Security Requirements
Security Requirements
Security Requirements
com/blog/ipsec-internet-security-protocol/
https://www.geeksforgeeks.org/ip-security-ipsec/
IPv4 stands for Internet Protocol version 4. It is the fourth version of the Internet Protocol (IP) and is one
of the core protocols of standards-based internetworking methods in the Internet and other packet-
switched networks
. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January
1983
. IPv4 is still used to route most Internet traffic today, even with the ongoing deployment of Internet
Protocol version 6 (IPv6), its successor
. IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses
. An IPv4 address is a series of four eight-bit binary numbers separated by a decimal point
. IPv4 is a connectionless protocol, and operates on a best-effort delivery model, in that it does not
guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery
. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the
Transmission Control Protocol (TCP)
. IPv4 is still a popular protocol for communication over the Internet and on local networks
What is IP header?
IP Header is meta information at the beginning of an IP packet. It
displays information such as the IP version, the packet’s length, the
source, and the destination.
Time to live: It is an 8-bit field that indicates the maximum time the
Datagram will be live in the internet system. The time duration is
measured in seconds, and when the value of TTL is zero, the
Datagram will be erased. Every time a datagram is processed its
TTL value is decreased by one second. TTL are used so that
datagrams are not delivered and discarded automatically. The
value of TTL can be 0 to 255.
Protocol: This IPv4 header is reserved to denote that internet
protocol is used in the latter portion of the Datagram. For Example,
6 number digit is mostly used to indicate TCP, and 17 is used to
denote the UDP protocol.
Header Checksum: The next component is a 16 bits header
checksum field, which is used to check the header for any errors.
The IP header is compared to the value of its checksum. When the
header checksum is not matching, then the packet will be
discarded.
Source Address: The source address is a 32-bit address of the
source used for the IPv4 packet.
Destination address: The destination address is also 32 bit in size
stores the address of the receiver.
IP Options: It is an optional field of IPv4 header used when the
value of IHL (Internet Header Length) is set to greater than 5. It
contains values and settings related with security, record route and
time stamp, etc. You can see that list of options component ends
with an End of Options or EOL in most cases.
Data: This field stores the data from the protocol layer, which has
handed over the data to the IP layer.
Refer to the below image for the components of the IPv6 header
Version
Traffic Class
Flow label:
Payload Length (16-bits)
Next Header (8-bits):
Hop Limit (8-bits)
Source Address (128 bits)
Destination Address (128 bits)
This is an 8-bit field in which 8 bits are divided into two parts. The most significant 6-bit is for
the type of service so that the router will get to know about what services need to be provided to
the given packet. And for Explicit Congestion Notification (ECN), the least significant 2-bit is
used.
This 20-bit is required for maintaining the sequential flow of packets related to a particular
communication. This field is also helpful in avoiding the reordering of packets. The source labels
the sequence to help the router so that it can identify that a particular packet is related to a
specific flow of data. It is generally used for real or streaming media.
This field is used to help the router in knowing how much information is stored in the payload of
a particular packet.
Next Header (8-bits) :
This field is used to represent the type of extension header or if the extension header is not
present then it shows the Upper Layer PDU. The value for Upper Layer PDU is the same as that
of values in IPv4. The Extension Header contains optional information that helps routers
to understand how to handle a packet/flow.
Hop limit is a field in a header that stops the header to go into an infinite loop in the network. It
works the same as that of TTL in IPv4. When it passes a hop or router its value
is decremented by 1. The packet is discarded when it reaches 0.
This field provides the address from where the packet originates.
https://www.scaler.com/topics/ipv6-header-format/
Working of ESP:
Modes in ESP:
Advantages:
Disadvantages:
Components of ESP:
The Authentication Header (AH) protocol is a member of the IPsec protocol suite that provides
data origin authentication, data integrity, and replay protection
. AH ensures connectionless integrity by using a hash function and a secret shared key in the
AH algorithm
. AH provides data integrity, data origin authentication, and an optional replay protection
service
. In transport mode, some fields in the IP header change en-route and their value cannot be
predicted by the receiver. These fields are called mutable and they are not protected by AH
. Mutable IPv4 fields include Type of service (TOS), Flags, Fragment offset, Time to live (TTL), and
Header checksum
. The choice of authentication protocol depends on the specific needs of the organization or
system, and the type of information needed for authentication.
Encapsulating Security Payload (ESP) provides all encryption
services in IPSec based on integrity for the payload and not for
the IP header, confidentiality and authentication that using
encryption, without authentication is strongly discouraged because
it is insecure.
