SlideShare une entreprise Scribd logo
1  sur  65
CRYPTOGRAPHY AND NETWORK
SECURITY- E-Mail Security
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology and Science,
karimnagar
SYLLABUS
.
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview,
IP Security architecture, Authentication Header, Encapsulating security
payload, Combining security associations, Internet Key Exchange Case Studies
on Cryptography and security: Secure Multiparty Calculation, Virtual Elections,
Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting
Vulnerability.
:
Topic Name : E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP
Security architecture
Topic : Introduction to E-Mail Security. S/MIME IP Security
Aim & Objective : Illustrate E-mail Security and IP security
Application With Example :E-Mail security Applications
Limitations If Any:
Reference Links :
Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st
Edition.
Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
https://www.slideshare.net/ayyakathir/unit-5-76965230?qid=1f7b88c5-e066-4449-9e89-
602464a7e397&v=&b=&from_search=5
https://www.tutorialspoint.com/internet_technologies/e_mail_security.htm
https://www.minigranth.com
https://www.igi-global.com ›
•Video Link details
•https://www.youtube.com/results?search_query=email+security+in+cryptography+and+network+s
ecurity
https://www.youtube.com/watch?v=lcBpC1RsWsw
Universities & Important Questions :
•What is transport mode and tunnel mode in IP sec?
•Give a brief note on Virtual Elections.
•Briefly explain the scenario of IP security and its Policy
•Explain IP security architecture and also explain basic combinations
of security associations with a neat diagram.
•List and explain the PGP services and explain how PGP message
generation is done with a neat diagram
247
E-MAIL, IP & WEB SECURITY
• E-mail Security: Security Services for E-mail-attacks possible through
E-mail – establishing keys privacy-authentication of the source-
Message Integrity-Non-repudiation-Pretty Good Privacy-S/MIME.
IPSecurity: Overview of IPSec – IP and IPv6-Authentication Header-
Encapsulation Security
• Payload (ESP)-InternetKeyExchange (Phasesof like
ISAKMP/IKE Encoding).
•WebSecurity:SSL/TLS basic Protocol-computing the keys- client
authentication-PKI as deployed by SSLAttacks fixed in v3- Exportability-
Encoding-Secure Electronic Transaction (SET).
Email Security
248
• email is one of the most widely used and
regarded network services
Example
From : abc @gmail.com To :
cdf@yahoo.com Sub: Hi
How are you?
Single mail to group of recipients
• Remote Exploder
mail mail
mail
• Local Exploder mail
Req list
reterive list
mail mail mail
Sender
Recipient 2
Recipient 1
Distribution
site
Recipient 3
Sender
Distribution list
maintenance
Recipient 3
Recipient 1 Recipient 2
250
Email Security Services
from
1. Confidentiality- protection
disclosure
2. Authentication of the source
3. message integrity -protection from
modification
4. non-repudiation of origin -protection
from denial by sender
251
5. Proof of submission
6. Proof of delivery
7. Message flow confidentiality-intruder unable to know
whether msg sent/not between users
8. Anonymity- Hiding the sender details
9. Containment- ability to maintain n/w security
10. Audit
11. Self Destruct
12. Message Sequence
252
Pretty Good Privacy (PGP)
• widely used de facto secure email
• developed by Phil Zimmermann
• selected best available crypto algs to use
integrated into a single program
• available on Unix, PC, Macintosh and Amiga
systems
• originally free, now have commercial versions available also
253
PGP Services
1. Authentication
2. Confidentiality
3. Compression
4. 4.E-mail Compatibility 5.Segmentation &
Reassembly
255
PGP Operation – Authentication
1. sender creates a message
2. SHA-1 used to generate 160-bit hash code of message
3. hash code is encrypted with RSA using the sender's private
key, and result is attached to message
4. receiver uses RSA or DSS with sender's public key to decrypt
and recover hash code
5. receiver generates new hash code for message and compares
with decrypted hash code, if match, message is accepted as
authentic
256
PGP Operation – Confidentiality
•sender generates message and random 128-bit number to be used as session key
for this message only
•message is encrypted, using CAST-128 / IDEA/3DES with session key
•session key is encrypted using RSA with recipient's
public key, then attached to message
•receiver uses RSA with its private key to decrypt and recover session key
•session key is used to decrypt message
257
PGP Operation – Confidentiality &
Authentication
• uses both services on same message
–create signature & attach to message
–encrypt both message & signature
–attach RSA encrypted session key
258
PGP Operation – Compression
• by default PGP compresses message
after signing but before encrypting
– One can store uncompressed message &
signature for later verification
– & because compression is non deterministic
• uses ZIP compression algorithm
259
PGP Operation – Email
Compatibility
• when using PGP will have binary data to
send (encrypted message etc)
• however email was designed only for text
• hence PGP must encode raw binary data
into printable ASCII characters
• uses radix-64 algorithm
– maps 3 bytes to 4 printable chars(ASCII)
– also appends a CRC
• PGP also segments messages if too big
260
PGP Operation
261
Segmentation & Reassembly
• PGP subdivides the
original message(if
length >50000
octects) which is too
large to small
enough to send via
mail.
• On the receiving
end, PGP
reassemble entire
original block
262
PGP Session Keys
• need a session key for each message
– of varying sizes: 56-bit DES, 128-bit CAST or IDEA, 168-bit
Triple-DES
• generated using ANSI X12.17 mode
• uses random inputs taken from previous uses and from
keystroke timing of user
PGP Public & Private Keys
