SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.

Post on 30-Dec-2015

214 views 3 download

Transcript of SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.

SECURING E-MAIL

Presented by:Digvijay Singh Dudi

Graduate StudentOld Dominion University

Table of contents

Brief Introduction Securities available for different layers Why we need security at each layer? Desirable security features in e-mail Confidentiality can be provided through

Cryptography Session key Sender authentication and message integrity Pretty Good Privacy(PGP)

Brief Introduction

Electronic mail commonly known as e-mail is a method of exchanging digital messages from one author to one or more recipients.

Today's e-mail is based on a store-and-forward model. E-mail predates the inception of the internet. E-mail servers accept, forward, deliver and store messages.

Users and the computers are not required to be online simultaneously; they need to connect only briefly, typically to a mail server for as long as it takes to send/receive messages.

Securities Available for different Layers

At Application Layer: Pretty Good Privacy(PGP) At Transport Layer: SSL Protocol At Network Layer: Ipsec, IEEE 802.11 Wireless LAN

Protocol

Why we need security at each layer?

Two major reasons: Network layer security can encrypt data in the

datagrams and authenticate source IP address, but cannot provide user level security.

More easy to deploy new Internet services, including security services at the higher levels of protocol stack.

Desirable Security Features in E-Mail

Confidentiality Sender Authentication Message Integrity Receiver Authentication

Confidentiality can be provided through cryptography

Crytography: Encription and Decription.

Encription can be done by using: Symmetric key technology(using DES or AES) Public key cryptography(using RES) Session key

SESSION KEY

SENDER AUTHENTICATION AND MESSAGE INTEGRITY

PRETTY GOOD PRIVACY(PGP)

Three step process generally applied STEP 1: Calculate Message Digest STEP 2: Apply Symmetric key encryption STEP 3: Public key encryption

References

www.wikipedia.org Textbook “Computer Networking: Fifth Edition,

Kurose and Ross” Source for diagram of slide 8: www.google.com Source for diagram of slide 9: www.google.com and

textbook: “Computer Networking Fifth Edition: Kurose and Ross”

QUESTIONS

??????