Any translations in readable message format into an unreadable
format are encrypted and used to hide the message content against
data tampering.
IPSec provides an open framework, such as SHA and MD5 for
implementing industry standard algorithms.
Encryption/decryption allows only the sender and the authorised
receiver to make the data to be received in readable form and only
after the integrity verification process is complete, the data
payload in the packet is decrypted.
IPSec uses a unique identifier for each packet, which is a data
equivalent of a fingerprint and checks for packets that are
authorised or not. It doesn't sign the entire packet unless it is
being tunnelled—ordinarily, for this IP data payload is protected,
not the IP header. In Tunnel Mode, where the entire original IP
packet is encapsulated with a new packet header added.
ESP in transport mode does not provide integrity and
authentication for the entire IP packet.
https://www.tutorialspoint.com/internet-security-association-and-key-management-protocol-
isakmp
What is VPN? How It Works, Types of VPN
VPN stands for "Virtual Private Network" and describes the opportunity to establish a
protected network connection when using public networks. VPNs encrypt your internet
traffic and disguise your online identity. This makes it more difficult for third parties to
track your activities online and steal data. The encryption takes place in real time.
How does a VPN work?
A VPN hides your IP address by letting the network redirect it through a specially
configured remote server run by a VPN host. This means that if you surf online with a
VPN, the VPN server becomes the source of your data. This means your Internet
Service Provider (ISP) and other third parties cannot see which websites you visit or
what data you send and receive online. A VPN works like a filter that turns all your data
into "gibberish". Even if someone were to get their hands on your data, it would be
useless.
A VPN connection disguises your data traffic online and protects it from external
access. Unencrypted data can be viewed by anyone who has network access and
wants to see it. With a VPN, hackers and cyber criminals can’t decipher this data.
Secure encryption: To read the data, you need an encryption key . Without one, it
would take millions of years for a computer to decipher the code in the event of a brute
force attack . With the help of a VPN, your online activities are hidden even on public
networks.
Disguising your whereabouts : VPN servers essentially act as your proxies on the
internet. Because the demographic location data comes from a server in another
country, your actual location cannot be determined. In addition, most VPN services do
not store logs of your activities. Some providers, on the other hand, record your
behavior, but do not pass this information on to third parties. This means that any
potential record of your user behavior remains permanently hidden.
Access to regional content: Regional web content is not always accessible from
everywhere. Services and websites often contain content that can only be accessed
from certain parts of the world. Standard connections use local servers in the country to
determine your location. This means that you cannot access content at home while
traveling, and you cannot access international content from home. With VPN location
spoofing , you can switch to a server to another country and effectively “change” your
location.
Secure data transfer: If you work remotely, you may need to access important files on
your company’s network. For security reasons, this kind of information requires a secure
connection. To gain access to the network, a VPN connection is often required. VPN
services connect to private servers and use encryption methods to reduce the risk of
data leakage.
Your ISP may seem trustworthy, but it may share your browsing history with advertisers,
the police or government, and/or other third parties. ISPs can also fall victim to attacks
by cyber criminals: If they are hacked, your personal and private data can be
compromised.
This is especially important if you regularly connect to public Wi-Fi networks. You never
know who might be monitoring your internet traffic and what they might steal from you,
including passwords, personal data, payment information, or even your entire identity.
You should rely on your VPN to perform one or more tasks. The VPN itself should also
be protected against compromise. These are the features you should expect from a
comprehensive VPN solution:
Encryption of your IP address: The primary job of a VPN is to hide your IP address
from your ISP and other third parties. This allows you to send and receive information
online without the risk of anyone but you and the VPN provider seeing it.
Encryption of protocols: A VPN should also prevent you from leaving traces, for
example, in the form of your internet history, search history and cookies. The encryption
of cookies is especially important because it prevents third parties from gaining access
to confidential information such as personal data, financial information and other content
on websites.
Kill switch: If your VPN connection is suddenly interrupted, your secure connection will
also be interrupted. A good VPN can detect this sudden downtime and terminate
preselected programs, reducing the likelihood that data is compromised.
Two-factor authentication: By using a variety of authentication methods, a strong VPN
checks everyone who tries to log in. For example, you might be prompted to enter a
password, after which a code is sent to your mobile device. This makes it difficult for
uninvited third parties to access your secure connection.
The history of VPNs
Since humans have been using the internet, there has been a movement to protect and
encrypt internet browser data. The US Department of Defense already got involved in
projects working on the encryption of internet communication data back in the 1960s.
Their efforts led to the creation of ARPANET (Advanced Research Projects Agency
Network), a packet switching network, which in turn led to the development of the
Transfer Control Protocol/Internet Protocol (TCP/IP).
