Electronic Mail Security
#1

Electronic Mail Security
Email Security
email is one of the most widely used and regarded network services
currently message contents are not secure
may be inspected either in transit
or by suitably privileged users on destination system
Email Security Enhancements
confidentiality
protection from disclosure
authentication
of sender of message
message integrity
protection from modification
non-repudiation of origin
protection from denial by sender
Pretty Good Privacy (PGP)
Open source, freely available software package for secure e-mail
de facto standard for secure email
developed by Phil Zimmermann
selected best available crypto algs to use
Runs on a variety of platforms like Unix, PC, Macintosh and other systems
originally free (now also have commercial versions available)
PGP Operation – Authentication
sender creates message
Generates a digital signature for the message
use SHA-1 to generate 160-bit hash of message
signed hash with RSA using sender's private key, and is attached to message
receiver uses RSA with sender's public key to decrypt and recover hash code
receiver verifies received message using hash of it and compares with decrypted hash code
PGP Operation – Confidentiality
sender generates a message and encrypts it.
Generates a128-bit random number as session key
Encrypts the message using CAST-128 / IDEA / 3DES in CBC mode with session key
session key encrypted using RSA with recipient's public key and attached to the msg
receiver uses RSA with private key to decrypt and recover session key
session key is used to decrypt message
PGP Operation – Confidentiality & Authentication
can use both services on the same message
create signature & attach it to the message
encrypt both message & signature
attach RSA/ElGamal encrypted session key
This sequence is preferred because
--one can store the plaintext message/file and its signature
--no need to decrypt the message/file again and again
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: the electronic mail salient features, electronic school by mail, electronic mail security, electronic mail box, e mail security check, https mail maklubes inith security system, e mail security ppt for seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,134 06-11-2014, 09:23 PM
Last Post: seminar report asees
  GSM Based Home Security System details seminar paper 1 1,970 14-11-2012, 12:29 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,372 22-10-2012, 02:29 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,709 08-10-2012, 03:08 PM
Last Post: seminar details
  FINGER PRINT BASED ELECTRONIC VOTING MACHINE project uploader 1 1,548 04-10-2012, 12:51 PM
Last Post: seminar details
  Analysis of an Electronic Voting System project report helper 1 1,326 03-10-2012, 03:39 PM
Last Post: seminar details
  Computer Security Pretty Good Privacy seminar details 0 990 09-06-2012, 04:22 PM
Last Post: seminar details
  Electronic Industries Association (EIA) seminar details 0 807 09-06-2012, 03:45 PM
Last Post: seminar details
  An Iris Recognition System to Enhance e-security seminar details 0 900 08-06-2012, 05:23 PM
Last Post: seminar details
  Wireless Telemetry for Electronic Pill Technology project uploader 0 919 08-06-2012, 12:44 PM
Last Post: project uploader

Forum Jump: