Doc dis
Doc dis
Secure Socket Layer (SSL) provides security to the data that is transferred
between web browser and server. SSL encrypts the link between a web server
and a browser which ensures that all data passed between them remain
private and free from attack. In this article, we are going to discuss SSL in
detail, its protocols, the silent features of SSL, and the version of SSL.
Change-Cipher Protocol
This protocol uses the SSL record protocol. Unless Handshake Protocol is
completed, the SSL record Output will be in a pending state. After the
handshake protocol, the Pending state is converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in length
and can have only one value. This protocol’s purpose is to cause the pending
state to be copied into the current state.
Alert Protocol
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
The level is further classified into two parts:
Warning (level = 1)
This Alert has no impact on the connection between sender and receiver. Some
of them are:
Bad Certificate: When the received certificate is corrupt.
No Certificate: When an appropriate certificate is not available.
Certificate Expired: When a certificate has expired.
Certificate Unknown: When some other unspecified issue arose in
processing the certificate, rendering it unacceptable.
Close Notify: It notifies that the sender will no longer send any
messages in the connection.
Unsupported Certificate: The type of certificate received is not
supported.
Certificate Revoked: The certificate received is in revocation list.
Fatal Error (level = 2):
This Alert breaks the connection between sender and receiver. The connection
will be stopped, cannot be resumed but can be restarted. Some of them are :
Handshake Failure: When the sender is unable to negotiate an
acceptable set of security parameters given the options available.
Decompression Failure: When the decompression function receives
improper input.
Illegal Parameters: When a field is out of range or inconsistent with
other fields.
Bad Record MAC: When an incorrect MAC was received.
Unexpected Message: When an inappropriate message is received.
The second byte in the Alert protocol describes the error.
SSL Certificate
SSL (Secure Sockets Layer) certificate is a digital certificate used to secure and
verify the identity of a website or an online service. The certificate is issued by
a trusted third-party called a Certificate Authority (CA), who verifies the
identity of the website or service before issuing the certificate.
The SSL certificate has several important characteristics that make it a reliable
solution for securing online transactions:
Encryption: The SSL certificate uses encryption algorithms to secure the
communication between the website or service and its users. This
ensures that the sensitive information, such as login credentials and
credit card information, is protected from being intercepted and read by
unauthorized parties.
Authentication: The SSL certificate verifies the identity of the website or
service, ensuring that users are communicating with the intended party
and not with an impostor. This provides assurance to users that their
information is being transmitted to a trusted entity.
Integrity: The SSL certificate uses message authentication codes (MACs)
to detect any tampering with the data during transmission. This ensures
that the data being transmitted is not modified in any way, preserving its
integrity.
Non-repudiation: SSL certificates provide non-repudiation of data,
meaning that the recipient of the data cannot deny having received it.
This is important in situations where the authenticity of the information
needs to be established, such as in e-commerce transactions.
Public-key cryptography: SSL certificates use public-key cryptography
for secure key exchange between the client and server. This allows the
client and server to securely exchange encryption keys, ensuring that the
encrypted information can only be decrypted by the intended recipient.
Session management: SSL certificates allow for the management of
secure sessions, allowing for the resumption of secure sessions after
interruption. This helps to reduce the overhead of establishing a new
secure connection each time a user accesses a website or service.
Certificates issued by trusted CAs: SSL certificates are issued by
trusted CAs, who are responsible for verifying the identity of the website
or service before issuing the certificate. This provides a high level of trust
and assurance to users that the website or service they are
communicating with is authentic and trustworthy.
In addition to these key characteristics, SSL certificates also come in various
levels of validation, including Domain Validation (DV), Organization Validation
(OV), and Extended Validation (EV). The level of validation determines the
amount of information that is verified by the CA before issuing the certificate,
with EV certificates providing the highest level of assurance and trust to
users.For more information about SSL certificates for each Validation level
type, please refer to Namecheap.
Overall, the SSL certificate is an important component of online security,
providing encryption, authentication, integrity, non-repudiation, and other key
features that ensure the secure and reliable transmission of sensitive
information over the internet.
Conclusion
SSL (Secure Sockets Layer) is a crucial Internet security protocol that encrypts
data to ensure privacy, authentication, and data integrity during online
communications. Although it has been succeeded by TLS (Transport Layer
Security), SSL remains widely recognized and foundational in establishing
secure connections between users and web servers. Understanding SSL is
essential for appreciating the evolution of internet security and the protection
of sensitive information online.
Where,
Here,
PI, OIMD, OI all have the same meanings as before.
