Unit 4 Electronic Mail Security
Unit 4 Electronic Mail Security
Unit 4 Electronic Mail Security
2
qTo introduce “Internet security” at the
and two protocols, and , that
implement that idea.
qTo show how PGP and S/MIME can provide
and
3
ü E-mail Security
ü Pretty Good Privacy (PGP)
ü Key Rings
ü PGP Certificates
ü S/MIME
ü Applications of S/MIME
4
PEM Security Features
•Initially developed by IETF & Privacy Security Research
Group.
Architecture & OS
1. Canonical Conversion Uniform ,
Independent Format
2. Digital Signature MD, Kpvt
E-mail + DS
3. Encryption Symmetric key
DES & Its Variant
4. Base 64 encoding
Pretty Good Privacy (PGP)
• Simple to use
• Completely Free
PGP Security Features
Non- Message
Encryption repudiation integrity
Note
9
PGP Algorithm
Algorithm Type Description
14
Step 5:Base-64 Encoding Concept
010101 010000 111110 001011 Each 24-bit divided into four 6-bit
blocks
• enveloped data
– encrypted content and associated keys
• signed data
– encoded message + signed digest
• clear-signed data
– cleartext message + encoded signed digest
• signed & enveloped data
– nesting of signed & encrypted entities
S/MIME Functionalities
Functionality Description
Enveloped data Consists of encrypted content of any type, and the encryption key encrypted
with the receiver’s public key.
Signed data Consists of a message digest encrypted with the sender’s private key. The
content and the digital signature are both Base-64 encoded.
Clear-signed data Similar to Signed data. However, only the digital signature is Base-64 encoded.
Signed and Signed-only and Enveloped-only entities can be combined, so that the
Enveloped data Enveloped data can be signed, or the Signed/Clear-signed data can be
enveloped.
The following shows an example of an enveloped-data in which
a small message is encrypted using triple DES.
22
S/MIME Content Types
25
Figure 30.23 An authenticated message
26
Figure 30.24 A compressed message
27
Figure 30.25 A confidential message
28
Figure 30.26 Key rings in PGP
29
Note
30
Figure 30.27 Trust model
31
Figure 30.28 Signed-data content type
32
Figure 30.29 Encrypted-data content type
33
Figure 30.30 Digest-data content type
34
Figure 30.31 Authenticated-data content type
35