SlideShare une entreprise Scribd logo
1  sur  30
Network Security
CS:2
(Security at the Application Layer & Transport Layer )
By: Mr. Ganesh Ingle
Session-2 objective
CS-2 Revision Previous Session revision
CS-2 E-Mail System Architecture
CS-2 CS-2 PGP, MIME and MIME Headers
CS -2 Review of SSL protocol
CS-2 Secure Shell (SSH) Protocol for Secure Remote Login
SUMMARY
3
E-Mail System Architecture
A message transfer agent (MTA)
is a software application used
within an Internet message
handling system (MHS). It is
responsible for transferring and
routing an electronic mail message
from the sender's computer to the
recipient's computer.
4
PGP
There are two main schemes which are especially designed to provide
confidentiality and authentication for electronic mail systems. These
are:
1. PGP :Pretty Good Privacy
2. S/MIME :Secure/Multipurpose Internet Mail Extension
5
PGP
Pretty Good Privacy (PGP) :
PGP is an encryption program that provides cryptographic privacy and
authentication for data communication. PGP is used for signing, encrypting, and
decrypting texts, e-mails, files, directories, and whole disk partitions and to
increase the security of e-mail communications. Phil Zimmermann developed
PGP in 1991.
1. PGP fingerprint :A public key fingerprint is a shorter version of a public key. From a
fingerprint, someone can get the right corresponding public key. A fingerprint like
C3A6 5E46 7B54 77DF 3C4C 9790 4D22 B3CA 5B32 FF66 can be printed on a business
card
2. Compatibility: As PGP evolves, versions that support newer features and algorithms are
able to create encrypted messages that older PGP systems cannot decrypt, even with a
valid private key. Therefore, it is essential that partners in PGP communication
understand each other's capabilities or at least agree on PGP settings.
3. Digital signatures: PGP can be used to send messages confidentially. For this, PGP uses
hybrid cryptosystem by combining symmetric-key encryption and public-key
encryption. The message is encrypted using a symmetric encryption algorithm, which
requires a symmetric key generated by the sender. The symmetric key is used only
once and is also called a session key. The message and its session key are sent to the
receiver. The session key must be sent to the receiver so they know how to decrypt
the message, but to protect it during transmission it is encrypted with the receiver's
public key. Only the private key belonging to the receiver can decrypt the session key,
and use it to symmetrically decrypt the message.
6
PGP
3. Web of trust :PGP has always included provisions for distributing users' public
keys in an 'identity certification', which is also constructed cryptographically
so that any tampering (or accidental garble) is readily detectable. However,
merely making a certificate which is impossible to modify without being
detected is insufficient; this can prevent corruption only after the certificate
has been created, not before. Users must also ensure by some means that the
public key in a certificate actually does belong to the person or entity claimin
4. Certificates :In the (more recent) OpenPGP specification, trust signatures can
be used to support creation of certificate authorities. A trust signature
indicates both that the key belongs to its claimed owner and that the owner
of the key is trustworthy to sign other keys at one level below their own.
PGP offers 5 services:
1. Authentication
2. Confidentiality
3. Compression
4. E-mail compatibility
5. Segmentation
7
PGP
Encryption
Decryption
8
Multipurpose Internet Mail Extension(MIME)
1. Multipurpose Internet Mail Extension (MIME) is a standard which was proposed
by Bell Communications in 1991 in order to expand limited capabilities of
email.
2. MIME is a kind of add on or a supplementary protocol which allows non-ASCII
data to be sent through SMTP. It allows the users to exchange different kinds
of data files on the Internet: audio, video, images, application programs as
well.
Why do we need MIME?:Limitations of Simple Mail Transfer Protocol (SMTP):
1. SMTP has a very simple structure
2. It’s simplicity however comes with a price as it only send messages in NVT 7-
bit ASCII format.
3. It cannot be used for languages that do not support 7-bit ASCII format such as-
French, German, Russian, Chinese and Japanese, etc. so it cannot be
transmitted using SMTP. So, in order to make SMTP more broad we use MIME.
4. It cannot be used to send binary files or video or audio data.
9
MIME Header
MIME with SMTP and POP –
1. SMTP transfers the mail being a message transfer agent from senders side to
the mailbox of receiver side and stores it and MIME header is added to the
original header and provides additional information. while POP being the
message access agent organizes the mails from the mail server to the
receivers computer. POP allows user agent to connect with the message
transfer agent.
It is added to the original e-mail header section to define transformation. There
are five headers which we add to the original header:
1. MIME Version – Defines version of MIME protocol. It must have the parameter
Value 1.0, which indicates that message is formatted using MIME.
2. Content Type – Type of data used in the body of message. They are of
different types like text data (plain, HTML), audio content or video content.
3. Content Type/Transfer Encoding – It defines the method used for encoding the
