SlideShare una empresa de Scribd logo
1 de 51
Descargar para leer sin conexión
Chapter 8:Chapter 8:Chapter 8:Chapter 8:----
IP Security EIP Security EIP Security EIP Security E----Mail Security:Mail Security:Mail Security:Mail Security:
Sarthak Patel (www.sarthakpatel.in)
Outline
IP Security Overview
Architecture
Authentication Header
Encapsulation
2
Security Payload
Combining Security Association
Key Management
Pretty Good Privacy
S/MimeAndTypes
Sarthak Patel (www.sarthakpatel.in)
TCP/IP Example
3 Sarthak Patel (www.sarthakpatel.in)
IPv4 Header
4 Sarthak Patel (www.sarthakpatel.in)
IPv6 Header
5 Sarthak Patel (www.sarthakpatel.in)
IP Security Overview
IPSec is not a single protocol.
Instead, IPSec provides a set of security algorithms plus a general
framework that allows a pair of communicating entities to use
whichever algorithms to provide security appropriate for the
communication.
• Applications of IPSec
6
• Applications of IPSec
– Secure branch office connectivity over the Internet
– Secure remote access over the Internet
– Establsihing extranet and intranet connectivity with partners
– Enhancing electronic commerce security
Sarthak Patel (www.sarthakpatel.in)
IP Security Scenario
7 Sarthak Patel (www.sarthakpatel.in)
IP Security Overview
Benefits of IPSec
When IPSec is implemented in a firewall or router, it provides strong
security.
IPSec in a firewall is resistant to bypass if all traffic from the outside must use
IP, and the firewall is the only means of entrance from the Internet into the
organization.
8
IPSec is below the transport layer (TCP, UDP) and so is transparent to
applications. There is no need to change software on a user or server system
when IPSec is implemented in the firewall or router. Even if IPSec is
implemented in end systems, upper-layer software, including applications, is
not affected.
IPSec can be transparent to end users. There is no need to train users on
security mechanisms, issue keying material on a per-user basis, or revoke
keying material when users leave the organization.
Sarthak Patel (www.sarthakpatel.in)
IP Security Architecture
IPSec documents: NEW updates in 2005!
The IPSec specification consists of numerous documents.The
most important of these, issued in November of 1998, are RFCs
2401, 2402, 2406, and 2408:
RFC 2401:An overview of a security architecture
RFC 2402: Description of a packet authentication extension to
9
RFC 2402: Description of a packet authentication extension to
IPv4 and IPv6
RFC 2406: Description of a packet encryption extension to
IPv4 and IPv6
RFC 2408: Specification of key management capabilities
Sarthak Patel (www.sarthakpatel.in)
IP Security Architecture
Architecture: Covers the general concepts, security requirements, definitions, and
mechanisms defining IPSec technology.
Encapsulating Security Payload (ESP): Covers the packet format and general issues
related to the use of the ESP for packet encryption and, optionally, authentication.
Authentication Header (AH): Covers the packet format and general issues related
to the use ofAH for packet authentication.
Encryption Algorithm: A set of documents that describe how various encryption
10
Encryption Algorithm: A set of documents that describe how various encryption
algorithms are used for ESP.
Authentication Algorithm: A set of documents that describe how various
authentication algorithms are used forAH and for the authentication option of ESP.
Key Management: Documents that describe key management schemes.
Domain of Interpretation (DOI): Contains values needed for the other documents
to relate to each other. These include identifiers for approved encryption and
authentication algorithms, as well as operational parameters such as key lifetime.
Sarthak Patel (www.sarthakpatel.in)
IPSec Document Overview
11 Sarthak Patel (www.sarthakpatel.in)
IPSec Services
Access Control
Connectionless integrity
Data origin authentication
Rejection of replayed packets
Confidentiality (encryption)
12
Confidentiality (encryption)
Limited traffic flow confidentiallity
Sarthak Patel (www.sarthakpatel.in)
Security Associations (SA)
A one way relationship between a sender and a receiver.
Identified by three parameters:
Security Parameters Index (SPI)
IP Destination address
Security Protocol Identifier
13
Security Protocol Identifier
Sarthak Patel (www.sarthakpatel.in)
SA ParametersSA ParametersSA ParametersSA Parameters
Sequence Number Counter
Sequence Counter Overflow
Anti-ReplayWindow
AH Information
ESP Information
14
ESP Information
Lifetime ofThis Security Association
IPSec Protocol Mode:Tunnel, transport
Path MTU (MaxTrans. Unit)
Sarthak Patel (www.sarthakpatel.in)
Transport and Tunnel ModesTransport and Tunnel ModesTransport and Tunnel ModesTransport and Tunnel Modes
Transport Mode
Transport mode provides protection primarily for upper-layer
protocols.That is, transport mode protection extends to the
