CNS Unit 4

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

CRYPTOGRAP

HY AND
NETWORK
SECURITY
Authentication
application kerbros -
x.50 Authentication
Authentication Applications:

Kerberos:
Introduction:
Kerberos is a network authentication protocol designed to
provide strong authentication for client/server applications by using
secret-key cryptography.

2
KEY FEATURES:

•Developed by MIT in the 1980s.


•Uses symmetric encryption to provide secure communication.
•Prevents eavesdropping and replay attacks.
•Widely used in environments requiring secure authentication, such as
Windows domains.

3
How It Works:
•Utilizes a trusted third-party, known as the Key Distribution Center (KDC), which
contains two main parts: the Authentication Server (AS) and the Ticket Granting
Server (TGS).
•When a user logs in, the AS verifies credentials and issues a ticket-granting ticket
(TGT), which the user then uses to request access to other services via the TGS.
X.509:
Introduction:
X.509 is a standard that defines the format of public key certificates, which
are used in various internet protocols, including SSL/TLS.

5
Key Features:
•Developed as part of the X.500 directory service standards.
•Provides a framework for Public Key Infrastructure (PKI).
•Used in secure communications, such as digital signatures and secure email.

6
Components:
•Certificate Authority (CA): Issues and verifies X.509 certificates.
•Certificates contain the public key, the identity of the holder, and the CA's digital
signature.

7
cryptographic and computer
security: 1. Cryptographic
Techniques for Email Security
1.1 Encryption:
• Public Key Encryption: Uses asymmetric
cryptography where each user has a public and a
private key. Emails are encrypted with the recipient's
public key and can only be decrypted with their private
key. This ensures that only the intended recipient can
read the email.
• Symmetric Encryption: Utilizes a single key for both
8
1.2 Digital Signatures:
• Digital Signatures: Authenticate the sender’s identity
and ensure the email has not been altered. The sender
signs the email with their private key, and the recipient
can verify the signature using the sender's public key.
This provides both authenticity and integrity.
1.3 Email Encryption Standards:
• PGP (Pretty Good Privacy): Combines symmetric and
asymmetric encryption to secure emails. PGP encrypts
the email with a symmetric key, which is itself
encrypted with the recipient's public key.
• S/MIME (Secure/Multipurpose Internet Mail
Extensions): Uses X.509 certificates to encrypt and 9
2.Secure Email Protocols:
2.1 Transport Layer Security (TLS):
• STARTTLS: An extension to email protocols (SMTP,
IMAP, POP3) that upgrades an unencrypted connection
to an encrypted one using TLS. STARTTLS protects
emails in transit but requires that both the sending and
receiving servers support it.
• SMTPS: Secure SMTP over TLS. It encrypts the email
transmission process, ensuring that emails are
protected during transit.

10
2.2 IMAP/POP3 Security:
• IMAP/POP3 over TLS: Encrypts the connection
between email clients and servers. This protects email
content from being intercepted while being retrieved
from the server.

11
Control:

3.1 Multi-Factor Authentication (MFA):


• MFA: Adds an additional layer of security by requiring a
second form of authentication (e.g., a code sent to a
mobile device) in addition to a password. This helps
protect email accounts from unauthorized access.
3.2 OAuth:
• OAuth: Allows users to grant third-party applications
access to their email accounts without sharing their
password. It uses tokens for authorization, reducing the12
4. Anti-Malware and Filtering:
4.1 Anti-Virus and Anti-Malware:
• Scanning: Email systems often include anti-virus and
anti-malware tools to scan attachments and links for
malicious content, preventing harmful software from
reaching the user.
4.2 Spam and Phishing Filters:
• Spam Filters: Identify and block unsolicited and
potentially harmful emails. They use techniques such as
heuristic analysis and blacklists.
• Phishing Detection: Detects and blocks attempts to
13
5. Secure Email Services:
5.1 Encrypted Email Providers:
• ProtonMail: Offers end-to-end
encryption, ensuring that only the
sender and recipient can read the
email content. ProtonMail also
provides secure email storage and
user privacy.
• Tutanota: Provides end-to-end
encryption and additional features
such as anonymous email
addresses and secure calendar 14
Security:
6.1 Regular Software Updates:
• Updates: Keep email clients and servers up-to-date
with the latest security patches to protect against
known vulnerabilities.
6.2 Strong Passwords:
• Password Management: Use strong, unique
passwords for email accounts and consider using a
password manager to manage them securely.

15
6.3 User Education:
• Training: Educate users on recognizing
phishing attempts, suspicious emails, and safe
practices to avoid falling victim to social
engineering attacks.
6.4 Secure Backup:
• Backup: Regularly back up email data securely
to prevent data loss due to accidental deletions
or attacks.

16
THANK YOU
V DINESH
17

You might also like