance $529,000 $353,000 $1.6 M $924,000 Total Support $1.5 M $2.8 M $4.2 M $9.8 M 5-Year Total $2.755 M $3.791 M $7.915 M $12 M Cost per user per year $110 $151 $79 $124 In order to avoid the substantial costs that are incurred from applications level use of encryption, particularly in regard to PKI costs, a server level solution can be employed, such as Worldtalk s WorldSecure product. However, employing security at the server level versus the desk-top has implications. Security between users on the company s intranet is not provided by such an approach. Thus, this approach has limits for protecting against intruders within the company, or protecting against disgruntled employees. Also, digital signatures are supported only for the server, so those other entities that communicate with the company will have a signature that applies to the whole company and not an individual. This may present challenges for those that need to be able to affix legally binding signatures; they may be better served by a desktop solution that can associate a digital signature with a specific signer. 9

12 SECTION 4 APPLICATION OF S/MIME AND PGP TO LARGE ORGANIZATIONS Both OpenPGP and S/MIME have features which make them useful for providing security for individual users. However, implementation and use of them in large organizations, and their ultimate success in the market depends on performance, ease of administration and scalability, interoperability with other commonly used applications, and cost. This section provides analysis of 3 different scenarios based on number of users within an organization. 4.1 SMALL ENTERPRISE OF LESS THAN 100 USERS The case of a small enterprise presents some interesting considerations when comparing PGP and S/MIME. Because of its origins as free software intended for use by individuals and small groups, PGP may be very appropriate with an organization of fewer than 100 users. Among the considerations a corporate information technology manager would need to make in such a situation are: How many will use the security software Will the security program be formal or informal How many different entities/users will the organization communicate with on a regular basis Can the organization effectively manage a web of trust that includes all those that it will communicate with on a regular basis (alternatively, can individuals manage a web of trust for that subset they communicate with) How much effort will be exerted at what cost per hour to accomplish administration of the web of trust What is the legal liability/exposure for using PGP without obtaining a commercial package. If a full time employee at the corporation earns on average $50,000 per year plus benefits, for total compensation of approximately $75,000 in cost to the company, the time spent on web of trust administration can grow quickly. Table 4-1 provides examples for a generic company where individuals maintain webs of trust with others outside the company that they communicate with regularly. Full time employees using PGP Table 4-1: Examples Assuming Individuals Maintaining Personal Webs of Trust at Generalized Company Estimated web of trust maintenance per week in hours Total Maintenance per year Total work Hours per year (50 weeks x 40 hours) Percentage of time spent on web of trust maintenance Annual Cost , $ , $9, , $23, , $93,

13 Comparing the results of this simple example with the costs quoted by Network Associates for their Enterprise Security software, it is clear that for even 10 users it is more economical to use a commercial PGP solution (price of less than $2,100 per year). Further, and as important, the security is likely to be more consistent than 10 individual haphazard efforts. For 100 users the commercial PGP solution would cost up to $8,400 for one year (see Table 2-1). For the WorldSecure S/MIME security option, the costs start at $10,000. Hence, on a cost basis commercial PGP appears to be the winner for this example. 4.2 MID-SIZE ENTERPRISE OF 1000 USERS For mid-sized enterprises and larger, management of public keys by a centralized authority, whether internal to the company or via a trusted third party, is essential. OpenPGP accepts X.509 version 3 certificates as maintained by certification authorities such as VeriSign, but this is a relatively recent extension to the original PGP method of using a web-of-trust. The use of X.509 certificates are integral to S/MIME, and so version 3 and older versions of S/MIME are suitable for corporate use. On a price basis, costs are comparable for implementations based on the two standards. This is typical in a competitive industry, and so corporate IS managers are likely to decide on an approach based on interoperability with other applications they are already using. Network Associates provision of a centralized certificate server in their Enterprise Security product eliminates duplication of effort associated with maintaining copies of valid certificates across a company. Provided that a company is communicating with others using PGP, the mid-size market may hold potential for PGP. 4.3 LARGE ENTERPRISE OF 5,000 20,000 USERS In a large enterprise, a central source for certificates is essential, as has been established. Costs for using PKI can be high if desktop-level security implementations are pursued, and Tables 4-2 and 4-3 provide summaries. The biggest PGP and S/MIME products available to economize by encrypting at the socket-level or proxy-level (Network Associates Enterprise Security and Worldtalk s WorldSecure ) both use commercial products as plug-ins. Hence, the PGP and S/MIME offerings are similar from the users perspective in that they need separate products for communicating and encrypting. They work with a similar set of commercial products, with the exception that Netscape products only support S/MIME. All else being equal, that difference could have major impacts for the future of PGP. Until Netscape products work with PGP, Netscape customers may be predisposed to favoring S/MIME, and Netscape represents a significant part of the internet communications product market. Purely on cost per node, WorldSecure appears to hold a slight advantage. From Tables 4-2 and 4-3, we can see that Worldtalk s solution costs $11-20 per node, while Network Associates solution costs about $26 per node for a large number of users. 11