payload of an IP packet.
Tunnel Mode
15
Tunnel Mode
Tunnel mode provides protection to the entire IP packet.
Sarthak Patel (www.sarthakpatel.in)
Transport Mode SA Tunnel Mode SA
AH Authenticates IP payload
and selected portions of IP
header and IPv6 extension
headers
Authenticates entire inner
IP packet plus selected
portions of outer IP header
16
ESP Encrypts IP payload and any
IPv6 extesion header
Encrypts inner IP packet
ESP with
authentication
Encrypts IP payload and any
IPv6 extesion header.
Authenticates IP payload
but no IP header
Encrypts inner IP packet.
Authenticates inner IP
packet.
Sarthak Patel (www.sarthakpatel.in)
Before applying AH
17 Sarthak Patel (www.sarthakpatel.in)
Transport Mode
(AH Authentication)
18 Sarthak Patel (www.sarthakpatel.in)
Tunnel Mode
(AH Authentication)
19 Sarthak Patel (www.sarthakpatel.in)
Authentication Header
Provides support for data integrity and authentication (MAC
code) of IP packets.
Guards against replay attacks.
20 Sarthak Patel (www.sarthakpatel.in)
Encapsulating Security Payload
ESP provides confidentiality services
21 Sarthak Patel (www.sarthakpatel.in)
Encryption and Authentication Algorithms
Encryption:
Three-key triple DES
RC5
IDEA
Three-key triple IDEA
CAST
22
CAST
Blowfish
Authentication:
HMAC-MD5-96
HMAC-SHA-1-96
Sarthak Patel (www.sarthakpatel.in)
ESP Encryption and Authentication
23 Sarthak Patel (www.sarthakpatel.in)
ESP Encryption and Authentication
24 Sarthak Patel (www.sarthakpatel.in)
Combinations of Security Associations
25
In Case 1, all security is provided between end systems that implement IPSec.
Sarthak Patel (www.sarthakpatel.in)
Combinations of Security Associations
26
For Case 2, security is provided only between gateways (routers, firewalls, etc.)
and no hosts implement IPSec. This case illustrates simple virtual private
network support.
Sarthak Patel (www.sarthakpatel.in)
Combinations of Security Associations
27
Case 3 builds on Case 2 by adding end-to-end security. The same combinations
discussed for cases 1 and 2 are allowed here. The gateway-to-gateway tunnel
provides either authentication or confidentiality or both for all traffic between end
systems.
Sarthak Patel (www.sarthakpatel.in)
Combinations of Security Associations
28
Case 4 provides support for a remote host that uses the Internet to reach an
organization's firewall and then to gain access to some server or workstation behind
the firewall.
Sarthak Patel (www.sarthakpatel.in)
Key Management
Two types:
Manual: A system administrator manually configures each
system with its own keys and with the keys of other
communicating systems. This is practical for small, relatively
static environments.
29
Automated: An automated system enables the on-demand
creation of keys for SAs and facilitates the use of keys in a large
distributed system with an evolving configuration.
Oakley Oakley is a key exchange protocol based on the Diffie Hellman
algorithm but providing added security.
Internet Security Association and Key Management Protocol (ISAKMP)
Sarthak Patel (www.sarthakpatel.in)
Oakley
Three authentication methods:
Digital signatures
Public-key encryption
Symmetric-key encryption (aka. Preshare key)
30 Sarthak Patel (www.sarthakpatel.in)
ISAKMP
31 Sarthak Patel (www.sarthakpatel.in)
Email Security
email is one of the most widely used and regarded network
services
currently message contents are not secure
32 Sarthak Patel (www.sarthakpatel.in)
Email Security Enhancements
confidentiality
protection from disclosure
authentication
of sender of message
message integrity
33
message integrity
protection from modification
non-repudiation of origin
protection from denial by sender
Sarthak Patel (www.sarthakpatel.in)
Pretty Good Privacy (PGP)
Open source, freely available software package for secure e-
mail
de facto standard for secure email
developed by Phil Zimmermann
selected best available crypto algs to use
34
selected best available crypto algs to use
Runs on a variety of platforms like Unix, XP, Macintosh and
other systems
originally free (now also have commercial versions available)
Sarthak Patel (www.sarthakpatel.in)
PGP Operation – Authentication
1. sender creates message
2. Generates a digital signature for the message
3. use SHA-1 to generate 160-bit hash of message
4. signed hash with RSA using sender's private key, and is
attached to message
35
attached to message
5. receiver uses RSA with sender's public key to decrypt
and recover hash code
6. receiver verifies received message using hash of it and
compares with decrypted hash code
Sarthak Patel (www.sarthakpatel.in)
PGP Operation – Confidentiality
1. sender generates a message and encrypts it.
2. Generates a128-bit random number as session key
3. Encrypts the message using CAST-128 / IDEA / 3DES
in CBC mode with session key
4. session key encrypted using RSA with recipient's public
36
4. session key encrypted using RSA with recipient's public
