Summary of PGP Services

Similar documents
Cryptography and Network Security. Sixth Edition by William Stallings

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Pretty Good Privacy (PGP

Chapter 5 Electronic mail security

Pretty Good Privacy (PGP)

Electronic mail security

Cryptography and Network Security

CS 356 Internet Security Protocols. Fall 2013

BCA III Network security and Cryptography Examination-2016 Model Paper 1

CSCE 813 Internet Security Secure Services I

draft-ietf-smime-msg-06.txt December 14, 1998 Expires in six months S/MIME Version 3 Message Specification Status of this memo

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Telemetry Data Sharing Using S/MIME

Internet Engineering Task Force (IETF) Request for Comments: 5959 Category: Standards Track August 2010 ISSN:

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Cryptographic Concepts

APNIC elearning: Cryptography Basics

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

(2½ hours) Total Marks: 75

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Encryption. INST 346, Section 0201 April 3, 2018

FTP. FTP offers many facilities :

Internet and Intranet Protocols and Applications

Chapter 8 Web Security

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

PROTECTING CONVERSATIONS

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Authenticating on a Ham Internet

Deploying a New Hash Algorithm. Presented By Archana Viswanath

Cryptography and Network Security

SECURE SYSTEM USING S/MIME AND IB-PKC

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

Internet Security Enhanced Security Services for S/MIME. Thomas Göttlicher

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

S/MIME Security Services

S/MIME Security Services

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

CSC 774 Network Security

Gestion et sécurité des réseaux informatiques. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Category: Standards Track Drummond Group C. Shih Gartner Group September 2002

KALASALINGAM UNIVERSITY

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

SSH PK Authentication and Auto login configuration for Chassis Management Controller

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Computer Security: Principles and Practice

Security. Communication security. System Security

Cipher Suite Configuration Mode Commands

Applications FTP. FTP offers many facilities :

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

CS669 Network Security

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Obsoletes: 2630, 3211 August 2002 Category: Standards Track

Obsoletes: 3369 July 2004 Category: Standards Track

COMPARISON OF PGP AND S/MIME SECURITY STANDARDS FOR APPLICATION TO A LARGE ENTERPRISE

Electronic Mail

Cryptography MIS

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

IPSec Guide. ISAKMP & IKE Formats

10EC832: NETWORK SECURITY

Introduction to Cryptography. Vasil Slavov William Jewell College

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Using digital certificates in Microsoft Outlook

Lecture 4: Cryptography III; Security. Course Administration

DirectLine for Business AS2 USER GUIDE

How many DES keys, on the average, encrypt a particular plaintext block to a particular ciphertext block?

Electronic Mail (SMTP)

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

An Overview of the PKCS Standards

and File Encryption on ios with S/MIME and PGP

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Configuration of an IPSec VPN Server on RV130 and RV130W

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Cryptography (Overview)

1.264 Lecture 28. Cryptography: Asymmetric keys

User Authentication Principles and Methods

E-commerce security: SSL/TLS, SET and others. 4.1

Kurose & Ross, Chapters (5 th ed.)

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

CSC/ECE 774 Advanced Network Security

ECE 646 Lecture 4. Pretty Good Privacy PGP

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols. Lecture Notes on Computer and Network Security. by Avi Kak

Key management. Pretty Good Privacy

WHITE PAPER. Authentication and Encryption Design

Digital Certificates Demystified

3.2 The EncryptionMethod Element

Cryptographic Systems

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Public Key Infrastructure. What can it do for you?

Transcription:

Table 15.1 Summary of PGP Services Function Algorithms Used Description Digital signature Message encryption Compression Email compatibility DSS/SHA or RSA/SHA CAST or IDEA or Three-key Triple DES with Diffie-Hellman or RSA ZIP Radix 64 conversion A hash code of a message is created using SHA-1. This message digest is encrypted using DSS or RSA with the sender's private key and included with the message. A message is encrypted using CAST-128 or IDEA or 3DES with a one-time session key generated by the sender. The session key is encrypted using Diffie-Hellman or RSA with the recipient's public key and included with the message. A message may be compressed, for storage or transmission, using ZIP. To provide transparency for email applications, an encrypted message may be converted to an ASCII string using radix 64 conversion. Segmentation To accommodate maximum message size limitations, PGP performs segmentation and reassembly.

