NSC Topic 4 Email Security
NSC Topic 4 Email Security
NSC Topic 4 Email Security
Topic 4:
Email Security
Topic 4 – Lecture 1:
Email Security Threats
Learning Outcomes
By the end of this topic students will be able to:
• Describe email security mechanisms
• Digitally sign an email
Importance of Email
• Business has come to rely on email as a means of
communication:
- fast
- cost-effective
- easy collaboration and information-sharing
• Email has become the primary method for
corresponding with colleagues, customers, and
business partners
Importance of Email
E-mails sent and received in billions
330
320
310
300
290
280
270
260
250
240
2017 2018* 2019* 2020*
E-mails sent and received in billions 2021*
Viruses
• Viruses are very sophisticated and often appear to
be harmless correspondence:
- personal communication
- jokes
- marketing promotions
• Most viruses require recipients to download
attachments in order to spread
• Some are designed to launch automatically, with no
user action required
Spam
• A large proportion of all corporate email is spam
10
11
Phishing
• Used for identity theft and fraud
• Posing as authorised emails from trustworthy
institutions
• Attempt to get recipients to surrender personal
information such as bank account details
• Most are aimed at individuals
• Some have targeted smaller businesses
12
13
Spear Phishing
• A more targeted attacked compared to traditional
Phishing.
• Considered more of a social engineering technique than
a hacking method.
– Once contact is made the attacking party must manipulate the
target using persuasive language and due to research
undertaken prior to the attack the conversation will be as
personalised as possible.
• Could be an attack as part of a ethical hacking
consultants attempt to analyse vulnerabilities in the
current operation.
14
Spyware
• Enables hackers to record activities and data from
the infected computer
• Done via a program that dynamically gathers
information and transmits it via an Internet
connection
• Often bundled in with shareware and freeware
programs
• Usually installs and runs without user knowledge
15
16
Email Authentication
• Aims to provide enough information to the recipient
so that they know the nature of the email
• A valid identity on an email is a vital step in
stopping spam, forgery, fraud, and other serious
crimes
• SMTP was not designed with security in mind and
thus had no formal verification of the sender
• Signing emails identifies the origin of a message,
but not if it should be trusted
17
18
Blacklisting IP Addresses
• The IP addresses originating spam and phishing
emails can be blacklisted so that future email from
them is not received but either quarantined or
deleted
• Many IP addresses are dynamic
- Change frequently
- An organisation has a block of IP addresses
- IP addresses are allocated when needed
- May get a new address every time a connection is made
• Therefore, spammer will not have a permanent IP
address
19
Controlling Traffic
• Some ISPs use techniques to prevent spamming by
their customers:
- Port 25 can be blocked so that port 587 is used and
that requires authentication
- Limiting the number of received headers in relayed
mail
- Infected computers can be cleaned and patched
- Outgoing email can be monitored for any sudden
increase in flow or in content (a typical spam
signature)
20
21
22
Topic 4 – Lecture 2:
PGP and S/MIME
23
24
25
Encrypting Transmission
• Encrypting the transmissions between mail servers
is used only when two organisations want to protect
emails regularly sent between themselves
• The organisations could establish a virtual private
network (VPN) to encrypt the communications
between their mail servers over the Internet
• A VPN can be used encrypt entire messages
including header information
- E.g. senders, recipients, subject lines
26
Individual Emails
• Most email messages are protected individually
rather than along a secure VPN
• Each message is protected by digitally signing and
optionally encrypting it
• Widely used standards for signing and encrypting
message bodies are:
- Open Pretty Good Privacy (OpenPGP)
- Secure/Multipurpose Internet Mail Extensions
(S/MIME)
27
OpenPGP
• A protocol for encrypting and signing messages and creating certificates using
public key cryptography
• The original PGP protocol used some encryption algorithms with intellectual
property restrictions
• Most current articles will usually link to the now infamous Edward Snowdon
28
OpenPGP Algorithms
• A number of OpenPGP based products fully support
cryptographic algorithms recommended by NIST
including:
- 3DES and AES for data encryption
- Digital Signature Algorithm (DSA) and RSA for digital
signatures
- SHA for hashing
• Other implementations of OpenPGP support other
encryption schemes
29
OpenPGP Cryptography
• OpenPGP use both public key cryptography and
symmetric key cryptography
30
31
32
Using OpenPGP
• Many popular mail clients require the installation of
a plug-in in order to operate OpenPGP, e.g.:
- Mozilla Thunderbird,
- Apple Mail
- Microsoft Outlook
• There are a number of OpenPGP distribution
websites that contain instructions on how to use
OpenPGP with various mail client applications
33
34
Web of Trust
• PGP removes the need for a centralised
authority.
• Individuals sign each others keys instead.
• As users interact and communicate their ‘web of
trust’ / shared keys grows and grows.
• You can create your own public key and share it
in the wild and use the following link to follow it’s
journey.
• https://pgp.cs.uu.nl
35
MIME
• Multipurpose Internet Mail Extensions - an Internet
standard that extends the format of email to
support:
- Text that uses character sets other than ASCII
- Attachments that are not text based
- Message bodies with multiple parts
- Header information in non-ASCII character sets
36
S/MIME
• Secure/MIME is a version of the MIME protocol
• It supports encryption of email messages and their
contents via public-key encryption technology
• Created in 1995 by a group of software vendors to
prevent interception and forgery of email
• Builds on the existing MIME protocol standard
• Is easily integrated into existing email products
37
S/MIME Functions
• Provides cryptographic security services for
electronic messaging applications, including:
- Authentication (via digital signatures)
- Message integrity (via digital signatures)
- Non-repudiation of origin (via digital signatures)
- Privacy (using encryption)
- Data security (using encryption)
38
S/MIME Interoperability
• Based on widely supported standards
- likely to continue to be widely implemented across a
variety of operating systems and email clients
• Is supported by many email clients and can be used
to securely communicate between them
- Not always simple
• For example, a Windows operating system user
with the Outlook email client can send a secure,
digitally signed email to a Unix operating system
user without installing any additional software
39
S/MIME Certificates
• An individual key/certificate must be obtained from
a Certificate Authority (CA)
• Accepted best practice is to use separate private
keys for signature and encryption
- permits escrow of the encryption key without
compromise to the non-repudiation property of the
signature key
• Encryption requires having the destination party's
certificate stored
40
S/MIME Process
• S/MIME-enabled mail clients send messages in a
similar way to OpenPGP
• S/MIME version 3.1 supports two recommended
symmetric key encryption algorithms:
- AES
- 3DES
• AES is considered a stronger algorithm than 3DES
41
Key Management
• OpenPGP and S/MIME use digital certificates to
manage keys
• A digital certificate identifies:
- the entity that the certificate was issued to
- the public key of the entity’s public key pair
- other information, such as the date of expiration,
signed by some trusted party
• There are differences in how the two protocols
manage trust
42
43
44
45
New Research..
The fight is constant
• 2018:
– Data Leakage Prevention: E-Mail Protection via Gateway
– Google Patent: US20180013710A1 – Email sender and
Reply-To Authentication to prevent interception of email
replies
– A First Look at Identity Management Schemes on the
Blockchain (The Blockchain is very exciting for
computing moving forward!!)
– Hybrid Attribute Based Encryption
46
References
• Stallings, W. (2010). Cryptography and Network
Security: Principles and Practice. Pearson
Education.
• NIST (2007). Guidelines on Electronic Mail Security.
NIST.
47
Any Questions?
48