Lecture Data security and encryption - Chapter 24: Electronic Mail Security

68 38 0
Lecture Data security and encryption - Chapter 24: Electronic Mail Security

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

The contents of this chapter include all of the following: secure email, PGP, S/MIME, domain-keys identified email, electronic mail security, email security, email security enhancements, pretty good privacy (PGP), PGP operation – authentication, PGP operation – confidentiality & authentication,...

Data Security and Encryption (CSE348) Lecture # 24 Review • have considered: – IEEE 802.11 Wireless LANs • protocol overview and security – Wireless Application Protocol (WAP) • protocol overview – Wireless Transport Layer Security (WTLS) Chapter 15 – Electronic Mail Security Email Security • Email is one of the most widely used and regarded network services • Currently message contents are not secure – may be inspected either in transit – or by suitably privileged users on destination system Email Security Enhancements • Confidentiality – protection from disclosure • Authentication – of sender of message • Message integrity – protection from modification • Non-repudiation of origin – protection from denial by sender Pretty Good Privacy (PGP) • The Pretty Good Privacy (PGP) secure email program, is a remarkable phenomenon • Has grown explosively and is now widely used • Largely the effort of a single person, Phil Zimmermann • Who selected the best available crypto algorithms to use & integrated them into a single program Pretty Good Privacy (PGP) • PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications • It runs on a wide range of systems, in both free & commercial versions Pretty Good Privacy (PGP) • Widely used de facto secure email • Developed by Phil Zimmermann • Selected best available crypto algos to use • Integrated into a single program • On Unix, PC, Macintosh and other systems • Originally free, now also have commercial versions available PGP Operation – Authentication sender creates message make SHA-1160-bit hash of message attached RSA signed hash to message receiver decrypts & recovers hash code receiver verifies received message hash 10 Internet Mail Architecture • This function may be co-located with the MUA or be a separate functional model • In the latter case, the Simple Mail Transfer Protocol (SMTP) is used between the MUA and the MSA • The MTA relays mail for one applicationlevel hop 54 Internet Mail Architecture • Relaying is performed by a sequence of MTAs, until the message reaches a destination MDA • The MDA is responsible for transferring the message from the MHS to the MS An MS can be located on a remote server or on the same machine as the MUA • Typically, an MUA retrieves messages from a remote server using POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) 55 Internet Mail Architecture • Also an administrative management domain (ADMD) is an Internet email provider • The Domain Name System (DNS) is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address 56 Email Threats • see RFC 4684- Analysis of Threats Motivating DomainKeys Identified Mail • describes the problem space in terms of: – range: low end, spammers, fraudsters – capabilities in terms of where submitted, signed, volume, routing naming etc – outside located attackers 57 DKIM Strategy • transparent to user – MSA sign – MDA verify • for pragmatic reasons 58 DKIM Strategy • DKIM is designed to provide an email authentication technique transparent to the end user • In essence, a user's email message is signed by a private key of the administrative domain from which the email originates • The signature covers all of the content of the message and some of the RFC 5322 message headers 59 DKIM Strategy • At the receiving end, the MDA can access the corresponding public key via a DNS and verify the signature • thus authenticating that the message comes from the claimed administrative domain • Thus, mail that originates from somewhere else but claims to come from a given domain will not pass the authentication test and can be rejected 60 DKIM Strategy • This approach differs from that of S/MIME and PGP, which use the originator's private key to sign the content of the message, for various pragmatic reasons • Stallings Figure 18.10 shows a simple example of the operation of DKIM An email message is generated by an email client program • The content of the message, plus selected RFC 5322 headers, is signed by the email provider 61 using the provider's private key DKIM Strategy • The signer is associated with a domain, which could be a corporate local network, an ISP, or a public email facility such as gmail • The signed message then passes through the Internet via a sequence of MTAs • At the destination, the MDA retrieves the public key for the incoming signature and verifies the signature before passing the message on to the destination email client 62 DCIM Functional Flow 63 DCIM Functional Flow • Stallings Figure 18.11 provides a more detailed look at the elements of DKIM operation • Basic message processing is divided between a signing Administrative Management Domain (ADMD) and a verifying ADMD • Signing is performed by an authorized module within the signing ADMD and uses private information from a Key Store 64 DCIM Functional Flow • Verifying is performed by an authorized module within the verifying ADMD • The module verifies the signature or determines whether a particular signature was required Verifying the signature uses public information from the Key Store • If the signature passes, reputation information is used to assess the signer and that information is passed to the message filtering system 65 DCIM Functional Flow • If the signature fails or there is no signature using the author's domain, information about signing practices related to the author can be retrieved remotely and/or locally • And that information is passed to the message filtering system • The signature is inserted into the RFC 5322 message as an additional header entry, starting with the keyword Dkim-Signature 66 DCIM Functional Flow • Before a message is signed, a process known as canonicalization is performed on both the header and body of the RFC 5322 message • Canonicalization is necessary to deal with the possibility of minor changes in the message made en route • The signature includes a number of fields, as listed in the text 67 Summary • have considered: – secure email – PGP – S/MIME – domain-keys identified email 68 ... overview – Wireless Transport Layer Security (WTLS) Chapter 15 – Electronic Mail Security Email Security • Email is one of the most widely used and regarded network services • Currently message... (Secure/Multipurpose Internet Mail Extensions) • Security enhancement to MIME email – original Internet RFC822 email was text only – MIME provided support for varying content types and multi-part messages –... code and compares it to its own calculation of the hash code 21 PGP Session Keys • Need a session key for each message – of varying sizes: 56-bit DES, 128-bit CAST or IDEA, 168-bit Triple-DES

Ngày đăng: 20/09/2020, 14:03

Mục lục

    Data Security and Encryption (CSE348)

    Chapter 15 – Electronic Mail Security

    Pretty Good Privacy (PGP)

    PGP Operation – Confidentiality & Authentication

    PGP Operation – Email Compatibility

    PGP Public & Private Keys

    PGP Trust Model Example

    S/MIME (Secure/Multipurpose Internet Mail Extensions)

    S/MIME Cryptographic Algorithms

    S/MIME Certificate Processing

Tài liệu cùng người dùng

Tài liệu liên quan