Table 15.4 MIME Transfer Encodings 7bit 8bit binary quoted-printable base64 x-token The data are all represented by short lines of ASCII characters. The lines are short, but there may be non-ascii characters (octets with the high-order bit set). Not only may non-ascii characters be present but the lines are not necessarily short enough for SMTP transport. Encodes the data in such a way that if the data being encoded are mostly ASCII text, the encoded form of the data remains largely recognizable by humans. Encodes data by mapping 6-bit blocks of input to 8-bit blocks of output, all of which are printable ASCII characters. A named nonstandard.

Table 15.5 Native and Canonical Form Native Form Canonical Form The body to be transmitted is created in the system's native format. The native character set is used and, where appropriate, local end-of-line conventions are used as well. The body may be a UNIX-style text file, or a Sun raster image, or a VMS indexed file, or audio data in a system-dependent format stored only in memory, or anything else that corresponds to the local model for the representation of some form of information. Fundamentally, the data is created in the "native" form that corresponds to the type specified by the media type. The entire body, including "out-of-band" information such as record lengths and possibly file attribute information, is converted to a universal canonical form. The specific media type of the body as well as its associated attributes dictate the nature of the canonical form that is used. Conversion to the proper canonical form may involve character set conversion, transformation of audio data, compression, or various other operations specific to the various media types. If character set conversion is involved, however, care must be taken to understand the semantics of the media type, which may have strong implications for any character set conversion (e.g. with regard to syntactically meaningful characters in a text subtype other than "plain").

Table 15.6 Cryptographic Algorithms Used in S/MIME Function Create a message digest to be used in forming a digital signature. Encrypt message digest to form digital signature. Encrypt session key for transmission with message. Encrypt message for transmission with onetime session key. Requirement MUST support SHA-1. Receiver SHOULD support MD5 for backward compatibility. Sending and receiving agents MUST support DSS. Sending agents SHOULD support RSA encryption. Receiving agents SHOULD support verification of RSA signatures with key sizes 512 bits to 1024 bits. Sending and receiving agents MUST support Diffie-Hellman. Sending agent SHOULD support RSA encryption with key sizes 512 bits to 1024 bits. Receiving agent SHOULD support RSA decryption. Sending agents SHOULD support encryption with tripledes and RC2/40. Receiving agents SHOULD support decryption using tripledes and MUST support decryption with RC2/40.

Table 15.7 S/MIME Content Types Type Subtype smime Parameter Description Multipart Signed A clear-signed message in two parts: one is the message and the other is the signature. Application pkcs7-mime signeddata A signed S/MIME entity. pkcs7-mime envelopeddata An encrypted S/MIME entity. pkcs7-mime degenerate signeddata An entity containing only public-key certificates. pkcs7-signature The content type of the signature subpart of a multipart/signed message. pkcs10-mime A certificate registration request message.

Table 15.9 Radix-64 Encoding 6-bit value character 6-bit value character 6-bit value character 6-bit value character 0 A 16 Q 32 g 48 w 1 B 17 R 33 h 49 x 2 C 18 S 34 i 50 y 3 D 19 T 35 j 51 z 4 E 20 U 36 k 52 0 5 F 21 V 37 l 53 1 6 G 22 W 38 m 54 2 7 H 23 X 39 n 55 3 8 I 24 Y 40 o 56 4 9 J 25 Z 41 p 57 5 10 K 26 a 42 q 58 6 11 L 27 b 43 r 59 7 12 M 28 c 44 s 60 8 13 N 29 d 45 t 61 9 14 O 30 e 46 u 62 + 15 P 31 f 47 v 63 / (pad) =