Unit-6 Network Security and Public Key Infrastructure
Unit-6 Network Security and Public Key Infrastructure
Unit-6 Network Security and Public Key Infrastructure
• The figure below shows a typical network mail service. The U (user
agent) interacts directly with the sender. When the message is
composed, the U hands it to the MT (message transport, or transfer,
agent). The MT transfers the message to its destination host, or to
another MT, which in turn transfers the message further. At the
destination host, the MT invokes a user agent to deliver the message.
• An attacker can read electronic mail at any of the computers on which MTs handling the message reside, as well as on the
network itself.
• Four types of attacks (violation of confidentiality, authentication, message integrity, and nonrepudiation) make electronic
mail nonsecure. So IETF with the goal of e-mail privacy develop electronic mail protocols that would provide the
following services.
1. Confidentiality, by making the message unreadable except to the sender and recipient(s)
2. Origin authentication, by identifying the sender precisely
3. Data integrity, by ensuring that any changes in the message are easy to detect
4. Nonrepudiation of origin (if possible)
The protocols were named Privacy-Enhanced Electronic Mail (or PEM).
PEM vs. PGP
• This protocol, also called the key-exchange protocol, is responsible for establishing
a secure session between two parties. The SSL handshake protocol can be divided to
several important stages:
1. Authenticate the server to the client.
2. Negotiation of common cryptographic algorithms, that both server and client
support.
3. Authenticate the client to the server (optional).
4. Using public-key encryption to exchange cryptography parameters (shared secrets).
5. Establish an encrypted SSL connection.
The SSL Change Cipher Spec
Protocol
• It is used in the last stage of the SSL Handshake protocol to let the
parties know to move from the pending state to the current state i.e.
the parties finishes using the key-exchange algorithm and moves on to
use the encryption and MAC algorithms, which were defined in the
Handshake protocol. This message has one byte with content of ‘1’
and is encrypted and compressed under the current CipherSpec.
The SSL Alert Protocol
• This protocol simply passes data from the application layer to the SSL
Record Protocol layer. The record protocol transports the data to the peer
using the current compression and cipher algorithms
Transport Layer Security(TLS)
• SSLv3 uses the same algorithm, except that the padding bytes are concatenated with the
secret key rather than being XORed with the secret key padded to the block length.