• since many public/private keys may be in use, need
to identify which is actually used to encrypt session
key in a message
– could send full public-key with every message
– but this is inefficient
• rather use a key identifier based on key
– is least significant 64-bits of the key
– will very likely be unique
• also use key ID in signatures
264
PGP Key Rings
• each PGP user has a pair of keyrings:
– public-key ring contains all the public-keys of other PGP users
known to this user, indexed by key ID
– private-key ring contains the public/private key pair(s) for this
user, indexed by key ID & encrypted keyed from a hashed
passphrase
PGP Key Management
• rather than relying on certificate authorities
• in PGP every user is own CA
– can sign keys for users they know directly
• forms a “web of trust”
– trust keys have signed
– can trust keys others have signed if have a chain of
signatures to them
• key ring includes trust indicators
• users can also revoke their keys
S/MIME (Secure/Multipurpose Internet Mail Extensions)
• security enhancement to MIME email
– original Internet RFC822 email was text only
– MIME provided support for varying content types and multi-part
messages
– with encoding of binary data to textual form
– S/MIME added security enhancements
• have S/MIME support in various modern mail agents: MS
Outlook, Netscape etc
S/MIME Functions
• enveloped data
– encrypted content and associated keys
• signed data
– encoded message + signed digest
• clear-signed data
– cleartext message + encoded signed
digest
• signed & enveloped data
– nesting of signed & encrypted entities
S/MIME Cryptographic Algorithms
• hash functions: SHA-1 & MD5
• digital signatures: DSS & RSA
• session key encryption: ElGamal & RSA
• message encryption: Triple-DES, RC2/40
and others
• have a procedure to decide which
algorithms to use
S/MIME Certificate Processing
• S/MIME uses X.509 v3 certificates
• managed using a hybrid of a strict X.509 CA hierarchy & PGP’s
web of trust
• each client has a list of trusted CA’s certs
• and own public/private key pairs & certs
• certificates must be signed by trusted CA’s
IP Security
• have a range of application specific security
mechanisms
– eg. S/MIME, PGP,Kerberos, SSL/HTTPS
• however there are security concerns that cut
across protocol layers
• would like security implemented by the
network for all applications
• general IP Security mechanisms
• provides
– authentication
– confidentiality
– key management
• applicable to use over LANs, across
public & private WANs, &
for the Internet
• need identified in 1994 report
– need authentication, encryption in IPv4 &
IPv6
IP Security Uses
Benefits of IPSec
• in a firewall/router provides strong security to
all traffic crossing the perimeter
• in a firewall/router is resistant to bypass
• is below transport layer, hence transparent to
applications
• can be transparent to end users
• can provide security for individual users
• secures routing architecture
IPSecurity Specification
The IPSec specification has become quite complex. key management. The totality of the IPsec
specification is scattered across dozens of RFCs and draft IETF documents, making this the
most complex and difficult to grasp of all IETF specifications. The best way to keep track of
and get a handle on this body of work is to consult the latest version of the IPsec
document roadmap. The documents can be categorized into the following groups:
• Architecture: Covers the general concepts, security requirements, definitions, and
mechanisms defining IPsec technology, RFC 4301, Security Architecture for the Internet
Protocol.
• Authentication Header (AH): AH is an extension header for message authentication, now
deprecated.
• Encapsulating Security Payload (ESP): ESP consists of an encapsulating header and trailer
used
to provide encryption or combined encryption/authentication. .
• Internet Key Exchange (IKE): a collection of documents describing the key management
schemes for use with IPsec
• Cryptographic algorithms: a large set of documents that define and describe cryptographic
algorithms for encryption, message authentication, pseudorandom functions (PRFs), and
cryptographic key exchange.
• Other: There are a variety of other IPsec-related RFCs, including those dealing with security
policy and management information base (MIB) content.
IPSec Services
• Access control
• Connectionless integrity
• Data origin authentication
• Rejection of replayed packets
– a form of partial sequence integrity
• Confidentiality (encryption)
• Limited traffic flow confidentiality
Transport and Tunnel Modes
• Transport Mode
– to encrypt & optionally authenticate IP data
– can do traffic analysis but is efficient
– good for ESP host to host traffic
• Tunnel Mode
– encrypts entire IP packet
– add new header for next hop
– no routers on way can examine inner IP header
– good for VPNs, gateway to gateway security
Transport and
Tunnel Modes
Transport and
Tunnel Mode
Protocols
Security Associations
• a one-way relationship between sender &
receiver that affords security for traffic flow
• defined by 3 parameters:
– Security Parameters Index (SPI)
– IP Destination Address
– Security Protocol Identifier
• has a number of other parameters
– seq no, AH & EH info, lifetime etc
• have a database of Security Associations
Security Policy Database
• relates IP traffic to specific SAs
– match subset of IP traffic to relevant SA
– use selectors to filter outgoing traffic to map
– based on: local & remote IP addresses, next
layer protocol, name, local & remote ports
Transport Mode SA Tunnel Mode SA
AH Authenticates IP payload
and selected portions of IP
header and IPv6 extension
headers
Authenticates entire inner
IP packet plus selected
portions of outer IP header
ESP Encrypts IP payload and any
IPv6 extesion header
Encrypts inner IPpacket
ESP with
authentication
Encrypts IP payload and any