14 Table 4-2: Cost Comparison of Proxy-level and Desktop-level Encryption for 5,000 Users Organization 5,000 Users Worldtalk Entrust Verisign PKI System $63,000 $587,000 $551,000 Installation $15,000 $60,00 $82,000 Maintenance $63,000 $529,000 $353,000 Total Support $350,000 $1.5 M $2.8 M 5-Year Total $490,000 $2.755 M $3.791 M Cost per user per year $20 $110 $151 Table 4-3: Cost Comparison of Proxy-level and Desktop-level Encryption for 20,000 Users Organization 20,000 Users Worldtalk Entrust Verisign PKI System $188,000 $1.8 M $1.44 M Installation $30,000 $184,000 $180,000 Maintenance $188,000 $1.6 M $924,000 Total Support $700,000 $4.2 M $9.8 M 5-Year Total $1.116 M $7.915 M $12 M Cost per user per year $11 $79 $124 12

15 SECTION 5 CONCLUSIONS OpenPGP and S/MIME version 3 use the same cryptographic technology, but work differently in selecting parts of the message to be encrypted and in creating digital signatures. As competition between the two standards has increased, both have attempted to addressed their weaknesses relative to the competitor by incorporating the same or similar approaches to performing functions that the competing standard uses. This contributes to why the two standards are so similar. The struggle between PGP and S/MIME is not over, but S/MIME appears to have a pronounced advantage for desktop/applications level encryption. This advantage is largely based on its incorporation in commercial internet communications packages that are widely used, including the dominant products from Microsoft and Netscape. All else being equal, if Netscape continues its dominance of internet communications applications and chooses to build exclusively for compatibility with S/MIME, the question of whether or not S/MIME becomes the defacto standard may be largely answered. Use of applications level security solutions has high PKI costs. If a company were intent on minimizing these, Worldtalk s proxy level encryption products are useful, but these also have the limitations of Network Associates PGP solutions that function as plug-ins with commercial applications from Netscape, Microsoft, and others. Thus, if security competition focuses mostly on encryption of content, with less emphasis on digital signatures as may be needed for legally binding transactions, then competition is likely to be mainly among products that offer socketlayer security, like Enterprise Security and Worldsecure. The advantage S/MIME has as an integrated part of commercial communications packages will thus be blunted, and if costs for both approaches remain close, the field is wide open at the socket level. 13

16 APPENDIX A REFERENCES 1. Joel Snyder, WorldSecure Server s Firewall Guard s all Traffic, Networking, August 4, Rutrell Yasin, Pretty Good Privacy Gets To Business, Internet Week, 9/4/ Michael Elkins, RFC 2015: MIME Security with Pretty Good Privacy, October William Stallings, Cryptography and Network Security Principles and Practice, Prentice Hall, 1999, p PGP Enterprise Security Suite Confidentiality and Integrity: Desktop or Proxy Level Encryption?,

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 19 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear, the Board's access to other sources

More information

Summary of PGP Services

Summary of PGP Services Table 15.1 Summary of PGP Services Function Algorithms Used Description Digital signature Message encryption Compression Email compatibility DSS/SHA or RSA/SHA CAST or IDEA or Three-key Triple DES with