key and attached to the msg
5. receiver uses RSA with private key to decrypt and
recover session key
6. session key is used to decrypt message
Sarthak Patel (www.sarthakpatel.in)
PGP Operation – Confidentiality &
Authentication
can use both services on the same message
create signature & attach it to the message
encrypt both message & signature
37 Sarthak Patel (www.sarthakpatel.in)
PGP Operation – Compression
PGP compresses messages to save space for e-mail
transmission and storage
by default PGP compresses message after signing but
before encrypting
so can store uncompressed message & signature for later
38
so can store uncompressed message & signature for later
verification
Encryption after compression strengthens security (because
compression has less redundancy)
uses ZIP compression algorithm
Sarthak Patel (www.sarthakpatel.in)
PGP Operation – Email Compatibility
when using PGP will have binary data (8-bit octets) to
send (encrypted message, etc)
however email was designed only for text
hence PGP must encode raw binary data into printable
ASCII characters
39
ASCII characters
uses radix-64 algorithm
PGP also segments messages if too big
(maximum length 50,000 octets)
Sarthak Patel (www.sarthakpatel.in)
PGP Cryptographic FunctionsPGP Cryptographic FunctionsPGP Cryptographic FunctionsPGP Cryptographic Functions
40 Sarthak Patel (www.sarthakpatel.in)
Ks =session key used in symmetric encryption scheme
PRa =private key of userA, used in public-key encryption scheme
PUa =public key of userA, used in public-key encryption scheme
41
EP = public-key encryption
DP = public-key decryption
EC = symmetric encryption
DC = symmetric decryption
H = hash function
|| = concatenation
Z = compression using ZIP algorithm
R64 = conversion to radix 64ASCII format
Sarthak Patel (www.sarthakpatel.in)
PGP Operation – Summary
42 Sarthak Patel (www.sarthakpatel.in)
PGP Session Keys
need a session key for each message
of varying sizes: 56-bit DES, 128-bit CAST or IDEA, 168-bit
Triple-DES
uses random inputs
43 Sarthak Patel (www.sarthakpatel.in)
PGP Message Format
44 Sarthak Patel (www.sarthakpatel.in)
S/MIMES/MIMES/MIMES/MIME
S/MIME (Secure/Multipurpose Internet Mail
Extension) is a security enhancement to the MIME
Internet e-mail format standard, based on technology
from RSA Data Security.
RFC 822
45
RFC 822
RFC 822 defines a format for text messages that are sent
using electronic mail. It has been the standard for
Internet-based text mail message and remains in
common use.
Sarthak Patel (www.sarthakpatel.in)
RFC Header
Date:Tue, 16 Jan 1998 10:37:17 (EST)
From: "William Stallings" <ws@shore.net>
Subject:The Syntax in RFC 822
To: Smith@Other-host.com
46
Cc: Jones@Yet-Another-Host.com
Hello.This section begins the actual message body,
which is delimited from the message heading by a
blank line.
Sarthak Patel (www.sarthakpatel.in)
Multipurpose Internet Mail ExtensionsMultipurpose Internet Mail ExtensionsMultipurpose Internet Mail ExtensionsMultipurpose Internet Mail Extensions
MIME is an extension to the RFC 822 framework that is
intended to address some of the problems and limitations of
the use of SMTP (Simple Mail Transfer Protocol) or some
other mail transfer protocol and RFC 822 for electronic
mail.
47
mail.
Sarthak Patel (www.sarthakpatel.in)
Overview S/MIMEOverview S/MIMEOverview S/MIMEOverview S/MIME
The MIME specification includes the following elements:
1. Five new message header fields are defined, which may be
included in an RFC 822 header. These fields provide information
about the body of the message.
2. A number of content formats are defined, thus standardizing
48
2. A number of content formats are defined, thus standardizing
representations that support multimedia electronic mail.
3. Transfer encodings are defined that enable the conversion of any
content format into a form that is protected from alteration by
the mail system.
Sarthak Patel (www.sarthakpatel.in)
The five header fields defined in MIME are as follows:
MIME-Version: Must have the parameter value 1.0. This field indicates that the
message conforms to RFCs 2045 and 2046.
Content-Type: Describes the data contained in the body with sufficient detail
that the receiving user agent can pick an appropriate agent or mechanism to
represent the data to the user or otherwise deal with the data in an appropriate
49
represent the data to the user or otherwise deal with the data in an appropriate
manner.
Content-Transfer-Encoding: Indicates the type of transformation that has been
used to represent the body of the message in a way that is acceptable for mail
transport.
Content-ID: Used to identify MIME entities uniquely in multiple contexts.
Content-Description: A text description of the object with the body; this is
useful when the object is not readable (e.g., audio data).
Sarthak Patel (www.sarthakpatel.in)
50
THE END
Sarthak Patel (www.sarthakpatel.in)51
THE END