IPv6 extesion header.
Authenticates IPpayload
but no IP header
Encrypts inner IPpacket.
Authenticates innerIP
packet.
Before applying AH
Transport Mode (AH Authentication
Tunnel Mode (AH
Authentication
Encapsulating Security Payload
Encryption & Authentication
Algorithms & Padding
• ESP can encrypt payload data, padding, pad
length, and next header fields
– if needed have IV at start of payload data
• ESP can have optional ICV for integrity
– is computed after encryption is performed
• ESP uses padding
– to expand plaintext to required length
– to align pad length and next header fields
– to provide partial traffic flow confidentiality
Anti-Replay Service
• replay is when attacker resends a
copy of an
authenticated packet
• use sequence number to thwart this
attack
• sender initializes sequence number to 0
when a new SA is established
– increment for each packet
– must not exceed limit of 232 – 1
• receiver then accepts packets with seq
no within window of (N –W+1)
IPSec Key Management
• handles key generation & distribution
• typically need 2 pairs of keys
– 2 per direction for AH & ESP
• manual key management
– Sys-admin manually configures every system
• automated key management
– automated system for on demand creation of keys for
SA’s in large systems
– has Oakley & ISAKMP elements
• a key exchange protocol
• based on Diffie-Hellman key exchange
• adds features to address weaknesses
– no info on parties, man-in-middle attack, cost
– so adds cookies, groups (global params), nonces,
DH key exchange with authentication
• can use arithmetic in prime fields or elliptic
curve fields
ISAKMP
•Internet Security Association and Key Management
Protocol
•provides framework for key management defines procedures and
packet formats to establish, negotiate, modify, & delete SAs
•independent of key exchange protocol, encryption alg, &
authentication method
•IKEv2 no longer uses Oakley& ISAKMP terms,
but basic functionality is same
CASE STUDIES ON CRYPTOGRAPY
AND SECURITY
Secure Inter-branch Payment Transactions
 Points for classroom discussions
1.What is the technology to achieve non-repudiation? How is this guaranteed?
2.How is the problem of key distribution resolved in PKI?
3.Why are cryptographic toolkits required?
4.How can smart cards be used in cryptography?
General Bank Of India (GBI) has implemented an Electronic Payment System called as
EPS in about 1200 branches across the country. This system transfers payment
instructions between two computerized branches of GBI. A central server is maintained
at the EPS office located in Mumbai. The branch offices connect to the Local VSAT of a
private network by using dial-up connection. The local VSAT has a connectivity
established with the EPS office. GBI utilizes its proprietary messaging service called as
GBI-Transfer to exchange payment instructions. Currently, EPS has minimal data
security. As the system operates in a closed network, the current security infrastructure
may suffice the need. The data moving across the network is in encrypted format.
• Current EPS Architecture EPS is used to transmit payment details from
the payer branch to the payee branch via the central server in Mumbai
which is also described stepby- step.
• A data-entry person in the Payer Branch enters transaction details
through the EPS interface.
• A Bank Officer checks the validity of the transaction through the EPS
interface.
• After validating the transaction, the Bank Officer authorizes the
transaction. Authorized transaction is stored in a local Payment Master
(PM) database.
• Once the transaction is stored in PM, a copy of the same is encrypted and
stored in a file. This transaction file is stored in OUT directory. The GBI-
Transfer application looks for any pending transactions (i.e. for the
presence of any files in the OUT directory) by a polling mechanism and if
it finds such
• transactions, it sends all these files one-by-one to the EPS central office located in Mumbai
by dialing the local VSAT.
 The local VSAT gets connectivity to the EPS central office and the transaction is transferred
and
• stored in the IN directory at the EPS central office.
 The interface program at the EPS central office collects the file pending in the IN directory
and sends it to the PM application at that office.
 In order to send the Credit Request to PM, the transaction headers are changed. The
transaction with changed headers in encrypted format is then placed in OUT directory of
the EPS central office.
 The GBI-Transfer application at the EPS central office collects the transactions pending in
the OUT directory and sends them to the Payee Bank through the VSAT.
 The transaction is transferred and stored in the IN directory of the Payee Branch.
 The interface program at the Payee Branch collects the transaction and posts it in PM.
 PM marks the credit entry and returns back an acknowledgement of the same. The
acknowledgement is placed in OUT directory of the Payee Branch.
 The acknowledgement is picked by GBI-Transfer at the Payee Branch and sent to the EPS
central office through the VSAT.
 The EPS central office receives the credit acknowledgement and forwards it to Payer
Branch.
 The Payer Branch receives the credit acknowledgement receipt. This completes the transaction.
• Requirements to Enhance EPS As GBI is in the process of
complete automation and setting up connectivity over the Internet or
a private network, they need to ensure stringent security measures,
which demand the usage of a Public Key Infrastructure (PKI)
framework.
• As a part of implementing security, GBI wants the following
aspects to be ensured:
•Non-repudiation (Digital Signatures)
•Encryption – 128-bit (Upgrade to the current 56-bit encryption)
•Smart card support for storing sensitive data & on-card digital
signing
•Closed loop Public Key Infrastructure :
• Proposed Solution Since providing