message. Like 7-bit encoding, 8-bit encoding, etc.
4. Content Id – It is used for uniquely identifying the message.
5. Content description – It defines whether the body is actually image, video or
audio.
10
Secure Multipurpose Internet Mail Extension(S/MIME)
1. S/MIME uses public key certificates conforming to standard X.509 and signed
by a certification agency. In other respects, S/MIME is quite similar to PGP.
11
Secure Multipurpose Internet Mail Extension(S/MIME)
S/MIME incorporates three public-key algorithms:
1. DSS for digital signatures,
2. Diffie-Hellman for encrypting session keys, or RSA.
3. It uses SHA1 or MD5 for calculating digests, and
4. Three-key triple DES for message encryption. In an ideal situation,
Certification :
The crux of any secure email system is the distribution of public / private key pairs and
certification. S/MIME is very liberal about certification. There are public certifiers, such as
Verisign and VISA that distribute certificates at various levels of security. There are mail
products that include certification authorities to be used within an organization. These
products can be configured to accept these certificates.
Finally, S/MIME is most frequently used without a directory for storing certificates and
without a need for trusted certifiers. If Alice wants to sent an encrypted message to Bob,
he first has to send her a signed message. The signed message contains his certificate that
she accepts into her address book.
12
Web Security - Threats, Challenges and Solutions.
1. Scenario of Security Attacks
Let us consider a web application hosted on a server and no HTTPS ( HTTP over SSL ) enabled for the
application. And a end user e.g. Bob is surfing the Web and arrives at the shopping cart application, web
site, which is selling goods. For simplicity, I take a single form, let us consider a single form, shopping
site displays a form in which Bob is supposed to enter the type of item and quantity, his address, and his
payment card number. Bob enters this information, clicks on submit, and expects to receive the goods.
Once Bob submitted, form information flow from client to server via HTTP protocol, assuming no SSL
enable. What happened?
2. Security Attack Possibilities
There could be a chances of any of the possible security attacks. These are the common day-to-day
scenarios. The question is, how can we over come these scenarios. The different security Attack are:
1. Attack on Confidentiality:
2. Attack on Integrity:
3. Attack on Availability:
4. Attack on Authenticity:
Solution : Use of SSL
13
Introduction to SSL
1. SSL was first developed by Netscape in 1994 and became an internet
standard in 1996 ( RFC 2246 – TLS V1.0)
2. SSL is a cryptographic protocol to secure network across a
connection-oriented layer
3. Any program using TCP can be modified to use SSL connection
4. SSL connection uses a dedicated TCP/IP socket(e.g. port 443 for
https)
5. SSL is flexible in choice of which symmetric encryption, message
digest, and authentication can be used
6. SSL provides built in data compression
7. Authenticate the server to the client
8. Allow the client and server to select cryptographic algorithms, or
ciphers, that they both support
9. Optionally authenticate the client to the server
10.Use public key encryption techniques to generate shared secret
11.Establish an encrypted SSL connection
14
SSL
1. SSL is a secure protocol which runs above TCP/IP and allows users to
encrypt data and authenticate servers/vendors identity securely
Application
layer
Transport
layerTCP/IP layer
SMTPSFTPSHTTPS
SECURE SOCKET LAYER
15
SSL Protocol Stack
16
SSL Record Protocol Operation
17
SSL Record Format
18
SSL Handshake
SSL handshake verifies the server and allows client and server to agree on
an encryption set before any data is sent out.
19
SSL Handshake
20
SSL Handshake
21
SSL Session Key
22
SSL Not-recognizable Certificate
23
SSL 2.0 vs SSL 3.0
1. SSL 2.0 uses a weak MAC construction
2. In SSL 3.0, the Message Authentication Hash uses a full 128 bits of key
material for Export cipher, while SSL 2.0 uses only 40 bits
3. SSL 2.0 only allows a handshake at the beginning of the connection.
4. In SSL 3.0, the client can initiate a handshake routine any time
5. SSL 3.0 allows server and client to send chains of certificate
6. SSL 3.0 has a generalized key exchange protocol.It allows Diffie-
Hellman and Fortezza key exchange
7. SSL 3.0 allows for record compression and decompression
24
SSH
1. One of the primary goals of the ARPANET was remote access
2. Several different connections allowed
• rlogin
• rcp
• Rsh
3. SSH is a UNIX-based command interface and protocol for securely
accessing a remote computer
4. Suite of four utilities—slogin, ssh, sftp, and scp
5. Can protect against:
• IP spoofing
• DNS spoofing
• Intercepting information
6. Protect data sent over the network
7. Negotiate an encryption algorithm between sender and receiver
8. Use that algorithm and a session key to encrypt / decrypt data sent
9. Provide site authentication
10. Use public key / fingerprint to ensure identity of remote host.
11. Relies on locally generated keys, so no certifying authority is
generally available.
25
SSH
26
SSH
27
SSH Wire shark Trace
28
sFTP in Linux
29
SSH Tunneling
1. Use SSH to create an encrypted channel between remote host and
server
2. Use that encrypted channel to carry other traffic.
Thank you
Image Source
searchenterpriseai.techtarget.com
wikipedia

