SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
ELECTRONIC MAIL SECURITY
BY
NAME: R.DEVIGA
CLASS: IIMSC.COMPUTER SCIENCE
BATCH: 2017-2019
INCHARGE STAFF: MS. MS. M. FLORENCE DAYANA
PRETTY GOOD PRIVACY
PGP is a remarkablephenomenon.providesa confidentialityandauthentication service thatcan be used
for electronic mail and file storageapplication.
• Notation
• Operational description
S/MIME
Securityenhancement to the MIME internetemailformat standard based on technology from RSAdata
security.
1.RFC 5322
2.Multipurproseinternetmailextensions
3.Overview theMIME
4.MIMEcontent type
• MIMEcontent type:
The bulkof the MIME specificationis concerned with the definitionof a varietyof contenttype
1.Texttype
2.Multiparttype
3. Multipart/mixedsubtype
S/MIME FUNCTIONALITY
S/MIME is very similar toPGP.both offerthe abilityto sign and encryptmessage.
FuntionsS/MIME
1.enveloped data
2.signed data
3. clear signed data
4. signed and envelopeddata
Cryptographicalgorithms
1.MUST
2.SHOULD
S/MIME MESSAGES
1. Generatefor preparing an envelopeddataMIME entityare algorithm
2. Encryptthe session key with the recipientpublicRSAkey.
3. Prepare a block known as recipientinformation
4. Encryptthe message contentwith the session key.
S/MIME CERTIFICATEPROCESSING
S/MIME uses public key certificatethatconfom to version 3 of x.509
1.Key generation
2.Registration
3.Certificatestorage and retrieval
Digital I’dcontains
Owners public key
Ownersname or alian
Expirationdataof the digitalI’d
• User suppliedinformation
Address
email address
Enhanced securityservices
1.singned receipt
2.security labels
3.secure mailing lists
DOMAINKEYS IDENTIFIEDMAIL
Domainkeys identifiedmailis a specificationfor cryptographicallysigningemailmessage
1.Internet mailarchitecture
Message user agent
Mail submission agent
Mail delivery agent
Message store
2.Email threats
RFC4686 describes the threatsbeingaddressed by DKIM in terms of the characteristics
3.DKIM strategy
DKIM is designed to providean emailauthenticationtechniquethat is transparentto the enduser.
4. DKIM functionalflow
Basic message processing is divided betweena signing administrativemanagementdomain and a
verifyingADMD.
Thankyou

Contenu connexe

Tendances (20)

Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
S/MIME
S/MIMES/MIME
S/MIME
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Pgp
PgpPgp
Pgp
 
E mail security
E   mail securityE   mail security
E mail security
 
Pgp
PgpPgp
Pgp
 
Email Security
Email SecurityEmail Security
Email Security
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Ch15
Ch15Ch15
Ch15
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
 
Mime
MimeMime
Mime
 
Email security
Email securityEmail security
Email security
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 
Network security
Network securityNetwork security
Network security
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 
Pgp
PgpPgp
Pgp
 
Network security cs8
Network security  cs8Network security  cs8
Network security cs8
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 

Similaire à Electronic mail security R.Deviga II-M.Sc.,Computer Science,Bonsecours college For women

R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceSrideviM4
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceDevigaR1
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptjayaprasanna10
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfDr.Florence Dayana
 
CRYPT.pptx
CRYPT.pptxCRYPT.pptx
CRYPT.pptxVMahesh5
 
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.pptmaniklal123
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit vArthyR3
 
Network and information security
Network and information securityNetwork and information security
Network and information securityrithika858339
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxprateekPallav2
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxikirkton
 

Similaire à Electronic mail security R.Deviga II-M.Sc.,Computer Science,Bonsecours college For women (20)

R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer science
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer science
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
 
Lec 8.pptx.pdf
Lec 8.pptx.pdfLec 8.pptx.pdf
Lec 8.pptx.pdf
 
S_MIME[1].ppt
S_MIME[1].pptS_MIME[1].ppt
S_MIME[1].ppt
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
CRYPT.pptx
CRYPT.pptxCRYPT.pptx
CRYPT.pptx
 
ch15 (1).ppt
ch15 (1).pptch15 (1).ppt
ch15 (1).ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
Email sec11
Email sec11Email sec11
Email sec11
 
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.ppt
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
G43053847
G43053847G43053847
G43053847
 
Network and information security
Network and information securityNetwork and information security
Network and information security
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
 
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docxB. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
B. Nouri-Moghaddam et al Int. Journal of Engineering Research .docx
 
Pgp
PgpPgp
Pgp
 

Dernier

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 

Dernier (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Electronic mail security R.Deviga II-M.Sc.,Computer Science,Bonsecours college For women

  • 1. ELECTRONIC MAIL SECURITY BY NAME: R.DEVIGA CLASS: IIMSC.COMPUTER SCIENCE BATCH: 2017-2019 INCHARGE STAFF: MS. MS. M. FLORENCE DAYANA
  • 2. PRETTY GOOD PRIVACY PGP is a remarkablephenomenon.providesa confidentialityandauthentication service thatcan be used for electronic mail and file storageapplication. • Notation • Operational description
  • 3.
  • 4. S/MIME Securityenhancement to the MIME internetemailformat standard based on technology from RSAdata security. 1.RFC 5322 2.Multipurproseinternetmailextensions 3.Overview theMIME 4.MIMEcontent type
  • 5. • MIMEcontent type: The bulkof the MIME specificationis concerned with the definitionof a varietyof contenttype 1.Texttype 2.Multiparttype 3. Multipart/mixedsubtype
  • 6.
  • 7. S/MIME FUNCTIONALITY S/MIME is very similar toPGP.both offerthe abilityto sign and encryptmessage. FuntionsS/MIME 1.enveloped data 2.signed data 3. clear signed data 4. signed and envelopeddata Cryptographicalgorithms 1.MUST 2.SHOULD
  • 8. S/MIME MESSAGES 1. Generatefor preparing an envelopeddataMIME entityare algorithm 2. Encryptthe session key with the recipientpublicRSAkey. 3. Prepare a block known as recipientinformation 4. Encryptthe message contentwith the session key.
  • 9.
  • 10. S/MIME CERTIFICATEPROCESSING S/MIME uses public key certificatethatconfom to version 3 of x.509 1.Key generation 2.Registration 3.Certificatestorage and retrieval Digital I’dcontains Owners public key Ownersname or alian Expirationdataof the digitalI’d
  • 11. • User suppliedinformation Address email address Enhanced securityservices 1.singned receipt 2.security labels 3.secure mailing lists
  • 12.
  • 13. DOMAINKEYS IDENTIFIEDMAIL Domainkeys identifiedmailis a specificationfor cryptographicallysigningemailmessage 1.Internet mailarchitecture Message user agent Mail submission agent Mail delivery agent Message store 2.Email threats RFC4686 describes the threatsbeingaddressed by DKIM in terms of the characteristics
  • 14. 3.DKIM strategy DKIM is designed to providean emailauthenticationtechniquethat is transparentto the enduser. 4. DKIM functionalflow Basic message processing is divided betweena signing administrativemanagementdomain and a verifyingADMD.
  • 15.