cryptographic functionalities require the usage
of a
• cryptographic toolkit, it is assumed that GBI
will implement an appropriate Certification
Authority (CA) infrastructure and a PKI
infrastructure offering.
• The transaction will be digitally signed and encrypted/decrypted at the
Payer and Payee branches, as well as at the EPS central office. The
signing operation can be performed on the system or on external
hardware like a smart card. On the server side, a provision of
automated signing without any manual intervention will be provided.
• The transaction flow described earlier would now be split into two
legs:
• The Payer Leg (Payer Branch to the EPS central office)
• The Payee Leg (EPS central office to the Payee Branch)
Cross Site Scripting Vulnerability (CSSV)
Points for classroom discussions
• What is the purpose of scripting technologies on the Internet?
• What can prevent CSSV attacks?
• What sort of testing can the creators of a Web site perform in order to guard against
possible CSSV attacks?
• Cross Site Scripting Vulnerability (CSSV) is a relatively new form of attacks that
exploits inadequate validations on the server-side. The term Cross Server Scripting
Vulnerability (CSSV) is actually not completely correct. However, this term was coined
when the problem was not completely understood and has stuck ever since. Cross-site
scripting happens when malicious tags and/or scripts attack a Web browser via another site’s
dynamically generated Web pages. The attacker’s target is not a Website, but rather its users
(i.e. clients or browsers).
• The idea of CSSV is quite simple to understand and is based on exploiting the
scripting
• technologies, such as JavaScript, VBScript or JScript. Let us understand how this works.
Consider the following Web page containing a form as shown in Fig. 10.9, in which the user
is expected to enter her postal address. Suppose that the URL of the site sending this page is
www.test.com and when the user submits this form, it would be processed by a server-side
program called as address.asp.
• We would typically expect the user to enter the house number,
street name, city, postal code and country, etc. However, imagine
that the user enters the following weird string, instead:
• <SCRIPT>Hello World</SCRIPT>
• As a result, the URL submitted would be something like
www.test.com/address.asp?address=
• <SCRIPT>Hello World </SCRIPT>.
• Now suppose that the server-side program address.asp does not
validate the input sent by the user and simply sends the value of
the field address to the next Web page. What would this translate
to? It would mean that the next Web page would receive the value
of address as
• <SCRIPT>Hello World</ SCRIPT>.
• As we know, this would most likely treat the value of the address
field as a script, which would be executed as if it is written in a
scripting language, such as JavaScript etc on the Web browser.
Therefore, the user would get to see Hello World.
Virtual Elections
• Points for classroom discussions
• Is it technically possible to have elections on the Internet?
How? What sort of infrastructure would be needed for
this?
• What would be the main concerns in such a virtual
election?
• What would be the use of digital signatures and
encryption in virtual elections?
• Another situation where cryptography is useful is virtual
elections. Computerized voting would become quite
common in the next few decades. As such, it is important
that the protocol for ritual
They must come
together; combine their
respective secrets (S and
R) to generate the
original secret (P).
Bob gets
only R
Alice
gets only
S
Combine
d secret
R
XOR
Random
Number
≈
Origina
l secret
P
S
Fig:Secret splitting
• elections should protect individual privacy and
should also disallow cheating. Consider the
following protocol in order that voters can
send their votes electronically to the Election
authority (EA).
• Each voter casts the vote and encrypts it with the public key of the EA.
• Each voter sends the encrypted vote to the EA.
• The EA decrypts all the votes to retrieve the original vote, tabulates all the
votes and announces the result of the election.
• Is this protocol secure and does it provide comfort both to the voters as well
as to the EA? Not at all!
• There are following problems in this scheme:
• The EA does not know whether the authorized voters have voted or it has
received fake (bogus) votes.
• Secondly, there is no mechanism to prevent duplicate voting.
• What is the advantage of this protocol? Clearly, no one would be able to
change another voter’s vote, because it is first encrypted with the EA’s
public key and is then sent to the EA.
• However, if we observe this scheme carefully, an attacker need not change
someone’s vote at all. The attacker can simply send duplicate votes!
• How can we improve upon this protocol to make it more robust? Let us
rewrite it, as follows:
• Each voter casts the vote and signs it with her private key.
• Each voter then encrypts the signed vote with the public key
of the EA.
• Each voter sends the vote to the EA.
• The EA decrypts the voter with its private key and verifies
the signature of the voter with the help of the voter’s
public key.
• The EA then tabulates all the votes and announces the result
of the election. This protocol would now ensure that duplicate
voting is disallowed. Because the voter has signed the vote (with
her private key) in Step 1, this can be checked. Similarly, no one
can change another voter’s vote. This is because a vote is
digitally signed and any changes to it will be detected and
exposed in the signature verification process.
• Although this protocol is a lot better, the trouble
with this scheme is that the EA would come to
• know who voted for whom, leading to privacy
concerns. We shall leave it to the reader to figure
out how this problem can be solved.
Thank you

