Lecture-Email-Security-4-19-10

Lecture-Email-Securi - E l ectr oni c M a i l Secur i ty Ratan Guha CI S 3060 Secur i ty i n Computi ng Spr i ng 2010 Resour ces Used Cr yptogr

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: E l ectr oni c M a i l Secur i ty Ratan Guha CI S 3060 Secur i ty i n Computi ng Spr i ng 2010 4-19-10 Resour ces Used Cr yptogr aphy and Networ k Secur i ty, Four th E di ti on, by Wi l l i am Stal l i ngs, Chapter 15 E-Mail Security 2 Outl i ne Pr etty Good Pr i vacy Radi x 64 E-Mail Security 3 Pr etty Good Pr i vacy Phi l i p R. Zi mmer man i s the cr eator of PGP. PGP pr ovi des a confi denti al i ty and authenti cati on ser vi ce that can be used for el ectr oni c mai l and fi l e stor age appl i cati ons. E-Mail Security 4 Why I s PGP Popul ar ? I t i s avai l i abl e fr ee on a var i ety of pl atfor ms. Based on wel l know n al gor i thms. Wi de r ange of appl i cabi l i ty Not devel oped or contr ol l ed by gover nmental or standar ds or gani zati ons E-Mail Security 5 Oper ati onal Descr i pti on Consi st of fi ve ser vi ces: r Authenti cati on r Confi denti al i ty r Compr essi on r E-mai l compati bi l i ty r Segmentati on E-Mail Security 6 E-Mail Security 7 Compr essi on PGP compr esses the message after appl yi ng t he si gnatur e but befor e encr ypti on The pl acement of the compr essi on al gor i thm i s cr i ti cal . The compr essi on al gor i thm used i s ZI P E-Mail Security 8 E-mai l Compati bi l i ty The scheme used i s r adi x-64 conver si on (see appendi x 15B Page 478 I wi l l have a separ ate h andout on r adi x 64). The use of r adi x-64 expands the message by 33%. E-Mail Security 9 Segmentati on and Reassembl y Often r estr i cted to a maxi mum message l ength of 50,000 octets. L onger messages must be br oken up i nto segments. PGP automati cal l y subdi vi des a message t hat i s to l ar ge. The r ecei ver str i p of al l e-mai l header s and r eassembl e the bl ock. E-Mail Security 10 Sumar y of PGP Ser vi ces Funct ion Algorit hm Used Digit al Signat ur e DSS/ SHA or RSA/ SHA M essage CAST or I DEA or Encr ypt ion t hr ee- key t r iple DES wit h Dif f ie- Hellman or RSA Compr ession ZI P E- mail Radix - 64 conver sion Compat ibilit y Segment at ion E-Mail Security 11 E-Mail Security 12 For mat of PGP M essage E-Mail Security 13 ...
View Full Document

This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

Page1 / 13

Lecture-Email-Securi - E l ectr oni c M a i l Secur i ty Ratan Guha CI S 3060 Secur i ty i n Computi ng Spr i ng 2010 Resour ces Used Cr yptogr

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online