Contenu connexe

Tendances

E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)Vishal Kumar
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolVishal Kumar
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Tania Agni
 
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET Journal
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)Pankaj Bhambhani
 
Defeating spyware and forensics on the black berry draft
Defeating spyware and forensics on the black berry draftDefeating spyware and forensics on the black berry draft
Defeating spyware and forensics on the black berry draftidsecconf
 
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C ProgrammingPuneeth Puni
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the emailGianni Fiore
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPushkar Dutt
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
 

Tendances (20)

E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Email security & threads
Email security & threadsEmail security & threads
Email security & threads
 
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Ch15
Ch15Ch15
Ch15
 
network security
network securitynetwork security
network security
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
E mail security
E   mail securityE   mail security
E mail security
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)
 
Defeating spyware and forensics on the black berry draft
Defeating spyware and forensics on the black berry draftDefeating spyware and forensics on the black berry draft
Defeating spyware and forensics on the black berry draft
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 

Similaire à Network Security CS2

CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit vArthyR3
 
Email security
Email securityEmail security
Email securitykumarviji
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptjayaprasanna10
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified MailMatthew Chang
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.pptmaniklal123
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxprateekPallav2
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxhallettfaustina
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxdohertyjoetta
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxvannagoforth
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxLecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxsmile790243
 

Similaire à Network Security CS2 (20)

CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
S/MIME
S/MIMES/MIME
S/MIME
 
Email security
Email securityEmail security
Email security
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Pgp
PgpPgp
Pgp
 
E-mail Security.ppt
E-mail Security.pptE-mail Security.ppt
E-mail Security.ppt
 
Pgp
PgpPgp
Pgp
 
Lec 8.pptx.pdf
Lec 8.pptx.pdfLec 8.pptx.pdf
Lec 8.pptx.pdf
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Unit 4
Unit 4Unit 4
Unit 4
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxLecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
 