Contenu connexe

Tendances

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

Tendances (20)

x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
 
IP Security
IP SecurityIP Security
IP Security
 
Pgp
PgpPgp
Pgp
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Rc4
Rc4Rc4
Rc4
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
S/MIME
S/MIMES/MIME
S/MIME
 

Similaire à CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security

computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
jayaprasanna10
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
limsh
 

Similaire à CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security (20)

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
 
ch15 (1).ppt
ch15 (1).pptch15 (1).ppt
ch15 (1).ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
 
Email sec11
Email sec11Email sec11
Email sec11
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Ch15
Ch15Ch15
Ch15
 
ch22.ppt
ch22.pptch22.ppt
ch22.ppt
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Email security
Email securityEmail security
Email security
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
 

Plus de Jyothishmathi Institute of Technology and Science Karimnagar

Plus de Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Computer Forensics Working with Windows and DOS Systems
Computer Forensics Working with Windows and DOS SystemsComputer Forensics Working with Windows and DOS Systems
Computer Forensics Working with Windows and DOS Systems
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security

  • 1. CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. SYLLABUS . E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
  • 3. : Topic Name : E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture Topic : Introduction to E-Mail Security. S/MIME IP Security Aim & Objective : Illustrate E-mail Security and IP security Application With Example :E-Mail security Applications Limitations If Any: Reference Links : Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition https://www.slideshare.net/ayyakathir/unit-5-76965230?qid=1f7b88c5-e066-4449-9e89- 602464a7e397&v=&b=&from_search=5 https://www.tutorialspoint.com/internet_technologies/e_mail_security.htm https://www.minigranth.com https://www.igi-global.com › •Video Link details •https://www.youtube.com/results?search_query=email+security+in+cryptography+and+network+s ecurity https://www.youtube.com/watch?v=lcBpC1RsWsw
  • 4. Universities & Important Questions : •What is transport mode and tunnel mode in IP sec? •Give a brief note on Virtual Elections. •Briefly explain the scenario of IP security and its Policy •Explain IP security architecture and also explain basic combinations of security associations with a neat diagram. •List and explain the PGP services and explain how PGP message generation is done with a neat diagram
  • 5. 247 E-MAIL, IP & WEB SECURITY • E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing keys privacy-authentication of the source- Message Integrity-Non-repudiation-Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec – IP and IPv6-Authentication Header- Encapsulation Security • Payload (ESP)-InternetKeyExchange (Phasesof like ISAKMP/IKE Encoding). •WebSecurity:SSL/TLS basic Protocol-computing the keys- client authentication-PKI as deployed by SSLAttacks fixed in v3- Exportability- Encoding-Secure Electronic Transaction (SET).
  • 6. Email Security 248 • email is one of the most widely used and regarded network services Example From : abc @gmail.com To : cdf@yahoo.com Sub: Hi How are you?
  • 7. Single mail to group of recipients • Remote Exploder mail mail mail • Local Exploder mail Req list reterive list mail mail mail Sender Recipient 2 Recipient 1 Distribution site Recipient 3 Sender Distribution list maintenance Recipient 3 Recipient 1 Recipient 2
  • 8. 250 Email Security Services from 1. Confidentiality- protection disclosure 2. Authentication of the source 3. message integrity -protection from modification 4. non-repudiation of origin -protection from denial by sender
  • 9. 251 5. Proof of submission 6. Proof of delivery 7. Message flow confidentiality-intruder unable to know whether msg sent/not between users 8. Anonymity- Hiding the sender details 9. Containment- ability to maintain n/w security 10. Audit 11. Self Destruct 12. Message Sequence
  • 10. 252 Pretty Good Privacy (PGP) • widely used de facto secure email • developed by Phil Zimmermann • selected best available crypto algs to use integrated into a single program • available on Unix, PC, Macintosh and Amiga systems • originally free, now have commercial versions available also
  • 11. 253 PGP Services 1. Authentication 2. Confidentiality 3. Compression 4. 4.E-mail Compatibility 5.Segmentation & Reassembly
  • 12.
  • 13. 255 PGP Operation – Authentication 1. sender creates a message 2. SHA-1 used to generate 160-bit hash code of message 3. hash code is encrypted with RSA using the sender's private key, and result is attached to message 4. receiver uses RSA or DSS with sender's public key to decrypt and recover hash code 5. receiver generates new hash code for message and compares with decrypted hash code, if match, message is accepted as authentic
  • 14. 256 PGP Operation – Confidentiality •sender generates message and random 128-bit number to be used as session key for this message only •message is encrypted, using CAST-128 / IDEA/3DES with session key •session key is encrypted using RSA with recipient's public key, then attached to message •receiver uses RSA with its private key to decrypt and recover session key •session key is used to decrypt message
  • 15. 257 PGP Operation – Confidentiality & Authentication • uses both services on same message –create signature & attach to message –encrypt both message & signature –attach RSA encrypted session key
  • 16. 258 PGP Operation – Compression • by default PGP compresses message after signing but before encrypting – One can store uncompressed message & signature for later verification – & because compression is non deterministic • uses ZIP compression algorithm
