Chapter 7b Networking & Distributed Security Spring04 Victor Sawma
Chapter 7b Networking & Distributed Security Spring04 Victor Sawma
technology neutral
Interoperability
Drawback:
CORBA specifications describe the means by
Goals Threats
confidentiality 1. interception
integrity 2. interception and subsequent replay
3. content modification
4. content forgery by outsider
5. content forgery by recipient
6. origin forgery by recipient
authenticity 7. origin modification
8. origin forgery by outsider
nonrepudiation Threats 2 through 8 above
reliable delivery interception (blocked delivery)
denial of message transmission
Sawma V., Computer Security and Their Data 16
Privacy-enhanced E-Mails (PEM)
Internet standards
1987: RFC989 (PEM version 1)
1989: RFC1113 (version 2)
1993: RFC1421, 1422, 1423, 1424 (Part I, II, III, IV), version 3
Protection of privacy-enhanced emails occurs in the body of the
message. The header of the message is not changed to ensure
compatibility with the then existing email systems.
Advantages:
The user may choose to use PEM or not in sending an email.
PEM provide strong end-to-end security for emails.
Problems?
1. Key management
2. The end points may not be secure.