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) -- PGP services -- PGP key management (c) Levente Buttyán (buttyan@crysys.hu) What is PGP? general purpose application to protect (encrypt and/or sign) files can be used to protect

More information

Chapter 5 Electronic mail security

Chapter 5 Electronic mail security Chapter 5 Electronic mail security Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University +91 9426669020 bhargavigoswami@gmail.com Topic List 1. Pretty good privacy 2. S/MIME Pretty Good

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Pretty Good Privacy (PGP

Pretty Good Privacy (PGP PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Pretty Good Privacy (PGP

More information

Electronic mail security

Electronic mail security Electronic mail security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Pretty Good Privacy (PGP) S/MIME 2 1 Pretty Good Privacy Philip R.

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010 Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction

More information

Oracle Tuxedo. Using Security in CORBA Applications 11g Release 1 ( ) March 2010

Oracle Tuxedo. Using Security in CORBA Applications 11g Release 1 ( ) March 2010 Oracle Tuxedo Using Security in CORBA Applications 11g Release 1 (11.1.1.1.0) March 2010 Oracle Tuxedo Using Security in CORBA Applications, 11g Release 1 (11.1.1.1.0) Copyright 1996, 2010, Oracle and/or

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E ECE 646 Lecture 4 Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 18.1 or 19.1 Pretty Good Privacy (PGP) On-line Chapters

More information

ECE 646 Lecture 4. Pretty Good Privacy PGP

ECE 646 Lecture 4. Pretty Good Privacy PGP ECE 646 Lecture 4 Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 6/E or 7/E Chapter 19.1 Pretty Good Privacy (PGP) On-line Chapters (available

More information

Key management. Pretty Good Privacy

Key management. Pretty Good Privacy ECE 646 - Lecture 4 Key management Pretty Good Privacy Using the same key for multiple messages M 1 M 2 M 3 M 4 M 5 time E K time C 1 C 2 C 3 C 4 C 5 1 Using Session Keys & Key Encryption Keys K 1 K 2

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Cryptography. Cryptography is everywhere. German Lorenz cipher machine

Cryptography. Cryptography is everywhere. German Lorenz cipher machine Crypto 101 Cryptography Cryptography is everywhere German Lorenz cipher machine 2 Cryptography Cryptography deals with creating documents that can be shared secretly over public communication channels

More information

Chapter 9: Key Management

Chapter 9: Key Management Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher

More information

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen October 31, 2007 Pekka Jäppinen, Lappeenranta University of Technology: October 31, 2007 Secured Communications: Key exchange Schneier, Applied Cryptography:

More information

AeroMACS Public Key Infrastructure (PKI) Users Overview

AeroMACS Public Key Infrastructure (PKI) Users Overview AeroMACS Public Key Infrastructure (PKI) Users Overview WiMAX Forum Proprietary Copyright 2019 WiMAX Forum. All Rights Reserved. WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

TECHNICAL SPECIFICATION

TECHNICAL SPECIFICATION TECHNICAL SPECIFICATION IEC/TS 62351-5 Edition 2.0 2013-04 Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

The Research on PGP Private Key Ring Cracking and Its Application

The Research on PGP Private Key Ring Cracking and Its Application The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading ECE 646 Lecture 4A Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 18.1 or 19.1 Pretty Good Privacy (PGP) On-line Chapters

More information

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33 Background Network Security - Certificates, Keys and Signatures - Dr. John Keeney 3BA33 Slides Sources: Karl Quinn, Donal O Mahoney, Henric Johnson, Charlie Kaufman, Wikipedia, Google, Brian Raiter. Recommended

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

Lecture 4: Cryptography III; Security. Course Administration

Lecture 4: Cryptography III;  Security. Course Administration Lecture 4: Cryptography III; Email Security CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Course Administration HW/Lab 1 Posted Due at 11am on Sep 29 Labs are active starting this week

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Version 3 X.509 Certificates

Version 3 X.509 Certificates Entrust Technologies White Paper Author: Ian Curry Date: July 1996 Version: 1.0 Entrust Technologies, 1997. All rights reserved. 1 1. Introduction This document provides a description of the version 3