Plus de Infinity Tech Solutions

Database Management System-session 3-4-5
Database Management System-session 3-4-5Database Management System-session 3-4-5
Database Management System-session 3-4-5Infinity Tech Solutions
 
Main topic 3 problem solving and office automation
Main topic 3 problem solving and office automationMain topic 3 problem solving and office automation
Main topic 3 problem solving and office automationInfinity Tech Solutions
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languagesInfinity Tech Solutions
 
AI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorAI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorInfinity Tech Solutions
 
Programming with matlab session 5 looping
Programming with matlab session 5 loopingProgramming with matlab session 5 looping
Programming with matlab session 5 loopingInfinity Tech Solutions
 

Plus de Infinity Tech Solutions (20)

Database management system session 6
Database management system session 6Database management system session 6
Database management system session 6
 
Database management system session 5
Database management system session 5Database management system session 5
Database management system session 5
 
Database Management System-session 3-4-5
Database Management System-session 3-4-5Database Management System-session 3-4-5
Database Management System-session 3-4-5
 
Database Management System-session1-2
Database Management System-session1-2Database Management System-session1-2
Database Management System-session1-2
 
Main topic 3 problem solving and office automation
Main topic 3 problem solving and office automationMain topic 3 problem solving and office automation
Main topic 3 problem solving and office automation
 
Introduction to c programming
Introduction to c programmingIntroduction to c programming
Introduction to c programming
 
E commerce
E commerce E commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
Bds session 13 14
Bds session 13 14Bds session 13 14
Bds session 13 14
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languages
 
Basic hardware familiarization
Basic hardware familiarizationBasic hardware familiarization
Basic hardware familiarization
 
User defined functions in matlab
User defined functions in  matlabUser defined functions in  matlab
User defined functions in matlab
 
Programming with matlab session 6
Programming with matlab session 6Programming with matlab session 6
Programming with matlab session 6
 
Programming with matlab session 3 notes
Programming with matlab session 3 notesProgramming with matlab session 3 notes
Programming with matlab session 3 notes
 
AI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorAI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime Sector
 
Programming with matlab session 5 looping
Programming with matlab session 5 loopingProgramming with matlab session 5 looping
Programming with matlab session 5 looping
 
BIG DATA Session 7 8
BIG DATA Session 7 8BIG DATA Session 7 8
BIG DATA Session 7 8
 
BIG DATA Session 6
BIG DATA Session 6BIG DATA Session 6
BIG DATA Session 6
 
MS word
MS word MS word
MS word
 
DBMS CS 4-5
DBMS CS 4-5DBMS CS 4-5
DBMS CS 4-5
 

Dernier

SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsAlirezaBagherian3
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 

Dernier (20)

SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal Compressors
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 