Más contenido relacionado

La actualidad más candente

Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
Distributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionDistributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionSHIKHA GAUTAM
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Process management in os
Process management in osProcess management in os
Process management in osMiong Lazaro
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating systemSara Ali
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System ImplementationWayne Jones Jnr
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking Salman Memon
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process CommunicationAdeel Rasheed
 

La actualidad más candente (20)

Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Distributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionDistributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock Detection
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Process management in os
Process management in osProcess management in os
Process management in os
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System Implementation
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Bankers
BankersBankers
Bankers
 
Evolution of os
Evolution of osEvolution of os
Evolution of os
 
Memory management
Memory managementMemory management
Memory management
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Email security
Email securityEmail security
Email security
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 

Destacado

Mobile Email Security
Mobile Email SecurityMobile Email Security
Mobile Email SecurityRahul Sihag
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?NeoCertified
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
All about email
All about emailAll about email
All about emailestefana4
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
1st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 11st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 1jwylde
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertsondawnrk
 
Adopta la calle
Adopta la calleAdopta la calle
Adopta la calledec-admin
 
Solids, Liquids and Gases
Solids, Liquids and GasesSolids, Liquids and Gases
Solids, Liquids and Gasesastoeckling
 
1st Detect Presentation - Apr 2012 - TEDW
1st Detect Presentation - Apr 2012 - TEDW1st Detect Presentation - Apr 2012 - TEDW
1st Detect Presentation - Apr 2012 - TEDWjwylde
 
427. ecoambiente
427. ecoambiente427. ecoambiente
427. ecoambientedec-admin
 
Фотовыставка "Российский Северный Кавказ - на дороге перемен"
Фотовыставка "Российский Северный Кавказ - на дороге перемен"Фотовыставка "Российский Северный Кавказ - на дороге перемен"
Фотовыставка "Российский Северный Кавказ - на дороге перемен"socreklama
 

Destacado (20)

Mobile Email Security
Mobile Email SecurityMobile Email Security
Mobile Email Security
 
Email security
Email securityEmail security
Email security
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 
Why is email security important?
Why is email security important?Why is email security important?
Why is email security important?
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
All about email
All about emailAll about email
All about email
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Instrumentasi
InstrumentasiInstrumentasi
Instrumentasi
 