  • 17. 259 PGP Operation – Email Compatibility • when using PGP will have binary data to send (encrypted message etc) • however email was designed only for text • hence PGP must encode raw binary data into printable ASCII characters • uses radix-64 algorithm – maps 3 bytes to 4 printable chars(ASCII) – also appends a CRC • PGP also segments messages if too big
  • 19. 261 Segmentation & Reassembly • PGP subdivides the original message(if length >50000 octects) which is too large to small enough to send via mail. • On the receiving end, PGP reassemble entire original block
  • 20. 262 PGP Session Keys • need a session key for each message – of varying sizes: 56-bit DES, 128-bit CAST or IDEA, 168-bit Triple-DES • generated using ANSI X12.17 mode • uses random inputs taken from previous uses and from keystroke timing of user
  • 21. PGP Public & Private Keys • since many public/private keys may be in use, need to identify which is actually used to encrypt session key in a message – could send full public-key with every message – but this is inefficient • rather use a key identifier based on key – is least significant 64-bits of the key – will very likely be unique • also use key ID in signatures
  • 22. 264 PGP Key Rings • each PGP user has a pair of keyrings: – public-key ring contains all the public-keys of other PGP users known to this user, indexed by key ID – private-key ring contains the public/private key pair(s) for this user, indexed by key ID & encrypted keyed from a hashed passphrase
  • 23.
  • 24. PGP Key Management • rather than relying on certificate authorities • in PGP every user is own CA – can sign keys for users they know directly • forms a “web of trust” – trust keys have signed – can trust keys others have signed if have a chain of signatures to them • key ring includes trust indicators • users can also revoke their keys
  • 25. S/MIME (Secure/Multipurpose Internet Mail Extensions) • security enhancement to MIME email – original Internet RFC822 email was text only – MIME provided support for varying content types and multi-part messages – with encoding of binary data to textual form – S/MIME added security enhancements • have S/MIME support in various modern mail agents: MS Outlook, Netscape etc
  • 26. S/MIME Functions • enveloped data – encrypted content and associated keys • signed data – encoded message + signed digest • clear-signed data – cleartext message + encoded signed digest • signed & enveloped data – nesting of signed & encrypted entities
  • 27. S/MIME Cryptographic Algorithms • hash functions: SHA-1 & MD5 • digital signatures: DSS & RSA • session key encryption: ElGamal & RSA • message encryption: Triple-DES, RC2/40 and others • have a procedure to decide which algorithms to use
  • 28. S/MIME Certificate Processing • S/MIME uses X.509 v3 certificates • managed using a hybrid of a strict X.509 CA hierarchy & PGP’s web of trust • each client has a list of trusted CA’s certs • and own public/private key pairs & certs • certificates must be signed by trusted CA’s
  • 29. IP Security • have a range of application specific security mechanisms – eg. S/MIME, PGP,Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • would like security implemented by the network for all applications
  • 30. • general IP Security mechanisms • provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet • need identified in 1994 report – need authentication, encryption in IPv4 & IPv6
  • 32. Benefits of IPSec • in a firewall/router provides strong security to all traffic crossing the perimeter • in a firewall/router is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users • can provide security for individual users • secures routing architecture
  • 33. IPSecurity Specification The IPSec specification has become quite complex. key management. The totality of the IPsec specification is scattered across dozens of RFCs and draft IETF documents, making this the most complex and difficult to grasp of all IETF specifications. The best way to keep track of and get a handle on this body of work is to consult the latest version of the IPsec document roadmap. The documents can be categorized into the following groups: • Architecture: Covers the general concepts, security requirements, definitions, and mechanisms defining IPsec technology, RFC 4301, Security Architecture for the Internet Protocol. • Authentication Header (AH): AH is an extension header for message authentication, now deprecated. • Encapsulating Security Payload (ESP): ESP consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication. . • Internet Key Exchange (IKE): a collection of documents describing the key management schemes for use with IPsec • Cryptographic algorithms: a large set of documents that define and describe cryptographic algorithms for encryption, message authentication, pseudorandom functions (PRFs), and cryptographic key exchange. • Other: There are a variety of other IPsec-related RFCs, including those dealing with security policy and management information base (MIB) content.
  • 34. IPSec Services • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets – a form of partial sequence integrity • Confidentiality (encryption) • Limited traffic flow confidentiality
  • 35. Transport and Tunnel Modes • Transport Mode – to encrypt & optionally authenticate IP data – can do traffic analysis but is efficient – good for ESP host to host traffic • Tunnel Mode – encrypts entire IP packet – add new header for next hop – no routers on way can examine inner IP header – good for VPNs, gateway to gateway security
  • 38. Security Associations • a one-way relationship between sender & receiver that affords security for traffic flow • defined by 3 parameters: – Security Parameters Index (SPI) – IP Destination Address – Security Protocol Identifier • has a number of other parameters – seq no, AH & EH info, lifetime etc • have a database of Security Associations
