securing e-mail presented by: digvijay singh dudi graduate student old dominion university

12
SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Upload: marcus-tate

Post on 30-Dec-2015

214 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

SECURING E-MAIL

Presented by:Digvijay Singh Dudi

Graduate StudentOld Dominion University

Page 2: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Table of contents

Brief Introduction Securities available for different layers Why we need security at each layer? Desirable security features in e-mail Confidentiality can be provided through

Cryptography Session key Sender authentication and message integrity Pretty Good Privacy(PGP)

Page 3: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Brief Introduction

Electronic mail commonly known as e-mail is a method of exchanging digital messages from one author to one or more recipients.

Today's e-mail is based on a store-and-forward model. E-mail predates the inception of the internet. E-mail servers accept, forward, deliver and store messages.

Users and the computers are not required to be online simultaneously; they need to connect only briefly, typically to a mail server for as long as it takes to send/receive messages.

Page 4: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Securities Available for different Layers

At Application Layer: Pretty Good Privacy(PGP) At Transport Layer: SSL Protocol At Network Layer: Ipsec, IEEE 802.11 Wireless LAN

Protocol

Page 5: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Why we need security at each layer?

Two major reasons: Network layer security can encrypt data in the

datagrams and authenticate source IP address, but cannot provide user level security.

More easy to deploy new Internet services, including security services at the higher levels of protocol stack.

Page 6: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Desirable Security Features in E-Mail

Confidentiality Sender Authentication Message Integrity Receiver Authentication

Page 7: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

Confidentiality can be provided through cryptography

Crytography: Encription and Decription.

Encription can be done by using: Symmetric key technology(using DES or AES) Public key cryptography(using RES) Session key

Page 8: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

SESSION KEY

Page 9: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

SENDER AUTHENTICATION AND MESSAGE INTEGRITY

Page 10: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

PRETTY GOOD PRIVACY(PGP)

Three step process generally applied STEP 1: Calculate Message Digest STEP 2: Apply Symmetric key encryption STEP 3: Public key encryption

Page 11: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

References

www.wikipedia.org Textbook “Computer Networking: Fifth Edition,

Kurose and Ross” Source for diagram of slide 8: www.google.com Source for diagram of slide 9: www.google.com and

textbook: “Computer Networking Fifth Edition: Kurose and Ross”

Page 12: SECURING E-MAIL Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University

QUESTIONS

??????