Gelombang laut pasang surut
Gelombang laut pasang surutGelombang laut pasang surut
Gelombang laut pasang surut
 
Sección 3. unidad 8
Sección 3. unidad 8Sección 3. unidad 8
Sección 3. unidad 8
 
1st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 11st Detect Corp - TEDW 2013 - rev 1
1st Detect Corp - TEDW 2013 - rev 1
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 
Adopta la calle
Adopta la calleAdopta la calle
Adopta la calle
 
Solids, Liquids and Gases
Solids, Liquids and GasesSolids, Liquids and Gases
Solids, Liquids and Gases
 
1st Detect Presentation - Apr 2012 - TEDW
1st Detect Presentation - Apr 2012 - TEDW1st Detect Presentation - Apr 2012 - TEDW
1st Detect Presentation - Apr 2012 - TEDW
 
427. ecoambiente
427. ecoambiente427. ecoambiente
427. ecoambiente
 
Фотовыставка "Российский Северный Кавказ - на дороге перемен"
Фотовыставка "Российский Северный Кавказ - на дороге перемен"Фотовыставка "Российский Северный Кавказ - на дороге перемен"
Фотовыставка "Российский Северный Кавказ - на дороге перемен"
 
ICISRES-17
ICISRES-17ICISRES-17
ICISRES-17
 

Similar a IS Unit 8_IP Security and Email Security (20)

Ip security
Ip security Ip security
Ip security
 
IP Security
IP SecurityIP Security
IP Security
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Ip security
Ip security Ip security
Ip security
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Websecurity
Websecurity Websecurity
Websecurity
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Unit 6
Unit 6Unit 6
Unit 6
 
Unit 5
Unit 5Unit 5
Unit 5
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
Ch16
Ch16Ch16
Ch16
 
Ip sec
Ip secIp sec
Ip sec
 
Web security
Web securityWeb security
Web security
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
Web Security
Web SecurityWeb Security
Web Security
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 

Más de Sarthak Patel

IS Unit 9_Web Security
IS Unit 9_Web SecurityIS Unit 9_Web Security
IS Unit 9_Web SecuritySarthak Patel
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network SecuritySarthak Patel
 
Is unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsSarthak Patel
 
Is unit 4_number_theory
Is unit 4_number_theoryIs unit 4_number_theory
Is unit 4_number_theorySarthak Patel
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographySarthak Patel
 
Is unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesIs unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesSarthak Patel
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesSarthak Patel
 

Más de Sarthak Patel (7)

IS Unit 9_Web Security
IS Unit 9_Web SecurityIS Unit 9_Web Security
IS Unit 9_Web Security
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
 
Is unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functions
 
Is unit 4_number_theory
Is unit 4_number_theoryIs unit 4_number_theory
Is unit 4_number_theory
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key Cryptography
 
Is unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesIs unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniques
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