  • 39. Security Policy Database • relates IP traffic to specific SAs – match subset of IP traffic to relevant SA – use selectors to filter outgoing traffic to map – based on: local & remote IP addresses, next layer protocol, name, local & remote ports
  • 40. Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload and any IPv6 extesion header Encrypts inner IPpacket ESP with authentication Encrypts IP payload and any IPv6 extesion header. Authenticates IPpayload but no IP header Encrypts inner IPpacket. Authenticates innerIP packet.
  • 41. Before applying AH Transport Mode (AH Authentication
  • 44. Encryption & Authentication Algorithms & Padding • ESP can encrypt payload data, padding, pad length, and next header fields – if needed have IV at start of payload data • ESP can have optional ICV for integrity – is computed after encryption is performed • ESP uses padding – to expand plaintext to required length – to align pad length and next header fields – to provide partial traffic flow confidentiality
  • 45. Anti-Replay Service • replay is when attacker resends a copy of an authenticated packet • use sequence number to thwart this attack • sender initializes sequence number to 0 when a new SA is established – increment for each packet – must not exceed limit of 232 – 1 • receiver then accepts packets with seq no within window of (N –W+1)
  • 46. IPSec Key Management • handles key generation & distribution • typically need 2 pairs of keys – 2 per direction for AH & ESP • manual key management – Sys-admin manually configures every system • automated key management – automated system for on demand creation of keys for SA’s in large systems – has Oakley & ISAKMP elements
  • 47. • a key exchange protocol • based on Diffie-Hellman key exchange • adds features to address weaknesses – no info on parties, man-in-middle attack, cost – so adds cookies, groups (global params), nonces, DH key exchange with authentication • can use arithmetic in prime fields or elliptic curve fields
  • 48. ISAKMP •Internet Security Association and Key Management Protocol •provides framework for key management defines procedures and packet formats to establish, negotiate, modify, & delete SAs •independent of key exchange protocol, encryption alg, & authentication method •IKEv2 no longer uses Oakley& ISAKMP terms, but basic functionality is same
  • 49. CASE STUDIES ON CRYPTOGRAPY AND SECURITY
  • 50. Secure Inter-branch Payment Transactions  Points for classroom discussions 1.What is the technology to achieve non-repudiation? How is this guaranteed? 2.How is the problem of key distribution resolved in PKI? 3.Why are cryptographic toolkits required? 4.How can smart cards be used in cryptography? General Bank Of India (GBI) has implemented an Electronic Payment System called as EPS in about 1200 branches across the country. This system transfers payment instructions between two computerized branches of GBI. A central server is maintained at the EPS office located in Mumbai. The branch offices connect to the Local VSAT of a private network by using dial-up connection. The local VSAT has a connectivity established with the EPS office. GBI utilizes its proprietary messaging service called as GBI-Transfer to exchange payment instructions. Currently, EPS has minimal data security. As the system operates in a closed network, the current security infrastructure may suffice the need. The data moving across the network is in encrypted format.
  • 51. • Current EPS Architecture EPS is used to transmit payment details from the payer branch to the payee branch via the central server in Mumbai which is also described stepby- step. • A data-entry person in the Payer Branch enters transaction details through the EPS interface. • A Bank Officer checks the validity of the transaction through the EPS interface. • After validating the transaction, the Bank Officer authorizes the transaction. Authorized transaction is stored in a local Payment Master (PM) database. • Once the transaction is stored in PM, a copy of the same is encrypted and stored in a file. This transaction file is stored in OUT directory. The GBI- Transfer application looks for any pending transactions (i.e. for the presence of any files in the OUT directory) by a polling mechanism and if it finds such
  • 52. • transactions, it sends all these files one-by-one to the EPS central office located in Mumbai by dialing the local VSAT.  The local VSAT gets connectivity to the EPS central office and the transaction is transferred and • stored in the IN directory at the EPS central office.  The interface program at the EPS central office collects the file pending in the IN directory and sends it to the PM application at that office.  In order to send the Credit Request to PM, the transaction headers are changed. The transaction with changed headers in encrypted format is then placed in OUT directory of the EPS central office.  The GBI-Transfer application at the EPS central office collects the transactions pending in the OUT directory and sends them to the Payee Bank through the VSAT.  The transaction is transferred and stored in the IN directory of the Payee Branch.  The interface program at the Payee Branch collects the transaction and posts it in PM.  PM marks the credit entry and returns back an acknowledgement of the same. The acknowledgement is placed in OUT directory of the Payee Branch.  The acknowledgement is picked by GBI-Transfer at the Payee Branch and sent to the EPS central office through the VSAT.  The EPS central office receives the credit acknowledgement and forwards it to Payer Branch.  The Payer Branch receives the credit acknowledgement receipt. This completes the transaction.
  • 53. • Requirements to Enhance EPS As GBI is in the process of complete automation and setting up connectivity over the Internet or a private network, they need to ensure stringent security measures, which demand the usage of a Public Key Infrastructure (PKI) framework. • As a part of implementing security, GBI wants the following aspects to be ensured: •Non-repudiation (Digital Signatures) •Encryption – 128-bit (Upgrade to the current 56-bit encryption) •Smart card support for storing sensitive data & on-card digital signing