The new things are :
EP which is symmetric key encryption
Ks is a temporary symmetric key
KUbank is public key of bank
CA is Cardholder or customer Certificate
Digital Envelope = E(KUbank, Ks)
Chatgbt (set)
Introduction to SET
The main goal of SET is to provide a secure and reliable framework for e-
commerce. It ensures that customers and merchants can trust the online
payment process. The protocol works seamlessly with existing payment
systems and enhances their security without exposing sensitive information,
such as credit card details, to unauthorized parties.
Features of SET
1. Confidentiality of Information:
2. SET employs encryption to ensure that sensitive data, such as credit card
numbers and transaction details, are protected during transmission over
the internet. This prevents unauthorized parties from intercepting or
accessing this information.
3. Integrity of Data:
The protocol ensures that the transaction data remains unaltered from the
time it is sent to the time it is received. By using cryptographic hash functions,
SET detects and prevents tampering with the data.
4. Authentication of Parties:
5. Interoperability:
Components of SET
1. Cardholder:
2. Merchant:
3. Payment Gateway:
1. Initiation:
2. Certificate Verification:
Both the customer and the merchant exchange digital certificates to verify
each other's authenticity. This mutual authentication ensures that both parties
are legitimate participants in the transaction.
3. Dual Signature:
4. Authorization:
5. Transaction Completion:
After receiving authorization, the merchant processes the order and sends a
confirmation to the customer. The payment is finalized, and the transaction is
securely completed.
1. Digital Certificates:
3. Dual Signature:
Advantages of SET
Limitations of SET
Despite its robust security features, SET has some limitations that have
hindered its widespread adoption. One major drawback is the complexity of
implementation. Both customers and merchants need to install specialized
software and obtain digital certificates, which can be time-consuming and
costly.
Another limitation is the requirement for all parties to adopt the protocol. For
SET to work effectively, customers, merchants, and payment gateways must
all use the protocol. This makes it difficult for businesses to adopt SET unless it
is widely supported.
Conclusion
Here is the updated version without unnecessary spacing between the lines:
Introduction
The Digital Signature Standard (DSS) is a federal standard for generating and
verifying digital signatures. Introduced by the National Institute of Standards
and Technology (NIST) in 1991 and later revised, DSS ensures the authenticity,
integrity, and non-repudiation of electronic data and communications. DSS is
widely used in secure communication systems, software distribution, and
financial transactions.
1. Key Generation
a. A private key is generated for signing.
b. A corresponding public key is generated for signature verification.
2. Signing Process
a. The sender applies a hash function (e.g., SHA) to the message to
produce a fixed-size hash value.
b. The private key encrypts the hash value, creating the digital
signature.
3. Verification Process
a. The receiver decrypts the digital signature using the sender's public
key.
b. The receiver computes the hash of the received message and
compares it with the decrypted hash value.
c. If the two hash values match, the signature is valid, proving the
integrity and authenticity of the message.
The DSS uses cryptographic hash functions to generate a fixed-size hash of the
message. Common hash algorithms include:
Applications of DSS
Advantages of DSS
Limitations of DSS
Conclusion
UNIT 4
. Email Architecture:
Introduction: Electronic mail, commonly known as email, is a method of
exchanging messages over the internet. Here are the basics of email:
1. An email address: This is a unique identifier for each user, typically in the
format of [email protected].
2. An email client: This is a software program used to send, receive and
manage emails, such as Gmail, Outlook, or Apple Mail.
3. An email server: This is a computer system responsible for storing and
forwarding emails to their intended recipients.
To send an email:
1. Compose a new message in your email client.
2. Enter the recipient’s email address in the “To” field.
3. Add a subject line to summarize the content of the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the recipient’s email server.
7. Emails can also include features such as cc (carbon copy) and bcc (blind
carbon copy) to send copies of the message to multiple recipients, and
reply, reply all, and forward options to manage the con
Electronic Mail (e-mail) is one of most widely used services of Internet.
This service allows an Internet user to send a message in formatted
manner (mail) to the other Internet user in any part of world. Message in
mail not only contain text, but it also contains images, audio and videos
data. The person who is sending mail is called sender and person who
receives mail is called recipient. It is just like postal mail service.
Components of E-Mail System : The basic components of an email system
are : User Agent (UA), Message Transfer Agent (MTA), Mail Box, and Spool
file. These are explained as following below.
1. User Agent (UA) : The UA is normally a program which is used to
send and receive mail. Sometimes, it is called as mail reader. It accepts
variety of commands for composing, receiving and replying to messages as
well as for manipulation of the mailboxes.