IS Unit 8_IP Security and Email Security

  • 1. Chapter 8:Chapter 8:Chapter 8:Chapter 8:---- IP Security EIP Security EIP Security EIP Security E----Mail Security:Mail Security:Mail Security:Mail Security: Sarthak Patel (www.sarthakpatel.in)
  • 2. Outline IP Security Overview Architecture Authentication Header Encapsulation 2 Security Payload Combining Security Association Key Management Pretty Good Privacy S/MimeAndTypes Sarthak Patel (www.sarthakpatel.in)
  • 3. TCP/IP Example 3 Sarthak Patel (www.sarthakpatel.in)
  • 4. IPv4 Header 4 Sarthak Patel (www.sarthakpatel.in)
  • 5. IPv6 Header 5 Sarthak Patel (www.sarthakpatel.in)
  • 6. IP Security Overview IPSec is not a single protocol. Instead, IPSec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms to provide security appropriate for the communication. • Applications of IPSec 6 • Applications of IPSec – Secure branch office connectivity over the Internet – Secure remote access over the Internet – Establsihing extranet and intranet connectivity with partners – Enhancing electronic commerce security Sarthak Patel (www.sarthakpatel.in)
  • 7. IP Security Scenario 7 Sarthak Patel (www.sarthakpatel.in)
  • 8. IP Security Overview Benefits of IPSec When IPSec is implemented in a firewall or router, it provides strong security. IPSec in a firewall is resistant to bypass if all traffic from the outside must use IP, and the firewall is the only means of entrance from the Internet into the organization. 8 IPSec is below the transport layer (TCP, UDP) and so is transparent to applications. There is no need to change software on a user or server system when IPSec is implemented in the firewall or router. Even if IPSec is implemented in end systems, upper-layer software, including applications, is not affected. IPSec can be transparent to end users. There is no need to train users on security mechanisms, issue keying material on a per-user basis, or revoke keying material when users leave the organization. Sarthak Patel (www.sarthakpatel.in)
  • 9. IP Security Architecture IPSec documents: NEW updates in 2005! The IPSec specification consists of numerous documents.The most important of these, issued in November of 1998, are RFCs 2401, 2402, 2406, and 2408: RFC 2401:An overview of a security architecture RFC 2402: Description of a packet authentication extension to 9 RFC 2402: Description of a packet authentication extension to IPv4 and IPv6 RFC 2406: Description of a packet encryption extension to IPv4 and IPv6 RFC 2408: Specification of key management capabilities Sarthak Patel (www.sarthakpatel.in)
  • 10. IP Security Architecture Architecture: Covers the general concepts, security requirements, definitions, and mechanisms defining IPSec technology. Encapsulating Security Payload (ESP): Covers the packet format and general issues related to the use of the ESP for packet encryption and, optionally, authentication. Authentication Header (AH): Covers the packet format and general issues related to the use ofAH for packet authentication. Encryption Algorithm: A set of documents that describe how various encryption 10 Encryption Algorithm: A set of documents that describe how various encryption algorithms are used for ESP. Authentication Algorithm: A set of documents that describe how various authentication algorithms are used forAH and for the authentication option of ESP. Key Management: Documents that describe key management schemes. Domain of Interpretation (DOI): Contains values needed for the other documents to relate to each other. These include identifiers for approved encryption and authentication algorithms, as well as operational parameters such as key lifetime. Sarthak Patel (www.sarthakpatel.in)
  • 11. IPSec Document Overview 11 Sarthak Patel (www.sarthakpatel.in)
  • 12. IPSec Services Access Control Connectionless integrity Data origin authentication Rejection of replayed packets Confidentiality (encryption) 12 Confidentiality (encryption) Limited traffic flow confidentiallity Sarthak Patel (www.sarthakpatel.in)
  • 13. Security Associations (SA) A one way relationship between a sender and a receiver. Identified by three parameters: Security Parameters Index (SPI) IP Destination address Security Protocol Identifier 13 Security Protocol Identifier Sarthak Patel (www.sarthakpatel.in)
  • 14. SA ParametersSA ParametersSA ParametersSA Parameters Sequence Number Counter Sequence Counter Overflow Anti-ReplayWindow AH Information ESP Information 14 ESP Information Lifetime ofThis Security Association IPSec Protocol Mode:Tunnel, transport Path MTU (MaxTrans. Unit) Sarthak Patel (www.sarthakpatel.in)
  • 15. Transport and Tunnel ModesTransport and Tunnel ModesTransport and Tunnel ModesTransport and Tunnel Modes Transport Mode Transport mode provides protection primarily for upper-layer protocols.That is, transport mode protection extends to the payload of an IP packet. Tunnel Mode 15 Tunnel Mode Tunnel mode provides protection to the entire IP packet. Sarthak Patel (www.sarthakpatel.in)
