5-Network Security Applications - Email, IPSEC
5-Network Security Applications - Email, IPSEC
email is one of the most widely used and regarded network services
currently message contents are not secure
may be inspected either in transit
or by suitably privileged users on destination system
In virtually all distributed environments, electronic mail is the
most heavily used network-based application. But current email
services are roughly like "postcards”, anyone who wants could
pick it up and have a look as its in transit or sitting in the
recipients mailbox.
Email Security Enhancements
confidentiality
protection from disclosure
authentication
of sender of message
message integrity
protection from modification
non-repudiation of origin
protection from denial by sender
With the explosively growing reliance on electronic mail for every conceivable
purpose, there grows a demand for authentication and confidentiality services. What
we want is something more akin to standard mail (contents protected inside an
envelope) if not registered mail (have confidence about the sender of the mail and its
contents). That is, the “classic” security services listed are desired.
Pretty Good Privacy (PGP)
• widely used de facto secure email
• developed by Phil Zimmermann
• selected best available crypto algs to use
• integrated into a single program
• on Unix, PC, Macintosh and other systems
• originally free, now also have commercial versions available
• The Pretty Good Privacy (PGP) secure email program, is a remarkable phenomenon,
has grown explosively and is now widely used. Largely the effort of a single person,
Phil Zimmermann, who selected the best available crypto algorithms to use &
integrated them into a single program, PGP provides a confidentiality and
authentication service that can be used for electronic mail and file storage
applications. It runs on a wide range of systems, in both free & commercial versions.
PGP Operation – Authentication
1. sender creates message
2. make SHA-1160-bit hash of message
3. attached RSA signed hash to message
4. receiver decrypts & recovers hash code
5. receiver verifies received message hash
PGP Operation – Confidentiality
• Transport Mode
• to encrypt & optionally authenticate IP data
• can do traffic analysis but is efficient
• good for ESP host to host traffic
• Tunnel Mode
• encrypts entire IP packet
• add new header for next hop
• no routers on way can examine inner IP header
• good for VPNs, gateway to gateway security
Transport
and
Tunnel
Modes
Transport
and
Tunnel
Mode
Protocols
Security Associations