CNS Unit 4
CNS Unit 4
CNS Unit 4
HY AND
NETWORK
SECURITY
Authentication
application kerbros -
x.50 Authentication
Authentication Applications:
Kerberos:
Introduction:
Kerberos is a network authentication protocol designed to
provide strong authentication for client/server applications by using
secret-key cryptography.
2
KEY FEATURES:
3
How It Works:
•Utilizes a trusted third-party, known as the Key Distribution Center (KDC), which
contains two main parts: the Authentication Server (AS) and the Ticket Granting
Server (TGS).
•When a user logs in, the AS verifies credentials and issues a ticket-granting ticket
(TGT), which the user then uses to request access to other services via the TGS.
X.509:
Introduction:
X.509 is a standard that defines the format of public key certificates, which
are used in various internet protocols, including SSL/TLS.
5
Key Features:
•Developed as part of the X.500 directory service standards.
•Provides a framework for Public Key Infrastructure (PKI).
•Used in secure communications, such as digital signatures and secure email.
6
Components:
•Certificate Authority (CA): Issues and verifies X.509 certificates.
•Certificates contain the public key, the identity of the holder, and the CA's digital
signature.
7
cryptographic and computer
security: 1. Cryptographic
Techniques for Email Security
1.1 Encryption:
• Public Key Encryption: Uses asymmetric
cryptography where each user has a public and a
private key. Emails are encrypted with the recipient's
public key and can only be decrypted with their private
key. This ensures that only the intended recipient can
read the email.
• Symmetric Encryption: Utilizes a single key for both
8
1.2 Digital Signatures:
• Digital Signatures: Authenticate the sender’s identity
and ensure the email has not been altered. The sender
signs the email with their private key, and the recipient
can verify the signature using the sender's public key.
This provides both authenticity and integrity.
1.3 Email Encryption Standards:
• PGP (Pretty Good Privacy): Combines symmetric and
asymmetric encryption to secure emails. PGP encrypts
the email with a symmetric key, which is itself
encrypted with the recipient's public key.
• S/MIME (Secure/Multipurpose Internet Mail
Extensions): Uses X.509 certificates to encrypt and 9
2.Secure Email Protocols:
2.1 Transport Layer Security (TLS):
• STARTTLS: An extension to email protocols (SMTP,
IMAP, POP3) that upgrades an unencrypted connection
to an encrypted one using TLS. STARTTLS protects
emails in transit but requires that both the sending and
receiving servers support it.
• SMTPS: Secure SMTP over TLS. It encrypts the email
transmission process, ensuring that emails are
protected during transit.
10
2.2 IMAP/POP3 Security:
• IMAP/POP3 over TLS: Encrypts the connection
between email clients and servers. This protects email
content from being intercepted while being retrieved
from the server.
11
Control:
15
6.3 User Education:
• Training: Educate users on recognizing
phishing attempts, suspicious emails, and safe
practices to avoid falling victim to social
engineering attacks.
6.4 Secure Backup:
• Backup: Regularly back up email data securely
to prevent data loss due to accidental deletions
or attacks.
16
THANK YOU
V DINESH
17