The TCP/IP had four levels: Link, internet, transport and application. At the internet
level, local networks and devices could be connected to the universal network – and this
is where the risk of exposure became clear. In 1993, a team from Columbia University
and AT&T Bell Labs finally succeeded in creating a kind of first version of the modern
VPN, known as swIPe: Software IP encryption protocol.
In the following year, Wei Xu developed the IPSec network, an internet security protocol
that authenticates and encrypts information packets shared online. In 1996, a Microsoft
employee named Gurdeep Singh-Pall created a Peer-to-Peer Tunneling Protocol
(PPTP).
Early VPNs
Contiguous to Singh-Pall developing PPTP, the internet was growing in popularity and
the need for consumer-ready, sophisticated security systems emerged. At that time,
anti-virus programs were already effective in preventing malware and spyware from
infecting a computer system. However, people and companies also started demanding
encryption software that could hide their browsing history on the internet.
The first VPNs therefore started in the early 2000s, but were almost exclusively used by
companies. However, after a flood of security breaches, especially in the early 2010s,
the consumer market for VPNs started to pick up.
One of the biggest drivers for VPN adoption in recent years has been the increasing
demand for content with geographical access restrictions. For example, video streaming
services such as Netflix or YouTube make certain videos available only in certain
countries. With contemporary VPNs, you can encrypt your IP address so that you
appear to be surfing from another country, enabling you to access this content from
anywhere.
1. Once you are online, start your VPN. The VPN acts as a secure tunnel between you and
the internet. Your ISP and other third parties cannot detect this tunnel.
2. Your device is now on the local network of the VPN, and your IP address can be
changed to an IP address provided by the VPN server.
3. You can now surf the internet at will, as the VPN protects all your personal data.
types of vpn
PERPLEXITY
There are several types of VPNs available, each with its own set of features and benefits.
Here are some of the most common types of VPNs:
1. Remote access VPNs: This type of VPN allows users to connect to a private
network from a remote location, such as their home or a public Wi-Fi hotspot.
Remote access VPNs are commonly used by employees to access their
company's network securely.
2. Site-to-site VPNs: This type of VPN connects two or more networks together over
the internet, allowing them to share resources and communicate securely. Site-
to-site VPNs are commonly used by businesses with multiple locations.
3. Mobile VPNs: This type of VPN is designed for use on mobile devices, such as
smartphones and tablets. Mobile VPNs allow users to access their company's
network securely while on the go.
4. Personal VPNs: This type of VPN is designed for individual use and is typically
used to protect online privacy and security. Personal VPNs are commonly used by
individuals who want to access content that is restricted in their country or
region.
5. Access control VPNs: This type of VPN is used to control access to specific
resources on a network. Access control VPNs are commonly used by businesses
to restrict access to sensitive data.
6. Premium, budget, or free VPNs: VPNs can also be classified based on their pricing
model. Premium VPNs offer more features and better security, while budget
VPNs are more affordable but may have fewer features. Free VPNs are available
but may not offer the same level of security and privacy as paid VPNs.
There are also different VPN protocols, including OpenVPN, IPSec/IKEv2, WireGuard,
SSTP, L2TP/IPSec, and PPTP. The choice of VPN type and protocol depends on the
specific needs of the organization or individual, such as the level of security required,
the number of users, and the devices being used.
PERPLEXITY
Web security refers to the protective measures and protocols that organizations adopt to
protect their networks, computer systems, and websites from cyber threats and attacks
. Web security is crucial to business continuity and protecting data, users, and companies from
risk. Web security includes website security, cloud security, and web application security, which
defend cloud services and web-based applications, respectively
. There are several factors that go into web security and web protection, including data origin
authentication, data integrity, and replay protection
. Web security threats are vulnerabilities within websites and applications, or attacks launched
by malicious actors, designed to breach an organization's security defenses, enabling hackers
and cybercriminals to control systems, access data, and steal valuable resources.
.There are several types of VPNs available, including remote access VPNs, site-to-site VPNs,
mobile VPNs, personal VPNs, access control VPNs, and premium, budget, or free VPNs
. The choice of VPN type and protocol depends on the specific needs of the organization or
individual, such as the level of security required, the number of users, and the devices being
used.Web security is a broad category of security solutions that protect users, devices, and
wider networks against internet-based cyberattacks, such as malware, phishing, and other types
of cyber threats
. Web security solutions secure servers or user endpoints as well as the traffic that moves
between those and the internet. Web security is important for modern enterprises, and it is the
first line of defense against threats that can lead to the exposure of sensitive data, costly
ransoms, reputational harm, compliance violations, and a host of other consequences
.There are several resources available for learning about web security, including free online
training centers like the Web Security Academy, which offers interactive labs and progress-
tracking
. Other resources include online courses like Web Security Fundamentals, which introduces
learners to the web security landscape and provides an overview of current best practices for
securing web applications
What is a secure sockets layer?