2. Message Transfer Agent (MTA) : MTA is actually responsible
for transfer of mail from one system to another. To send a mail, a system
must have client MTA and system MTA. It transfer mail to mailboxes of
recipients if they are connected in the same machine. It delivers mail to
peer MTA if destination mailbox is in another machine. The delivery from
one MTA to another MTA is done by Simple Mail Transfer Protocol
3. Mailbox : It is a file on local hard drive to collect mails. Delivered mails are
present in this file. The user can read it delete it according to his/her
requirement. To use e-mail system each user must have a mailbox . Access to
mailbox is only to owner of mailbox.
4. Spool file : This file contains mails that are to be sent. User agent appends
outgoing mails in this file using SMTP. MTA extracts pending mail from spool
file for their delivery. E-mail allows one name, an alias, to represent several
different e-mail addresses. It is known as
mailing list, Whenever user have to sent a message, system checks
recipient’s name against alias database. If mailing list is present for defined
alias, separate messages, one for each entry in the list, must be prepared and
handed to MTA. If for defined alias, there is no such mailing list is present,
name itself becomes naming address and a single message is delivered to mail
transfer entity.
Services provided by E-mail system :
Composition – The composition refer to process that creates messages
and answers. For composition any kind of text editor can be used.
Transfer – Transfer means sending procedure of mail i.e. from the
sender to recipient.
Reporting – Reporting refers to confirmation for delivery of mail. It help
user to check whether their mail is delivered, lost or rejected.
Displaying – It refers to present mail in form that is understand by the
user. Disposition – This step concern with recipient that what will
recipient do after receiving mail i.e save mail, delete before reading or
delete after reading
Advantages of email:
1. Convenient and fast communication with individuals or groups globally.
2. Easy to store and search for past messages. Disadvantages:
3. Ability to send and receive attachments such as documents, images,
and videos.
4. Cost-effective compared to traditional mail and fax. 5. Available 24/7
Disadvantages of email:
1. Risk of spam and phishing attacks.
2. Overwhelming amount of emails can lead to information overload.
3. Can lead to decreased face-to-face communication and loss of personal
touch.
4. Potential for miscommunication due to lack of tone and body language
in written messages.
5. Technical issues, such as server outages, can disrupt email service.
6. It is important to use email responsibly and effectively, for example, by
keeping the subject line clear and concise, using proper etiquette, and
protecting against security threats.
---
2. Authentication Protocols
---
3. Encryption
---
---
Email gateways serve as the first line of defense against external threats.
Audit Logs: Record email activities for forensic analysis and compliance
purposes.
---
---
---
Real-Life Example
---
Conclusion
Email architecture plays a critical role in data and information security by
safeguarding communication channels, preventing unauthorized access,
and protecting sensitive information. With the increasing sophistication of
cyber threats, organizations must implement comprehensive email
security measures, including authentication protocols, encryption,
monitoring, and training, to maintain the confidentiality, integrity, and
availability of email communications.
S/MIME:
S/MIME or Secure/Multipurpose Internet Mail Extension is a technology
widely used by corporations
that enhances email security by providing encryption, which protects the
content of email messages
from unwanted access.
What Is S/MIME?
S/MIME or Secure/Multipurpose Internet Mail Extension is a technology
widely used by
corporations that enhances email security by providing encryption, which
protects the content of
email messages from unwanted access. It also adds digital signatures,
which confirm that you are
the authentic sender of the message, making it a powerful weapon
against many email-based attacks.
In a nutshell, S/MIME is a commonly-used protocol for sending encrypted
and digitally-signed
email messages and is implemented using S/MIME certificates.
S/MIME Uses
S/MIME can be used to:
Check that the email you sent has not been tampered with by a third
party.
Create digital signatures to use when signing emails.
Encrypt all emails.
Check the email client you’re using.
How Does S/MIME Work?
To operate, S/MIME employs mathematically related public and private
keys. This technology is
based on asymmetric cryptography. Because the two keys are
mathematically related, a message
that was encrypted with the public key (which is, of course, published)
can only be decrypted
using the private key (which is kept secret).
When someone clicks “send” on an email, S/MIME sending agent software
encrypts the message
with the recipient’s public key, and the receiving agent decrypts it with
the recipient’s private key.
Needless to say, both the sender and the recipient must support S/MIME.
The email message decryption process can only be done with the private
key associated with it, which
is supposed to be in sole possession of the recipient. Unless the private
key is compromised, users can
be confident that only the intended recipient will have access to the
confidential information
contained in their emails.