  • 16. Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header 16 ESP Encrypts IP payload and any IPv6 extesion header Encrypts inner IP packet ESP with authentication Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header Encrypts inner IP packet. Authenticates inner IP packet. Sarthak Patel (www.sarthakpatel.in)
  • 17. Before applying AH 17 Sarthak Patel (www.sarthakpatel.in)
  • 18. Transport Mode (AH Authentication) 18 Sarthak Patel (www.sarthakpatel.in)
  • 19. Tunnel Mode (AH Authentication) 19 Sarthak Patel (www.sarthakpatel.in)
  • 20. Authentication Header Provides support for data integrity and authentication (MAC code) of IP packets. Guards against replay attacks. 20 Sarthak Patel (www.sarthakpatel.in)
  • 21. Encapsulating Security Payload ESP provides confidentiality services 21 Sarthak Patel (www.sarthakpatel.in)
  • 22. Encryption and Authentication Algorithms Encryption: Three-key triple DES RC5 IDEA Three-key triple IDEA CAST 22 CAST Blowfish Authentication: HMAC-MD5-96 HMAC-SHA-1-96 Sarthak Patel (www.sarthakpatel.in)
  • 23. ESP Encryption and Authentication 23 Sarthak Patel (www.sarthakpatel.in)
  • 24. ESP Encryption and Authentication 24 Sarthak Patel (www.sarthakpatel.in)
  • 25. Combinations of Security Associations 25 In Case 1, all security is provided between end systems that implement IPSec. Sarthak Patel (www.sarthakpatel.in)
  • 26. Combinations of Security Associations 26 For Case 2, security is provided only between gateways (routers, firewalls, etc.) and no hosts implement IPSec. This case illustrates simple virtual private network support. Sarthak Patel (www.sarthakpatel.in)
  • 27. Combinations of Security Associations 27 Case 3 builds on Case 2 by adding end-to-end security. The same combinations discussed for cases 1 and 2 are allowed here. The gateway-to-gateway tunnel provides either authentication or confidentiality or both for all traffic between end systems. Sarthak Patel (www.sarthakpatel.in)
  • 28. Combinations of Security Associations 28 Case 4 provides support for a remote host that uses the Internet to reach an organization's firewall and then to gain access to some server or workstation behind the firewall. Sarthak Patel (www.sarthakpatel.in)
  • 29. Key Management Two types: Manual: A system administrator manually configures each system with its own keys and with the keys of other communicating systems. This is practical for small, relatively static environments. 29 Automated: An automated system enables the on-demand creation of keys for SAs and facilitates the use of keys in a large distributed system with an evolving configuration. Oakley Oakley is a key exchange protocol based on the Diffie Hellman algorithm but providing added security. Internet Security Association and Key Management Protocol (ISAKMP) Sarthak Patel (www.sarthakpatel.in)
  • 30. Oakley Three authentication methods: Digital signatures Public-key encryption Symmetric-key encryption (aka. Preshare key) 30 Sarthak Patel (www.sarthakpatel.in)
  • 31. ISAKMP 31 Sarthak Patel (www.sarthakpatel.in)
  • 32. Email Security email is one of the most widely used and regarded network services currently message contents are not secure 32 Sarthak Patel (www.sarthakpatel.in)
  • 33. Email Security Enhancements confidentiality protection from disclosure authentication of sender of message message integrity 33 message integrity protection from modification non-repudiation of origin protection from denial by sender Sarthak Patel (www.sarthakpatel.in)
  • 34. Pretty Good Privacy (PGP) Open source, freely available software package for secure e- mail de facto standard for secure email developed by Phil Zimmermann selected best available crypto algs to use 34 selected best available crypto algs to use Runs on a variety of platforms like Unix, XP, Macintosh and other systems originally free (now also have commercial versions available) Sarthak Patel (www.sarthakpatel.in)
  • 35. PGP Operation – Authentication 1. sender creates message 2. Generates a digital signature for the message 3. use SHA-1 to generate 160-bit hash of message 4. signed hash with RSA using sender's private key, and is attached to message 35 attached to message 5. receiver uses RSA with sender's public key to decrypt and recover hash code 6. receiver verifies received message using hash of it and compares with decrypted hash code Sarthak Patel (www.sarthakpatel.in)
  • 36. PGP Operation – Confidentiality 1. sender generates a message and encrypts it. 2. Generates a128-bit random number as session key 3. Encrypts the message using CAST-128 / IDEA / 3DES in CBC mode with session key 4. session key encrypted using RSA with recipient's public 36 4. session key encrypted using RSA with recipient's public key and attached to the msg 5. receiver uses RSA with private key to decrypt and recover session key 6. session key is used to decrypt message Sarthak Patel (www.sarthakpatel.in)