Secure sockets layer (SSL) is a networking protocol designed for securing
connections between web clients and web servers over an insecure network, such as
the internet. Netscape formally introduced the SSL protocol in 1995, making it the
first widely used protocol for securing online transactions between consumers and
businesses. It eventually came to be used to secure authentication and encryption for
other applications at the network transport layer.
SSL suffered from numerous problems, and the Internet Engineering Task Force
(IETF) stopped recommending its use in 2015. It was replaced by the Transport Layer
Security (TLS) protocol. While SSL is still in use today, mostly in legacy systems,
TLS has taken over its role in securing internet connections.
In addition to securing internet connections, SSL was also used to authenticate and
encrypt other applications at the network transport layer. SSL typically involved
securing connections between a web browser (client) and a website (server). It
facilitated safe transactions between consumers and businesses, helping create the
foundation for e-commerce. Without SSL, data sent to and from a website could be
intercepted by a threat actor.
SSL uses public key and private key encryption and other cryptographic functions to
secure connections between devices communicating over a TCP/IP network. SSL can
scramble clear text entered on a website using asymmetric cryptography and public
key encryption. It is just one of the ways in which public key infrastructure (PKI) is
used by modern businesses.
SSL became a key part of internet security because of problems with Hypertext
Transfer Protocol (HTTP), the framework used to connect web clients to web servers.
HTTP uses public networks and lacks encryption, making it vulnerable. Malicious
actors can easily read or extract names, addresses, credit card numbers and
other personally identifiable information sent to a website. This is why HTTP over
SSL (HTTPS), also known as HTTP Secure, has emerged as HTTP's more secure
successor.
Most websites today display the prefix HTTPS at the beginning of their web address.
The "s" indicates to the visitor that the site uses SSL or TLS to secure its user activity.
Let's say that a company, Brand A, wants to launch a secure website where users can
safely order its products without putting themselves at risk of having their information
stolen. Brand A decides to use SSL on its website. It coordinates with a reputable CA,
such as Comodo SSL or DigiCert to get an SSL certificate for its website.
Brand A's digital certificate not only confirms to clients that Brand A owns its
specified domain; it also verifies that Brand A is reputable by referencing the SSL
certificate's CA details. This lets the customer and the web browser they're using
know that the site can be trusted. Websites that are secured with SSL or TLS will
usually display a lock symbol next to the web domain. Search engines will rank these
sites higher on their results pages based on this additional user security.
The public and private security keys generated by this process are unique and
mathematically related. These two keys make this cryptographic method asymmetric;
because without the private key, information encrypted using the public key cannot be
decoded.
In the case of SSL and PKI, the public key and the private key act as the encryptor
and the decryptor, respectively. The private key can only decrypt data that has been
encrypted by the public key. Think of it like a door that can only be locked with a
public key and unlocked with a private key.
The public key gets its name because it is distributed publicly and its utility is
negligible without access to the private key. The private key is kept secret by the web
server, or Brand A in this example.
The key
components of PKI include the digital certificate, the certificate authority, the registration authority and
the certificate database. Find out more about each of these.
Initial connection. When a user -- say a customer -- logs onto Brand A's
website, the web browser indicates to Brand A's server that a user wants to
establish a private connection. After receiving this notification, the Brand A
server sends over its SSL certificate, which includes its public key.
Once the browser, or client, has authenticated the web server and its
certificate, it encrypts the user's message using Brand A's public key. The
message is then sent to Brand A's server.
Brand A's server decrypts the message using its own private key. The
message includes a symmetric session key to establish a two-way
handshake between the two entities.
Cipher settings and shared encryption key. Once the server has been
authenticated, the client and server establish cipher settings and a shared
key to encrypt the information they exchange during the remainder of the
session. This provides data confidentiality and integrity. This process is
invisible to the customer. For example, if a webpage requires an SSL
connection, the URL will change from HTTP to HTTPS, and a padlock icon
will appear in the browser once the server has been authenticated.
What is SSL?
SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was
first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication,
and data integrity in Internet communications. SSL is the predecessor to the
modern TLS encryption used today.
A website that implements SSL/TLS has "HTTPS" in its URL instead of "HTTP."