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

Symmetric, Asymmetric, and One Way Technologies

Symmetric, Asymmetric, and One Way Technologies Symmetric, Asymmetric, and One Way Technologies Crypto Basics Ed Crowley Fall 2010 1 Topics: Symmetric & Asymmetric Technologies Kerckhoff s Principle Symmetric Crypto Overview Key management problem Attributes

More information

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 20 th November 2017 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Key Management and Distribution

Key Management and Distribution 2 and Distribution : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 20 December 2015 css441y15s2l10, Steve/Courses/2015/s2/css441/lectures/key-management-and-distribution.tex,

More information

ENCRYPTION IN USE FACT AND FICTION. White Paper

ENCRYPTION IN USE FACT AND FICTION. White Paper White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Authenticating on a Ham Internet

Authenticating on a Ham Internet Authenticating on a Ham Internet The FCC regulations for amateur radio, part 97, rule that encryption cannot be used to obscure the meaning of communications. Many read the rules and assume that there

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

Introduction to information Security

Introduction to information Security First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:

More information

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation Overview Key exchange Session vs. interchange keys Classical, public key methods Key generation Cryptographic key infrastructure Certificates Key storage Key escrow Key revocation Digital signatures May

More information

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology Learning Objectives Describe the role encryption

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Public Key Technology in Windows 2000

Public Key Technology in Windows 2000 01 pp. 001-182.qxd 2/6/01 9:38 AM Page 105 Chapter 4 Public Key Technology in Windows 2000 The Windows 2000 operating system has a built-in public key infrastructure (PKI) to address the business needs

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Lecture Notes 14 : Public-Key Infrastructure

Lecture Notes 14 : Public-Key Infrastructure 6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM chanders@us.ibm.com IBM KeyWorks Market Needs History KeyWorks KeyWorks KeyWorks KeyWorks KeyWorks Suite

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai

More information

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai Elliptic Curve Cryptography (ECC) based Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai 14th November, 2017 Focus of this talk What should

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Choosing the Right Solution for Strategic Deployment of Encryption

Choosing the Right Solution for Strategic Deployment of  Encryption Choosing the Right Solution for Strategic Deployment of Email Encryption White Paper: Enterprise Email Encryption Email Protection Buyer s Guide Choosing the Right Solution for Strategic Deployment of

More information

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename 6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename Certificate formats (DER, PEM, PKCS #12) 6.2 Certificate Authorities

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

Sharing Secrets using Encryption Facility - Handson

Sharing Secrets using Encryption Facility - Handson Sharing Secrets using Encryption Facility - Handson Lab Steven R. Hart IBM March 12, 2014 Session Number 14963 Encryption Facility for z/os Encryption Facility for z/os is a host based software solution

More information

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited. Certificate Practice Statement v3.6 Certificate Practice Statement from Digi-Sign Limited. Digi-CPS Version 3.6. Produced by the Legal & Technical Departments For further information, please contact: CONTACT:

More information

draft-ietf-smime-cert-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Certificate Handling Status of this memo

draft-ietf-smime-cert-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Certificate Handling Status of this memo Internet Draft draft-ietf-smime-cert-06.txt December 14, 1998 Expires in six months Editor: Blake Ramsdell, Worldtalk Status of this memo S/MIME Version 3 Certificate Handling This document is an Internet-Draft.

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48 I N D E X Numerics A 3DES (Triple Data Encryption Standard), 48 Access Rights screen (VPN 3000 Series Concentrator), administration, 316 322 Action options, applying to filter rules, 273 adding filter

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

IBM Systems and Technology Group

IBM Systems and Technology Group IBM Systems and Technology Group Encryption Facility for z/os Update Steven R. Hart srhart@us.ibm.com 2013 IBM Corporation Topics Encryption Facility for z/os EF OpenPGP Support X.509 vs. OpenPGP Certificates

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

BlackBerry Enterprise Solution Security

BlackBerry Enterprise Solution Security Release 4.1 Technical Overview 2006 Research In Motion Limited. All rights reserved. Contents Wireless security... 4 BlackBerry Enterprise Solution security... 4 New security features...6 BlackBerry encryption

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information