Network Security CS2

  • 1. Network Security CS:2 (Security at the Application Layer & Transport Layer ) By: Mr. Ganesh Ingle
  • 2. Session-2 objective CS-2 Revision Previous Session revision CS-2 E-Mail System Architecture CS-2 CS-2 PGP, MIME and MIME Headers CS -2 Review of SSL protocol CS-2 Secure Shell (SSH) Protocol for Secure Remote Login SUMMARY
  • 3. 3 E-Mail System Architecture A message transfer agent (MTA) is a software application used within an Internet message handling system (MHS). It is responsible for transferring and routing an electronic mail message from the sender's computer to the recipient's computer.
  • 4. 4 PGP There are two main schemes which are especially designed to provide confidentiality and authentication for electronic mail systems. These are: 1. PGP :Pretty Good Privacy 2. S/MIME :Secure/Multipurpose Internet Mail Extension
  • 5. 5 PGP Pretty Good Privacy (PGP) : PGP is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991. 1. PGP fingerprint :A public key fingerprint is a shorter version of a public key. From a fingerprint, someone can get the right corresponding public key. A fingerprint like C3A6 5E46 7B54 77DF 3C4C 9790 4D22 B3CA 5B32 FF66 can be printed on a business card 2. Compatibility: As PGP evolves, versions that support newer features and algorithms are able to create encrypted messages that older PGP systems cannot decrypt, even with a valid private key. Therefore, it is essential that partners in PGP communication understand each other's capabilities or at least agree on PGP settings. 3. Digital signatures: PGP can be used to send messages confidentially. For this, PGP uses hybrid cryptosystem by combining symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key generated by the sender. The symmetric key is used only once and is also called a session key. The message and its session key are sent to the receiver. The session key must be sent to the receiver so they know how to decrypt the message, but to protect it during transmission it is encrypted with the receiver's public key. Only the private key belonging to the receiver can decrypt the session key, and use it to symmetrically decrypt the message.
  • 6. 6 PGP 3. Web of trust :PGP has always included provisions for distributing users' public keys in an 'identity certification', which is also constructed cryptographically so that any tampering (or accidental garble) is readily detectable. However, merely making a certificate which is impossible to modify without being detected is insufficient; this can prevent corruption only after the certificate has been created, not before. Users must also ensure by some means that the public key in a certificate actually does belong to the person or entity claimin 4. Certificates :In the (more recent) OpenPGP specification, trust signatures can be used to support creation of certificate authorities. A trust signature indicates both that the key belongs to its claimed owner and that the owner of the key is trustworthy to sign other keys at one level below their own. PGP offers 5 services: 1. Authentication 2. Confidentiality 3. Compression 4. E-mail compatibility 5. Segmentation
  • 8. 8 Multipurpose Internet Mail Extension(MIME) 1. Multipurpose Internet Mail Extension (MIME) is a standard which was proposed by Bell Communications in 1991 in order to expand limited capabilities of email. 2. MIME is a kind of add on or a supplementary protocol which allows non-ASCII data to be sent through SMTP. It allows the users to exchange different kinds of data files on the Internet: audio, video, images, application programs as well. Why do we need MIME?:Limitations of Simple Mail Transfer Protocol (SMTP): 1. SMTP has a very simple structure 2. It’s simplicity however comes with a price as it only send messages in NVT 7- bit ASCII format. 3. It cannot be used for languages that do not support 7-bit ASCII format such as- French, German, Russian, Chinese and Japanese, etc. so it cannot be transmitted using SMTP. So, in order to make SMTP more broad we use MIME. 4. It cannot be used to send binary files or video or audio data.
  • 9. 9 MIME Header MIME with SMTP and POP – 1. SMTP transfers the mail being a message transfer agent from senders side to the mailbox of receiver side and stores it and MIME header is added to the original header and provides additional information. while POP being the message access agent organizes the mails from the mail server to the receivers computer. POP allows user agent to connect with the message transfer agent. It is added to the original e-mail header section to define transformation. There are five headers which we add to the original header: 1. MIME Version – Defines version of MIME protocol. It must have the parameter Value 1.0, which indicates that message is formatted using MIME. 2. Content Type – Type of data used in the body of message. They are of different types like text data (plain, HTML), audio content or video content. 3. Content Type/Transfer Encoding – It defines the method used for encoding the message. Like 7-bit encoding, 8-bit encoding, etc. 4. Content Id – It is used for uniquely identifying the message. 5. Content description – It defines whether the body is actually image, video or audio.