How does SSL/TLS work?
In order to provide a high degree of privacy, SSL encrypts data that is transmitted
across the web. This means that anyone who tries to intercept this data will only see
a garbled mix of characters that is nearly impossible to decrypt.
SSL also digitally signs data in order to provide data integrity, verifying that the data
is not tampered with before reaching its intended recipient.
There have been several iterations of SSL, each more secure than the last. In 1999 SSL
was updated to become TLS.
SSL was created to correct this problem and protect user privacy. By encrypting any data
that goes between a user and a web server, SSL ensures that anyone who intercepts the
data can only see a scrambled mess of characters. The consumer's credit card number is
now safe, only visible to the shopping website where they entered it.
SSL also stops certain kinds of cyber attacks: It authenticates web servers, which is
important because attackers will often try to set up fake websites to trick users and steal
data. It also prevents attackers from tampering with data in transit, like a tamper-proof
seal on a medicine container.
Are SSL and TLS the same thing?
SSL is the direct predecessor of another protocol called TLS (Transport Layer Security). In
1999 the Internet Engineering Task Force (IETF) proposed an update to SSL. Since this
update was being developed by the IETF and Netscape was no longer involved, the
name was changed to TLS. The differences between the final version of SSL (3.0) and the
first version of TLS are not drastic; the name change was applied to signify the change in
ownership.
Since they are so closely related, the two terms are often used interchangeably and
confused. Some people still use SSL to refer to TLS, others use the term "SSL/TLS
encryption" because SSL still has so much name recognition.
TLS is the up-to-date encryption protocol that is still being implemented online, even
though many people still refer to it as "SSL encryption." This can be a source of
confusion for someone shopping for security solutions. The truth is that any vendor
offering "SSL" these days is almost certainly providing TLS protection, which has been an
industry standard for over 20 years. But since many folks are still searching for "SSL
protection," the term is still featured prominently on many product pages.
One of the most important pieces of information in an SSL certificate is the website's
public key. The public key makes encryption and authentication possible. A user's device
views the public key and uses it to establish secure encryption keys with the web server.
Meanwhile the web server also has a private key that is kept secret; the private key
decrypts data encrypted with the public key.
SSL certificates also come with different validation levels. A validation level is like a
background check, and the level changes depending on the thoroughness of the check.
Domain Validation: This is the least-stringent level of validation, and the cheapest.
All a business has to do is prove they control the domain.
Organization Validation: This is a more hands-on process: The CA directly contacts
the person or business requesting the certificate. These certificates are more
trustworthy for users.
https://www.geeksforgeeks.org/secure-socket-layer-ssl/
Email (short for electronic mail ) is a digital method by
using it we exchange messages between people over the
internet or other computer networks. With the help of this,
we can send and receive text-based messages, often an
attachment such as documents, images, or videos, from one
person or organization to another.
It was one of the first applications developed for the
internet and has since become one of the most widely used
forms of digital communication. It has an essential part of
personal and professional communication, as well as in
marketing, advertising, and customer support.
In this article, we will understand the concept of email
security, how we can protect our email, email security
policies, and email security best practices, and one of the
features of email is an email that we can use to protect the
email from unauthorized access.
Email Security:
Basically, Email security refers to the steps where we
protect the email messages and the information that they
contain from unauthorized access, and damage. It involves
ensuring the confidentiality, integrity, and availability of
email messages, as well as safeguarding against phishing
attacks, spam, viruses, and another form of malware. It can
be achieved through a combination of technical and non-
technical measures.
Some standard technical measures include the encryption of
email messages to protect their contents, the use of digital
signatures to verify the authenticity of the sender, and
email filtering systems to block unwanted emails and malware,
and the non-technical measures may include training
employees on how to recognize and respond to phishing attacks
and other email security threats, establishing policies and
procedures for email use and management, and conducting
regular security audits to identify and address
vulnerabilities.
We can say that email security is important to protect
sensitive information from unauthorized access and ensure
the reliability and confidentiality of electronic
communication.
Steps to Secure Email:
Following are the steps taken to show how PGP uses hashing
and a combination of three keys to generate the original
message:
o The receiver receives the combination of encrypted secret key and message digest is
received.
o The encrypted secret key is decrypted by using the receiver's private key to get the one-
time secret key.
o The secret key is then used to decrypt the combination of message and digest.
o The digest is decrypted by using the sender's public key, and the original message is
hashed by using a hash function to create a digest.
o Both the digests are compared if both of them are equal means that all the aspects of
security are preserved.
