Electronic Mail Security
Electronic Mail Security
Electronic Mail Security
Department : CSE
Faculty Name : Mrs.T.Kavitha
Regulations : 2021
Academic year : 2023-2024 ODD
Email Security
• Email is one of the most widely used and
regarded network services
• currently message contents are not secure
– may be inspected either in transit
– or by suitably privileged users on destination
system
Email Security Enhancements
• confidentiality
– protection from disclosure
• authentication
– of sender of message
• message integrity
– protection from modification
• non-repudiation of origin
– protection from denial by sender
Pretty Good Privacy (PGP)
• widely used de facto secure email
• developed by Phil Zimmermann
• selected best available crypto algs to use
Pretty Good Privacy
PGP
• PGP provides a confidentiality and
authentication service that can be used for
electronic mail and file storage applications.
• The actual operation of PGP, as opposed to
the management of keys, consists of five
services: authentication, confidentiality,
compression, e-mail compatibility, and
segmentation.
Transmission and Reception of PGP Messages
• PGP makes use of four types of keys: one-time
session symmetric keys, public keys, private keys,
and passphrase-based symmetric keys (explained
subsequently). Three separate requirements can
be identified with respect to these keys:
• A means of generating unpredictable session keys
is needed.
• We would like to allow a user to have multiple
public-key/private-key pairs.
• Each PGP entity must maintain a file of its own
public/private key pairs as well as a file of public
keys of correspondents.
PGP Message Format
PGP Message Generation
PGP Message Reception
S/MIME
• S/MIME (Secure/Multipurpose Internet Mail
Extension) is a security enhancement to the
MIME Internet email format standard, based
on technology from RSA Data Security.
• S/MIME is defined in a number of documents,
most importantly RFCs 3369, 3370, 3850
• and 3851.
S/MIME Cryptographic Algorithms
• digital signatures: DSS & RSA
• hash functions: SHA-1 & MD5
• session key encryption: ElGamal & RSA
• message encryption: AES, Triple-DES, RC2/40
and others
• MAC: HMAC with SHA-1
• have process to decide which algs to use
S/MIME Messages
• S/MIME secures a MIME entity with a
signature, encryption, or both
• forming a MIME wrapped PKCS object
• have a range of content-types:
– enveloped data
– signed data
– clear-signed data
– registration request
– certificate only message
S/MIME Certificate Processing
• S/MIME uses X.509 v3 certificates
• managed using a hybrid of a strict X.509 CA
hierarchy & PGP’s web of trust
• each client has a list of trusted CA’s certs
• and own public/private key pairs & certs
• certificates must be signed by trusted CA’s
Certificate Authorities
• have several well-known CA’s
• Verisign one of most widely used
• Verisign issues several types of Digital IDs
• increasing levels of checks & hence trust
Class Identity Checks Usage
1 name/email check web browsing/email
2 + enroll/addr check email, subs, s/w validate
3 + ID documents e-banking/service access