null (1)
null (1)
12/26/24
secure
May be inspected either in transit
Or by suitably privileged users on
destination system
3
12/26/24
Confidentiality
Protection from disclosure
Authentication
of sender of message
Message integrity
Protection from modification
Non-repudiation of origin
Protection from denial by sender
4
12/26/24
6
12/26/24
7
12/26/24
8
12/26/24
9
12/26/24
10
12/26/24
11
12/26/24
12
12/26/24
13
12/26/24
14
12/26/24
15
12/26/24
16
12/26/24
17
12/26/24
18
12/26/24
19
12/26/24
20
12/26/24
21
12/26/24
EMAIL FORMAT
Current standard for e-mail format:
RFC 822 -> RFC 5322
Standard for e-mail transfer:
RFC 821 (Simple Mail Transfer Protocol, SMTP)
Standard for MIME: extension to email format
RFC 2045-2049
To address the problems and limitations of
SMTP/RFC5322
22
12/26/24
LIMITATIONS OF SMTP/RFC5322
SMTP cannot transmit binary files
SMTP cannot transmit text that includes
national language characters
SMTP may reject mails over a certain
size
SMTP might have translation problem in
character codes
Some implementations do not adhere
completely to the SMTP standard
23
12/26/24
25
12/26/24
26
12/26/24
A MULTIPART EXAMPLE
(See Fig.7.8)
27
12/26/24
Enveloped data
Encrypted content and associated keys
Signed data
Encoded message + signed digest
Clear-signed data
Cleartext message + encoded signed digest
Signed & enveloped data
Nesting of signed & encrypted entities
28
12/26/24
Clear-signed data
Registration request
31
12/26/24
33
12/26/24
34
12/26/24
35
12/26/24
36
12/26/24
Transparen
t to user
MSA sign
MDA verify
For
pragmatic
reasons
37
12/26/24
38
12/26/24
12/26/24
41
12/26/24
42
12/26/24
Access control
Connectionless integrity
Data origin authentication
Rejection of replayed packets
a form of partial sequence integrity
Confidentiality (encryption)
Limited traffic flow confidentiality
45
12/26/24
Transport Mode
to encrypt & optionally authenticate IP data
can do traffic analysis but is efficient
good for ESP host to host traffic
Tunnel Mode
encrypts entire IP packet
add new header for next hop
no routers on way can examine inner IP
header
good for VPNs, gateway to gateway security
46
12/26/24
47
12/26/24
48
12/26/24
50
12/26/24
51
12/26/24
52
12/26/24
55
12/26/24
56
12/26/24
57
12/26/24
58
12/26/24
59
12/26/24
60
12/26/24
61
12/26/24
62
12/26/24
65
12/26/24
66
12/26/24
67
12/26/24
68
12/26/24
70
12/26/24
SSL connection
A transient, peer-to-peer, communications
link
Associated with 1 SSL session
SSL session
An association between client & server
Created by the Handshake Protocol
Define a set of cryptographic parameters
May be shared by multiple SSL connections
71
12/26/24
Confidentiality
Using symmetric encryption with a shared
secret key defined by Handshake Protocol
Block cipher: AES, IDEA, RC2-40, DES-40, DES,
3DES, Fortezza
Stream cipher: RC4-40, RC4-128
Message is compressed before encryption
Message integrity
Using a MAC with shared secret key
Similar to HMAC but with different padding
72
12/26/24
73
12/26/24
74
12/26/24
75
12/26/24
78
12/26/24
79
12/26/24
81
12/26/24
82
12/26/24
SSH_MSG_USERAUTH_FAILURE
SSH_MSG_USERAUTH_SUCCESS
84
12/26/24
85
12/26/24
86
12/26/24