PGP at the Receiver site (B)
By
PGP was initially brought out as freeware and later as a low-cost commercial
product. First published by Philip R. Zimmermann in 1991, it was once the
most used privacy program and a de facto email encryption standard.
Intel
McAfee Associates
PGP Corp.
Symantec
Townsend Security
While it may no longer be simple to acquire a new copy of the original PGP
program, the Internet Engineering Task Force (IETF) has published
PGP protocols as internet standards since 1996. Both open source and
commercial implementations of the OpenPGP protocol are widely available.
The GNU Privacy Guard (GPG) implementation is published under the GNU
Public License (GPL).
The original PGP program was offered in two versions, one using the Rivest-
Shamir-Adleman (RSA) algorithm for key exchange, and one using the Diffie-
Hellman algorithm for key exchange. PGP was required to pay a license fee to
RSA for the RSA version. That version used the International Data Encryption
Algorithm to generate a short key for the entire message and RSA to encrypt
the short key. The Diffie-Hellman version used the CAST algorithm for the
short key to encrypt the message and the Diffie-Hellman algorithm to encrypt
the short key.
PGP concepts
PGP depends on some concepts that enable users to easily access and share
public keys, and to transmit cryptographic information across networks and
systems. Important terms include the following:
Implicit trust is one of the two different types of trust that can be
established through the web of trust. Implicit trust is used when Alice
signs Bob's public key pair. This indicates that Alice has vetted Bob --
and his private and public keys and his email address -- and is willing
to assert (through her own signature) that she found Bob to be who
he says he is and that the email and key pair are under Bob's
control.
Explicit trust is the other type of trust established through the web
of trust. It occurs when Carlos, a third generic user, is willing to trust
Alice's judgement about other individuals whose keys she has
signed. Carlos can use explicit trust in Alice to accept that Bob's
public key pair is also valid.
revoking a PGP public key pair, so that others will no longer use it;
key server functions, like specifying a default key server and
registering key pairs;
key management.
PGP is used mostly to encrypt or digitally sign emails, though it can also be
used to do the following:
While most users do not use PGP, there is still enough of a user base to fuel
continued development of OpenPGP-compliant implementations and related
applications.
There is still confusion about the term PGP, which until recently was used to
refer to the freeware and commercial programs first developed by
Zimmermann. It is now more commonly used to describe any software that
supports the OpenPGP protocol specification.
Backdoor and key escrow are two distinct concepts related to encryption and security. Let's
explore each of them in the context of PGP (Pretty Good Privacy).
In the context of PGP, which is an encryption software commonly used for secure
communication and file encryption, it is crucial that there are no backdoors in the
implementation. PGP relies on strong cryptographic algorithms and practices to ensure the
confidentiality and integrity of data. Introducing a backdoor would compromise the security of
the encryption and undermine the trust users have in the system.
It's important to note that PGP has been extensively reviewed and scrutinized by the security
community, and the strength of its encryption relies on the absence of any deliberate
vulnerabilities or backdoors.
2. Key Escrow: Key escrow involves the practice of storing cryptographic keys with a trusted third
party, allowing them to be accessed under certain circumstances. This concept is often
considered in the context of government regulations or law enforcement requirements for
lawful access to encrypted data.
In the case of PGP, key escrow would mean that a copy of the private key used for encryption is
stored by a third party, such as a government agency or key recovery agent. This allows them to
decrypt communications or data encrypted with that key without the knowledge or cooperation
of the key owner.
Key escrow is a highly debated topic as it poses potential risks to privacy and security. Critics
argue that centralized key escrow systems can be vulnerable to unauthorized access, abuse, or
exploitation by malicious actors. Additionally, it can undermine the trust and security of
encryption systems if not implemented carefully.
It's worth noting that the standard implementation of PGP does not include key escrow features.
The private keys used for encryption are typically kept solely in the possession of the key owners
to ensure the security and confidentiality of their encrypted communications and files.
Overall, both backdoors and key escrow raise concerns about the security and integrity of
encryption systems. It is generally recommended to use encryption tools and implementations
that prioritize strong security practices, transparency, and independence from any unauthorized
access mechanisms.
DEFINITION
MIME (Multipurpose Internet Mail
Extensions)
By
Rahul Awati
Unlike SMTP, MIME supports sending both ASCII text and non-ASCII data via
email. For text in character sets other than ASCII, the MIME protocol is
required.
Drawbacks of SMTP
SMTP, which emerged in 1981, is a standard protocol for delivering messages
via email. However, the original SMTP protocol supported only 7-bit ASCII text
communications that were both unauthenticated and unencrypted. With only
94 printable characters in ASCII, the system cannot deal with binary files or
characters in non-English languages that use different writing systems,
accented letters, etc.