Simply put, S/MIME encryption muddles emails so that they can only be
viewed by receivers who
have a private key to decrypt them. It prevents others, particularly
malicious actors, from intercepting
and reading email messages as they are sent from senders to recipients.
You may be aware that SMTP-based Internet email does not provide
message security. An SMTP
(Simple Mail Transfer Protocol) internet email message can be read by
anyone who sees it as it
travels or views it where it is stored. S/MIME uses encryption to tackle
these issues.
Confidentiality
The purpose of message encryption is to keep the contents of an email
message safe. The contents are
only visible to the intended recipient, and they remain private and
inaccessible to anyone else who
might obtain or view the message. Encryption ensures message
confidentiality while in transit and
storage.
Data integrity
Message encryption, like digital signatures, offers data integrity services
as a result of the operations
that make encryption possible.
As I mentioned before, S/MIME also adds a digital signature to an email.
This guarantees that the
sender has permission to send emails from a specific domain.
S/MIME Digital Signatures
Digital signatures are the most commonly used service of S/MIME. As the
name indicates, they are
the digital equivalent of the conventional, legal signature on a paper
document. S/MIME digital
signatures protect against email spoofing attempts by confirming the
sender’s identity, making sure
that the message content has not been tampered with, and verifying that
the sender actually sent the
email message.
Security capabilities offered by digital signatures:
Authentication
A signature validates the answer to the question “who are you?” by
allowing that entity to be
distinguished from all others and proving its uniqueness. Authentication
ensures that a message was
sent by the individual or organization claiming to have sent it. This
reduces the likelihood of email
spoofing, which is common in phishing scams.
Nonrepudiation
A signature’s uniqueness prevents the sender from denying that they
sent the message. This is useful
for purchases and transactions, legal documentation, and criminal
investigations, among other things.
Data integrity
When the receiver of a digitally signed email validates the digital
signature, the recipient is assured
that the received email message is the same one that was signed and
sent and that has not been
tampered with while it traveled.
Encrypt your email. This certificate can be used to digitally sign your
emails. Once you purchase it, it
All senders and receivers must have a digital certificate that binds their
identity to a public key.
S/MIME certificates ensure that the emails you send are only accessible
by the intended recipient.
Public and private keys will be used to encrypt and decrypt emails,
ensuring that the emails you
Contents.
Offer both digital signatures and encryption.
Message integrity.
Gmail
S/MIME configured. If the user intends to send the email to more than one
recipient, and each of
Those recipients supports a distinct level of encryption, Gmail will use the
lowest level of encryption
Outlook
Conclusion
Tampered with the digital signature in any way. The digital signature also
verifies the identity of the
Chatgbt
---
1. Message Confidentiality:
Only the intended recipient, possessing the correct private key, can
decrypt and read the email.
2. Message Integrity:
Ensures that the email message has not been altered during
transmission.
3. Authentication:
4. Non-repudiation:
Digital signatures prevent the sender from denying that they sent the
email.
1. Key Generation:
The sender uses the recipient's public key to encrypt the email.
Benefits of S/MIME
Enhanced Security:
Widely Supported:
Ease of Use:
1. Complex Setup:
3. Key Management:
Users must securely manage their private keys; loss or compromise can
disrupt secure communications.
4. Compatibility Issues:
3. Healthcare:
Conclusion
---
1. Data Encryption:
PGP encrypts messages so only the intended recipient can decrypt and
read them.
2. Digital Signatures:
Ensures the authenticity of the sender and the integrity of the message.
Recipients can verify the sender’s identity and confirm that the message
hasn't been altered.
3. Key Management:
4. File Encryption:
Besides email, PGP can encrypt files and directories, providing an
additional layer of data security.
---
1. Message Encryption:
The session key itself is encrypted using the recipient's public key
(asymmetric encryption).
Both the encrypted message and the encrypted session key are sent to
the recipient.
2. Message Decryption:
The recipient uses their private key to decrypt the session key.
The decrypted session key is then used to decrypt the actual message.
3. Digital Signing:
The sender uses their private key to create a digital signature for the
message.
The recipient uses the sender's public key to verify the digital signature.
This confirms the message's origin and that it has not been tampered
with.
---
Advantages of PGP
1. Strong Security:
2. Wide Compatibility:
4. Flexibility:
---
Challenges of PGP
1. Complexity:
3. Trust Establishment:
The web of trust model requires users to verify each other's keys
manually, which can be cumbersome.
4. Not User-Friendly:
1. Email Encryption:
2. File Encryption:
4. Secure Backups:
Conclusion