  • 37. PGP Operation – Confidentiality & Authentication can use both services on the same message create signature & attach it to the message encrypt both message & signature 37 Sarthak Patel (www.sarthakpatel.in)
  • 38. PGP Operation – Compression PGP compresses messages to save space for e-mail transmission and storage by default PGP compresses message after signing but before encrypting so can store uncompressed message & signature for later 38 so can store uncompressed message & signature for later verification Encryption after compression strengthens security (because compression has less redundancy) uses ZIP compression algorithm Sarthak Patel (www.sarthakpatel.in)
  • 39. PGP Operation – Email Compatibility when using PGP will have binary data (8-bit octets) to send (encrypted message, etc) however email was designed only for text hence PGP must encode raw binary data into printable ASCII characters 39 ASCII characters uses radix-64 algorithm PGP also segments messages if too big (maximum length 50,000 octets) Sarthak Patel (www.sarthakpatel.in)
  • 40. PGP Cryptographic FunctionsPGP Cryptographic FunctionsPGP Cryptographic FunctionsPGP Cryptographic Functions 40 Sarthak Patel (www.sarthakpatel.in)
  • 41. Ks =session key used in symmetric encryption scheme PRa =private key of userA, used in public-key encryption scheme PUa =public key of userA, used in public-key encryption scheme 41 EP = public-key encryption DP = public-key decryption EC = symmetric encryption DC = symmetric decryption H = hash function || = concatenation Z = compression using ZIP algorithm R64 = conversion to radix 64ASCII format Sarthak Patel (www.sarthakpatel.in)
  • 42. PGP Operation – Summary 42 Sarthak Patel (www.sarthakpatel.in)
  • 43. PGP Session Keys need a session key for each message of varying sizes: 56-bit DES, 128-bit CAST or IDEA, 168-bit Triple-DES uses random inputs 43 Sarthak Patel (www.sarthakpatel.in)
  • 44. PGP Message Format 44 Sarthak Patel (www.sarthakpatel.in)
  • 45. S/MIMES/MIMES/MIMES/MIME S/MIME (Secure/Multipurpose Internet Mail Extension) is a security enhancement to the MIME Internet e-mail format standard, based on technology from RSA Data Security. RFC 822 45 RFC 822 RFC 822 defines a format for text messages that are sent using electronic mail. It has been the standard for Internet-based text mail message and remains in common use. Sarthak Patel (www.sarthakpatel.in)
  • 46. RFC Header Date:Tue, 16 Jan 1998 10:37:17 (EST) From: "William Stallings" <ws@shore.net> Subject:The Syntax in RFC 822 To: Smith@Other-host.com 46 Cc: Jones@Yet-Another-Host.com Hello.This section begins the actual message body, which is delimited from the message heading by a blank line. Sarthak Patel (www.sarthakpatel.in)
  • 47. Multipurpose Internet Mail ExtensionsMultipurpose Internet Mail ExtensionsMultipurpose Internet Mail ExtensionsMultipurpose Internet Mail Extensions MIME is an extension to the RFC 822 framework that is intended to address some of the problems and limitations of the use of SMTP (Simple Mail Transfer Protocol) or some other mail transfer protocol and RFC 822 for electronic mail. 47 mail. Sarthak Patel (www.sarthakpatel.in)
  • 48. Overview S/MIMEOverview S/MIMEOverview S/MIMEOverview S/MIME The MIME specification includes the following elements: 1. Five new message header fields are defined, which may be included in an RFC 822 header. These fields provide information about the body of the message. 2. A number of content formats are defined, thus standardizing 48 2. A number of content formats are defined, thus standardizing representations that support multimedia electronic mail. 3. Transfer encodings are defined that enable the conversion of any content format into a form that is protected from alteration by the mail system. Sarthak Patel (www.sarthakpatel.in)
  • 49. The five header fields defined in MIME are as follows: MIME-Version: Must have the parameter value 1.0. This field indicates that the message conforms to RFCs 2045 and 2046. Content-Type: Describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate 49 represent the data to the user or otherwise deal with the data in an appropriate manner. Content-Transfer-Encoding: Indicates the type of transformation that has been used to represent the body of the message in a way that is acceptable for mail transport. Content-ID: Used to identify MIME entities uniquely in multiple contexts. Content-Description: A text description of the object with the body; this is useful when the object is not readable (e.g., audio data). Sarthak Patel (www.sarthakpatel.in)
  • 50. 50
  • 51. THE END Sarthak Patel (www.sarthakpatel.in)51 THE END