Pure SMTP also does not accommodate sending video or audio data.
The default design of every SMTP server was an open mail relay that lets
anyone send emails through it, not just those from or to known users. These
limitations made SMTP communications vulnerable to
email spoofing, spamming, worms and man-in-the-middle (MitM) attacks.
Origins of MIME
In 1991, Nathaniel Borenstein, then a technical staff member at Bellcore,
proposed to the Internet Engineering Task Force (IETF) that SMTP be
extended so web (and other internet) clients and servers could recognize and
handle all kinds of data, not just Latin-based ASCII text, and to allow the
encoding of binary files for transfer through SMTP.
New MIME data types are registered with the Internet Assigned Numbers
Authority (IANA). IETF's RFC 6838 defines the procedures to notify and
register media types for use in MIME.
MIME
addresses the limitations of the SMPT email protocol that could lead to vulnerabilities like
email spoofing.
Advantages of MIME
MIME has several advantages over SMTP.
MIME defines four subtypes for multipart messages, specifying the nature of
these parts and their relationship to one another. In particular, the
"multipart/alternative" subtype lets systems choose the best representation of
the message: plain text or HTML.
At the sender's end, MIME transforms non-ASCII data to 7-bit Network Virtual
Terminal (NVT) data. 7-bit ASCII can represent 128 characters. MIME then
delivers this transformed data to the client SMTP. At the recipient's end, the
message is transferred back to the original data, allowing them to see its
contents, regardless of whether it contains text, audio, video or some other
kind of data.
Standard
email protocols like SMTP, POP or IMAP may transmit emails with MIME formatting.
MIME-Version
This header field indicates the message is MIME-formatted. Its value is
typically "1.0."
Content-Type
This header describes the media type of the content within the message. It
consists of a type and a subtype, both of which are strings. When
concatenated with a slash (/) between them, the type and subtype comprise a
MIME type.
applications
The S/MIME certificate's nitty-gritty will assist you in
strengthening your critical security concerns in the mail while
also advancing your commercial goals. Continue reading to learn
more.
Over the last two decades, business and official interactions have
shifted from phone conversations to emails. Because email is the
most used mode of communication, according to Statista, 4.03
billion people will use email in 2021, and that number is expected
to climb to 4.48 billion by 2024.
Every day, emails are sent and received across devices,
necessitating the need to secure these interactions. Because of
the amount and type of sensitive data in a commercial firm, this
criticality is increased. Assume you work in a field where
sensitive data is handled.
As we all know, an email’s journey across the internet includes stops at numerous servers and
routers. Sometimes, at any of these stops, malicious actors may come across the email message
and read its contents or insert a bogus answer, impersonating the two parties who are
communicating. For instance, this could lead to the theft of login credentials or the redirection of
traffic to a phishing website.
This tactic is known as a Man-in-the-Middle (MitM) attack, and it can be difficult to detect,
but it can be prevented by using S/MIME’s encryption and digital signatures.
S/MIME Uses
S/MIME can be used to:
Check that the email you sent has not been tampered with by a third party.
Create digital signatures to use when signing emails.
Encrypt all emails.
Check the email client you’re using.
The email message decryption process can only be done with the private key associated with it,
which is supposed to be in sole possession of the recipient. Unless the private key is
compromised, users can be confident that only the intended recipient will have access to the
confidential information contained in their emails.
Simply put, S/MIME encryption muddles emails so that they can only be viewed by receivers
who have a private key to decrypt them. It prevents others, particularly malicious actors, from
intercepting and reading email messages as they are sent from senders to recipients.
You may be aware that SMTP-based Internet email does not provide message security. An
SMTP (Simple Mail Transfer Protocol) internet email message can be read by anyone who sees
it as it travels or views it where it is stored. S/MIME uses encryption to tackle these issues.
Confidentiality
The purpose of message encryption is to keep the contents of an email message safe. The
contents are only visible to the intended recipient, and they remain private and inaccessible to
anyone else who might obtain or view the message. Encryption ensures message confidentiality
while in transit and storage.
Data integrity
Message encryption, like digital signatures, offers data integrity services as a result of the
operations that make encryption possible.
As I mentioned before, S/MIME also adds a digital signature to an email. This guarantees that
the sender has permission to send emails from a specific domain.
Authentication
A signature validates the answer to the question “who are you?” by allowing that entity to be
distinguished from all others and proving its uniqueness. Authentication ensures that a message
was sent by the individual or organization claiming to have sent it. This reduces the likelihood of
email spoofing, which is common in phishing scams.
