Is Unit 4
Is Unit 4
Is Unit 4
Prepared By:
Dr.B.Veeramallu
UNIT-IV
• E- Mail Security: Pretty Good Privacy, S/MIME.
In both , there is the need of security services for these mails and
mailing list like :
Threats to E-mail :
Loss of Confidentiality , Loss of integrity , Lack of Data origin
Authentication , Lack of non Repudiation , Lack of notification of
receipt .
Electronic mail Security
Threats Enabled by E-mail :
1. Exposure of systems to malicious code : Email is one of the tool by
which computer viruses spread.
4. Receiver decrypts & recovers hash code using RSA with senders
public key
3. The session key is encrypted with RSA using receiver’s public key
and pre-pended with message.
PGP Operation – Confidentiality
4.The receiver uses RSA with its private key to decrypt and recover
the session key.
5. The session key is used to decrypt the message.
PGP Operation – Confidentiality and
Authentication
Confidentiality and Authentication : To increase the trust of any
service, both confidentiality and authentication should be provided.
Receiver decrypts the signed message by using its private key and
recovers session key.
PGP Operation – Confidentiality and Authentication
when both services are used, the sender first signs the message with
its own private key, then encrypt the message with a session key ,
and finally encrypts the session key with receiver’s public key.
PGP Operation – Compression ,email
compatibility
Compression:
By default , PGP compresses the message after applying the
signatures but before encryption.
Email Compatibility :
In all above cases PGP sends message in encrypted form (binary data)
3. Each PGP entity must maintain a file of its own public/private key
pairs as well as file of public keys of correspondents.
Key management of PGP
Session key generation :
Algorithm used for session key is CAST-128.
Input given to CAST -128 is a 128- bit random generated key and
here two 64 bits plaintexts are to be encrypted.
The cipher feedback mode generates two 64-bit ciphers that forms
session key.
Key Identifiers :
One important observation drawn in PGP is that it has multiple public
keys.
How recipient know which of its public keys was used to encrypt the
session key.
Key management of PGP
To solve this problem key identification is required.
Other need is send the sender’s public key ID whose private key used
for signature.
Public-key ring contains all the public-keys of other PGP users known
to this user, indexed by key ID
Private-key ring contains the public/private key pair(s) for this user,
indexed by key ID & encrypted keyed from a hashed passphrase.
PGP Key Rings
PGP Trust Model
PGP does not include any specification for establishing certifying
authorities pr for establishing trust, it provides a better way of using
trust ,associating trust with public keys and exploiting trust
information.
Figure shows public key ring structure regarding trust. Complete trust
is given for You , each other node in the key ring has OWNERTRUST
value.
A,B are partially trusted by You to sign keys , D,E,F are fully trusted by
You to sign keys, C,H,M ,N,O,P,Q are keys that are deemed legitimate
by You .G,I,J,K are not having trust.
PGP Trust Model
S/MIME (Secure/Multipurpose Internet Mail
Extensions)
It is a security enhancement to MIME internet e-mail standard .
It consist of header lines that starts with keywords like from ,to ,date,
and subject.
3. Transfer encoding techniques that enable conversion of any format into the form that
is protected from any change in mail system.
2. Signed Data : To create a digital signature, the hash code of the content is signed
and then encrypted using signer’s private key.
3. Clear-signed data : A digital signature of the content is formed. But in this case only
the digital signature is encoded using base64.
4. Signed and enveloped data :
Entities that are signed-only ,encrypted –only be nested to sign the
encrypted data and encrypt the signed or clearly –signed data.
Signed data
Clear-signed data
Registration request
Security labels
Applicable to use over LANs, across public & private WANs, & for the
Internet
IP Security Overview :
In 1994, Internet Architecture Board (IAB) issued report “security in
the Internet Architecture “RFC 1636.
The outcome of the study and IAB’s report is the protocol for
providing security at the IP levels called as IP security.
Applications of IP Security :
IPSec provided the capability to provide secure communication
across LAN, WAN and internet.
Following are the examples of uses/applications of IPSec :
Creation of virtual private network :
Using IPSec, any organization can develop its own secure ,VPN on
internet.
So ,need of private network is reduced and it enables to rely on
internet saving costs and overhead.
Secure Remote access over internet :
IPSec enables ‘remote user to securely access company’s network.
2. Firewall uses IPSec to restrict all those incoming packets which are
not using IP.
Benefits of IP Security
Since firewall is the only way to enter from the internet into the
organization , restricted packets cannot enter.
2. IP Security Services :
IPSec provides security services at the IP layer by a system which
select required security protocols
Determine algorithms and cryptographic keys required to provide the
requested services.
IP Security Architecture
IPSec architecture use two protocols to provide security at
IP level :
Authentication Header (AH): an authentication protocol designated
by header of protocol.
The AH and ESP include this field in their respective header which
allow the receiving system to select type of SA under which received
packet is processed.
Authentication Data : This field is not fixed length field and contains
Integrity check value used for authentication of AH packet.
Encapsulating Security Payload (ESP)
It is a protocol which provides data confidentiality, also provides
origin authentication , data integrity checking and replay protection.
The two nodes can communicate with each other by sharing their
respective secret keys through SA.
Combining Security Associations
Second combination : In this combination , the security of individual
nodes cannot be achieved by implementing services of IPSec,
Instead the security is provided at the gateways.
The end users sitting anywhere in the world can use the internet to
access the organizational workstations by firewall.
Key Management
Key Management is related to the identification and distribution of
the secret keys.
IKE protocol helps to negotiate the settings between two hosts that
implement IPSec.
Key Management
IKE components :
Internet key exchange is based on three protocol shown:
Oakley :
It is based upon Diffie Hellman algorithm and uses mechanism called
cookies.
Feature of Oakley :
Five important features of Oakley algorithm :
1. It employs a mechanism known as “cookies” to oppose clogging
attacks.
Key Management
In clogging attack, an opponent forges the source address of the
authenticated user and sends the public Diffie Hellman key to the
victim.
Every ISAKMP message must follow UDP transport layer protocol for
its implementation and consist of the following two sections :
ISAKMP Header
ISAKMP Payload
Key Management
ISAKMP Header format :
The fields of ISAKMP message are as :
Next Payload : This field is an 8-bit field which defines first payload
type in ISAKMP message
Major Version and Minor version : 4 bits in size and are used to
define major and minor versions of ISAKMP respectively.
ISAKMP header format
Key Management
Exchange type : It is an 8-bit field and is used to define the type of
exchange implemented.
Length (32 bits) : This field defines total length of ISAKMP message
which includes ISAKMP header and ISAKMP payload.
Key Management
ISAKMP Payload types :
All ISAKMP payloads begin with generic payload header.
Notification Payload : This Payload can obtain both ISAKMP and DOI
specific data and is used to transmit informational data such as error
conditions .