  • 54. •Closed loop Public Key Infrastructure : • Proposed Solution Since providing cryptographic functionalities require the usage of a • cryptographic toolkit, it is assumed that GBI will implement an appropriate Certification Authority (CA) infrastructure and a PKI infrastructure offering.
  • 55. • The transaction will be digitally signed and encrypted/decrypted at the Payer and Payee branches, as well as at the EPS central office. The signing operation can be performed on the system or on external hardware like a smart card. On the server side, a provision of automated signing without any manual intervention will be provided. • The transaction flow described earlier would now be split into two legs: • The Payer Leg (Payer Branch to the EPS central office) • The Payee Leg (EPS central office to the Payee Branch)
  • 56. Cross Site Scripting Vulnerability (CSSV)
  • 57. Points for classroom discussions • What is the purpose of scripting technologies on the Internet? • What can prevent CSSV attacks? • What sort of testing can the creators of a Web site perform in order to guard against possible CSSV attacks? • Cross Site Scripting Vulnerability (CSSV) is a relatively new form of attacks that exploits inadequate validations on the server-side. The term Cross Server Scripting Vulnerability (CSSV) is actually not completely correct. However, this term was coined when the problem was not completely understood and has stuck ever since. Cross-site scripting happens when malicious tags and/or scripts attack a Web browser via another site’s dynamically generated Web pages. The attacker’s target is not a Website, but rather its users (i.e. clients or browsers). • The idea of CSSV is quite simple to understand and is based on exploiting the scripting • technologies, such as JavaScript, VBScript or JScript. Let us understand how this works. Consider the following Web page containing a form as shown in Fig. 10.9, in which the user is expected to enter her postal address. Suppose that the URL of the site sending this page is www.test.com and when the user submits this form, it would be processed by a server-side program called as address.asp.
  • 58. • We would typically expect the user to enter the house number, street name, city, postal code and country, etc. However, imagine that the user enters the following weird string, instead: • <SCRIPT>Hello World</SCRIPT> • As a result, the URL submitted would be something like www.test.com/address.asp?address= • <SCRIPT>Hello World </SCRIPT>. • Now suppose that the server-side program address.asp does not validate the input sent by the user and simply sends the value of the field address to the next Web page. What would this translate to? It would mean that the next Web page would receive the value of address as • <SCRIPT>Hello World</ SCRIPT>. • As we know, this would most likely treat the value of the address field as a script, which would be executed as if it is written in a scripting language, such as JavaScript etc on the Web browser. Therefore, the user would get to see Hello World.
  • 59. Virtual Elections • Points for classroom discussions • Is it technically possible to have elections on the Internet? How? What sort of infrastructure would be needed for this? • What would be the main concerns in such a virtual election? • What would be the use of digital signatures and encryption in virtual elections? • Another situation where cryptography is useful is virtual elections. Computerized voting would become quite common in the next few decades. As such, it is important that the protocol for ritual
  • 60. They must come together; combine their respective secrets (S and R) to generate the original secret (P). Bob gets only R Alice gets only S Combine d secret R XOR Random Number ≈ Origina l secret P S Fig:Secret splitting
  • 61. • elections should protect individual privacy and should also disallow cheating. Consider the following protocol in order that voters can send their votes electronically to the Election authority (EA).
  • 62. • Each voter casts the vote and encrypts it with the public key of the EA. • Each voter sends the encrypted vote to the EA. • The EA decrypts all the votes to retrieve the original vote, tabulates all the votes and announces the result of the election. • Is this protocol secure and does it provide comfort both to the voters as well as to the EA? Not at all! • There are following problems in this scheme: • The EA does not know whether the authorized voters have voted or it has received fake (bogus) votes. • Secondly, there is no mechanism to prevent duplicate voting. • What is the advantage of this protocol? Clearly, no one would be able to change another voter’s vote, because it is first encrypted with the EA’s public key and is then sent to the EA. • However, if we observe this scheme carefully, an attacker need not change someone’s vote at all. The attacker can simply send duplicate votes! • How can we improve upon this protocol to make it more robust? Let us rewrite it, as follows: • Each voter casts the vote and signs it with her private key.
  • 63. • Each voter then encrypts the signed vote with the public key of the EA. • Each voter sends the vote to the EA. • The EA decrypts the voter with its private key and verifies the signature of the voter with the help of the voter’s public key. • The EA then tabulates all the votes and announces the result of the election. This protocol would now ensure that duplicate voting is disallowed. Because the voter has signed the vote (with her private key) in Step 1, this can be checked. Similarly, no one can change another voter’s vote. This is because a vote is digitally signed and any changes to it will be detected and exposed in the signature verification process.
  • 64. • Although this protocol is a lot better, the trouble with this scheme is that the EA would come to • know who voted for whom, leading to privacy concerns. We shall leave it to the reader to figure out how this problem can be solved.