12 - Lecture #12 SS G513 Network Security S/MIME...

Info iconThis preview shows pages 1–15. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture #12 SS G513 Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME email original Internet RFC822 email was text only MIME provided support for varying content types and multi-part messages with encoding of binary data to textual form S/MIME added security enhancements have S/MIME support in various modern mail agents: MS Outlook, Netscape etc
Background image of page 2
S/MIME Functions enveloped data encrypted content and associated keys signed data encoded message + signed digest clear-signed data cleartext message + encoded signed digest nesting of signed & encrypted entities
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
S/MIME Cryptographic Algorithms message encryption: Triple-DES, RC2/40 and others have a procedure to decide which algorithms to use
Background image of page 4
S/MIME Certificate Processing S/MIME uses X.509 v3 certificates managed using a hybrid of a strict X.509 each client has a list of trusted CA’s certs certificates must be signed by trusted CA’s
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Certificate Authorities have several well-known CA’s Verisign one of most widely used Verisign issues several types of Digital IDs Class Identity Checks Usage 1 name/email check web browsing/email 2+ enroll/addr check email, subs, s/w validate 3+ ID documents e-banking/service access
Background image of page 6
Summary have considered: S/MIME
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 16 IP Security //Modified by Prof. M. Singhal// Henric Johnson Blekinge Institute of Technology, Sweden http://www.its.bth.se/staff/hjo/ henric.johnson@bth.se
Background image of page 8
Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations of Security Associations Key Management
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Secure IP Should achieve the following: Disallow links to un-trusted sites. Encrypt packets that leave the premises. Authenticate packets that enter the premises.
Background image of page 10
IP-Level Security Consists of three aspects: 1. Authentication: insures that the received packet was transmitted by the party identified in the header. 2. Confidentiality: Enables communicating nodes to encrypt messages. 3. Key management: secure key exchange.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TCP/IP Example
Background image of page 12
IP Security Overview IPSec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms provide security appropriate for the communication.
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Applications of IPSec Secure branch office connectivity over the Internet: a company can build a secure private virtual network over the Internet or over a public WAN. Secure remote access over the Internet: An
Background image of page 14
Image of page 15
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 87

12 - Lecture #12 SS G513 Network Security S/MIME...

This preview shows document pages 1 - 15. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online