  • 10. 10 Secure Multipurpose Internet Mail Extension(S/MIME) 1. S/MIME uses public key certificates conforming to standard X.509 and signed by a certification agency. In other respects, S/MIME is quite similar to PGP.
  • 11. 11 Secure Multipurpose Internet Mail Extension(S/MIME) S/MIME incorporates three public-key algorithms: 1. DSS for digital signatures, 2. Diffie-Hellman for encrypting session keys, or RSA. 3. It uses SHA1 or MD5 for calculating digests, and 4. Three-key triple DES for message encryption. In an ideal situation, Certification : The crux of any secure email system is the distribution of public / private key pairs and certification. S/MIME is very liberal about certification. There are public certifiers, such as Verisign and VISA that distribute certificates at various levels of security. There are mail products that include certification authorities to be used within an organization. These products can be configured to accept these certificates. Finally, S/MIME is most frequently used without a directory for storing certificates and without a need for trusted certifiers. If Alice wants to sent an encrypted message to Bob, he first has to send her a signed message. The signed message contains his certificate that she accepts into her address book.
  • 12. 12 Web Security - Threats, Challenges and Solutions. 1. Scenario of Security Attacks Let us consider a web application hosted on a server and no HTTPS ( HTTP over SSL ) enabled for the application. And a end user e.g. Bob is surfing the Web and arrives at the shopping cart application, web site, which is selling goods. For simplicity, I take a single form, let us consider a single form, shopping site displays a form in which Bob is supposed to enter the type of item and quantity, his address, and his payment card number. Bob enters this information, clicks on submit, and expects to receive the goods. Once Bob submitted, form information flow from client to server via HTTP protocol, assuming no SSL enable. What happened? 2. Security Attack Possibilities There could be a chances of any of the possible security attacks. These are the common day-to-day scenarios. The question is, how can we over come these scenarios. The different security Attack are: 1. Attack on Confidentiality: 2. Attack on Integrity: 3. Attack on Availability: 4. Attack on Authenticity: Solution : Use of SSL
  • 13. 13 Introduction to SSL 1. SSL was first developed by Netscape in 1994 and became an internet standard in 1996 ( RFC 2246 – TLS V1.0) 2. SSL is a cryptographic protocol to secure network across a connection-oriented layer 3. Any program using TCP can be modified to use SSL connection 4. SSL connection uses a dedicated TCP/IP socket(e.g. port 443 for https) 5. SSL is flexible in choice of which symmetric encryption, message digest, and authentication can be used 6. SSL provides built in data compression 7. Authenticate the server to the client 8. Allow the client and server to select cryptographic algorithms, or ciphers, that they both support 9. Optionally authenticate the client to the server 10.Use public key encryption techniques to generate shared secret 11.Establish an encrypted SSL connection
  • 14. 14 SSL 1. SSL is a secure protocol which runs above TCP/IP and allows users to encrypt data and authenticate servers/vendors identity securely Application layer Transport layerTCP/IP layer SMTPSFTPSHTTPS SECURE SOCKET LAYER
  • 18. 18 SSL Handshake SSL handshake verifies the server and allows client and server to agree on an encryption set before any data is sent out.
  • 23. 23 SSL 2.0 vs SSL 3.0 1. SSL 2.0 uses a weak MAC construction 2. In SSL 3.0, the Message Authentication Hash uses a full 128 bits of key material for Export cipher, while SSL 2.0 uses only 40 bits 3. SSL 2.0 only allows a handshake at the beginning of the connection. 4. In SSL 3.0, the client can initiate a handshake routine any time 5. SSL 3.0 allows server and client to send chains of certificate 6. SSL 3.0 has a generalized key exchange protocol.It allows Diffie- Hellman and Fortezza key exchange 7. SSL 3.0 allows for record compression and decompression
  • 24. 24 SSH 1. One of the primary goals of the ARPANET was remote access 2. Several different connections allowed • rlogin • rcp • Rsh 3. SSH is a UNIX-based command interface and protocol for securely accessing a remote computer 4. Suite of four utilities—slogin, ssh, sftp, and scp 5. Can protect against: • IP spoofing • DNS spoofing • Intercepting information 6. Protect data sent over the network 7. Negotiate an encryption algorithm between sender and receiver 8. Use that algorithm and a session key to encrypt / decrypt data sent 9. Provide site authentication 10. Use public key / fingerprint to ensure identity of remote host. 11. Relies on locally generated keys, so no certifying authority is generally available.
  • 29. 29 SSH Tunneling 1. Use SSH to create an encrypted channel between remote host and server 2. Use that encrypted channel to carry other traffic.