Nonrepudiation
A signature’s uniqueness prevents the sender from denying that they sent the message. This is
useful for purchases and transactions, legal documentation, and criminal investigations, among
other things.
Data integrity
When the receiver of a digitally signed email validates the digital signature, the recipient is
assured that the received email message is the same one that was signed and sent and that has not
been tampered with while it traveled.
S/MIME certificates ensure that the emails you send are only accessible by the intended recipient.
They employ asymmetric encryption.
Public and private keys will be used to encrypt and decrypt emails, ensuring that the emails you
send cannot be read by anyone other than the receiving party.
S/MIME certificates protect emails by preventing hackers from accessing or changing their
contents.
Offer both digital signatures and encryption.
While asymmetric encryption keeps your data private, digital signatures provide authentication
and message integrity.
S/MIME certificates are installed on email clients.
SET blocks out all personal details on the card, preventing hackers and data thieves
from accessing or stealing the cardholder's information. The merchant also cannot see
these personal details, which are transferred directly to the credit card company for
user authentication and verification.
SET is not a payment system or gateway, but a set of security protocols. It uses some
aspects of a Public Key Infrastructure (PKI) to address concerns around privacy,
authenticity and security in e-commerce applications.
The primary goal of SET is to protect credit/debit card transactions as they take place
online. It provides a secure and confidential transaction environment for everyone
involved in the e-commerce transaction, including the customer and merchant. It also
authenticates users with the help of digital certificates.
TECHTARGET
The development of SET can be traced to the emergence of e-commerce in the mid-
1990s. SET was jointly designed by card companies Visa and Mastercard, with the
aim of securing web browsers for card transactions. In its early days of development,
SET was also supported by other organizations, including:
Microsoft provided the Secure Transaction Technology (STT) for SET, while
Netscape provided the Secure Sockets Layer (SSL) technology.
SET uses 56-bit session keys which are transmitted asymmetrically. The remainder of
the card transaction uses symmetric DES encryption. SET uses long keys for both
kinds of encryption.
Matching digital keys are also generated, so participants can confirm the certificates
of the other party and verify the transaction.
Using a hashing algorithm, SET signs electronic transactions using the sender's
private key. This produces a series of values (message digest) that "sign" a message.
The transaction's authenticity can be verified by comparing the transaction message
and message digest with the sender's public key.
The algorithms used in SET ensure that only the party with the corresponding digital
key can confirm the transaction, no one else.
TECHTARGET
Secure Electronic Transaction signs electronic transactions using the sender's private key through a
hashing algorithm.
Digital certificates
Digital signatures authenticate the merchant's and customer's identities to mitigate the
risk of a malicious third party manipulating transaction information. The Certificate
Authority (CA) issues digital certificates to the issuing bank. The card issuer and
acquirer, which may be a bank or other financial institution, both play an important
role in issuing digital certificates.
Dual signatures
In the SET scheme, the customer's order information and payment information are
encrypted with separate public keys. The order information is encrypted with the
merchant's public keys, and the payment information is encrypted with the acquiring
bank's public keys.
This system ensures that the encrypted PI can only be decrypted by the acquiring
bank, and the encrypted OI can only be decrypted by the merchant.
TECHTARGET
Digital signatures authenticate merchant and customer identities, lessening the possibility of transaction
manipulation by third parties.
Digital wallet
SET enforces customer self-authentication by entering a password that activates
their digital wallet. This happens before they initiate a payment transaction. Following
the authentication, the customer's device (PC, phone, etc.) sends their order and
payment information to the merchant. When the cardholder is authenticated, the
issuing bank provides payment authorization to the acquiring bank, which then
informs the merchant.
Card issuer: A financial organization (e.g., bank) that issues the payment
card
Acquirer: A financial organization that processes payment authorization
and facilitates electronic funds transfer to the merchant's account
The security properties of SET are superior to SSL and the newer TLS, particularly in
their ability to prevent e-commerce fraud. However, the biggest drawback of SET is
its complexity. SET requires both customers and merchants to install special software
-- card readers and digital wallets -- meaning that transaction participants had to
complete more tasks to implement SET. This complexity also slowed down the speed
of e-commerce transactions. SSL and TLS do not have such problems.
The overhead involved in PKI and the initialization and registration processes also
stalled the widespread adoption of SET. Interoperability among SET products -- e.g.,
certificate translations and interpretations among trusted third parties with different
certificate policies -- was also a significant problem with SET, which also was
challenged by poor usability and the vulnerability of PKI.