SlideShare a Scribd company logo
1 of 19
Aleppo university
Faculty of electrical and electronic engineering
Computer engineering department
First semester 2016/2017
Prepared by:
Mohammed Haj Hilal
E-Mail Security
2
๏ƒ˜ Why?
1. How to forge email?
2. How to spot spoofed email.
๏ƒ˜ Mail Infrastructure
๏ƒ˜ Security Characteristics
1. Authentication
2. Confidentiality
3. Non-repudiation
๏ƒ˜ Solutions:
1. S/MIME
2. PGP
3
1. Can be easily forged.
2. Can be generated almost free of cost
and used for spamming.
3. Contains no guarantee for delivery.
4. Has currently no inbuilt authentication
method.
4
๏ƒ˜Email travels from
originating computer to
the receiving computer
through email servers.
๏ƒ˜All email servers add to the
header.
๏ƒ˜Use important internet
services to interpret and
verify data in a header.
Typical path of an email message:Client
Mail Server
Mail Server
Mail Server
Client
5
Email program such as
outlook is a client
application.
Needs to interact with
an email server:
A. Post Office Protocol
(POP)
B. Internet Message
Access Protocol
(IMAP)
C. Microsoftโ€™s Mail
API (MAPI)
Post Office Service Protocol Characteristics
Stores only
incoming
messages.
POP Investigation must be at the
workstation.
Stores all messages IMAP
MSโ€™ MAPI
Lotus Notes
Copies of incoming and outgoing
messages might be stored on the
workstation or on the server or on
both.
Web-based send
and receive.
HTTP Incoming and outgoing messages
are stored on the server, but there
might be archived or copied
messages on the workstation. Easy
to spoof identity.
6
๏ถ Privacy
๏ถ Authentication
๏ถ Integrity
๏ถ Non repudiation
๏ถ Proof of submission
๏ถ Proof of delivery
๏ถ Message flow confidentiality
๏ถ Anonymity
๏ถ Containment
๏ถ Self destruct
๏ถ Message sequence integrity
7
๏ถSecure/Multipurpose Internet Mail Extension
๏‚ง Originated from RSA Data Security Inc. in 1995
๏‚ง Widely supported, e.g. in Microsoft Outlook,
Netscape Messenger, Lotus Notes.
๏‚ง S/MIME provides
๏ƒผEnveloped Data
๏ƒผSigned Data
๏ƒผClear-signed Data
8
โ€ข S/MIME incorporates three public-key algorithms
1. DSS for digital signatures.
2. Diffie-Hellman for encrypting session keys.
3. RSA.
โ€ข SHA1 or MD5 for calculating digests.
โ€ข Three-key triple DES for message encryption.
9
generate a pseudo-random session key for either Triple DES or
RC2/40.
1. for each recipient, encrypt the session key with the
recipients public RSA key.
2. for each recipient, prepare a block known as
Recipient-Info that contains the sender's public-key certificate
identifier for the , the session key and encrypt the message
content with the session key.
To recover the encrypted message, the recipient:
A. reconverts the base64 encoding .
B. uses his private key to recover the session key.
C. He uses this key to decrypt the message.
10
11
๏ถFreeware: Open PGP and variants:
๏ถwww.openpgp.org, www.gnupg.org
๏ถOpen PGP specified in RFC 2440 and defined by IETF Open PGP
working group.
๏ถAvailable as plug-in for popular e-mail clients, can also be used as
stand-alone software.
๏ถPGP is an e-mail security program written by Phil Zimmermann
12
โ€ข โ€œIf all the personal computers in the worldโ€”260
millionโ€”were put to work on a single PGP
encrypted message, it would still take an estimated
12 million times the age of the universe, on
average, to break a single message.โ€
13
PGP is an open-source freely available software
package for e-mail security.
It provides :
๏ƒ˜ authentication
๏ƒ˜ confidentiality
๏ƒ˜ compression
๏ƒ˜ e-mail compatibility
๏ƒ˜ segmentation and reassembly.
14
Digital
signature
DSS/SHA or
RSA/SHA
A hash code of a message is created using SHA-1. This
message digest is encrypted using DSS or RSA with the
sender's private key and included with the message.
Compression ZIP A message may be compressed, for storage or transmission,
using ZIP.
15
Symmetric encryption:
โ€ข DES, 3DES, AES and others.
Public key encryption of session keys:
โ€ข RSA
Hashing:
โ€ข SHA-1, MD-5 and others.
Signature:
โ€ข RSA, DSS, ECDSA and others
PGP use:
public keys for
encrypting session keys
/ verifying signatures.
private keys for
decrypting session keys
/ creating signatures.
16
Alice:
๏ฑ generates random symmetric private key, KS.
๏ฑ encrypts message with KS (for efficiency)
๏ฑ also encrypts KS with Bobโ€™s public key.
๏ฑ sends both KS(m) and KB(KS) to Bob.
๏ฑAlice wants to send confidential e-mail, m, to Bob.
KS( ).
KB( ).+
+ -
KS(m )
KB(KS )
+
m
KS
KS
KB
+
Internet
KS( ).
KB( ).-
KB
-
KS
m
KS(m )
KB(KS )
+
Bob:
๏ฑ uses his private key to decrypt and
recover KS
๏ฑ uses KS to decrypt KS(m) to recover m
17
โ€ขAlice wants to provide sender authentication message integrity.
โ€ขAlice digitally signs message.
โ€ขsends both message (in the clear) and digital signature.
H( ). KA( )
.-
+ -
H(m )KA(H(m))
-
m
KA
-
Internet
m
KA( )
.+
KA
+
KA(H(m))
-
m
H( ). H(m )
compare
18
19

More Related Content

What's hot

Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
ย 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
ย 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail securityDr.Florence Dayana
ย 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
ย 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
ย 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
ย 
End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes - End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes - Thomas Seropian
ย 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.pptreshmy12
ย 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
ย 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
ย 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
ย 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
ย 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptkusum sharma
ย 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute forcevishalgohel12195
ย 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
ย 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
ย 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
ย 

What's hot (20)

SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
ย 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
ย 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
ย 
Email security
Email securityEmail security
Email security
ย 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
ย 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
ย 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
ย 
6. cryptography
6. cryptography6. cryptography
6. cryptography
ย 
End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes - End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes -
ย 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
ย 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
ย 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
ย 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
ย 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
ย 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
ย 
Pgp
PgpPgp
Pgp
ย 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
ย 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
ย 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
ย 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
ย 

Similar to Email security

Network security
Network securityNetwork security
Network securitySVijaylakshmi
ย 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxprateekPallav2
ย 
network and cyber security
network and cyber securitynetwork and cyber security
network and cyber securityShruthi Reddy
ย 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified MailMatthew Chang
ย 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email securityMazin Alwaaly
ย 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptjayaprasanna10
ย 
ch15 (1).ppt
ch15 (1).pptch15 (1).ppt
ch15 (1).pptSunilKatkar5
ย 
ch15.ppt
ch15.pptch15.ppt
ch15.pptwitscollege
ย 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPunnya Babu
ย 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5limsh
ย 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
ย 

Similar to Email security (20)

Network security
Network securityNetwork security
Network security
ย 
Ch15
Ch15Ch15
Ch15
ย 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
ย 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
ย 
network and cyber security
network and cyber securitynetwork and cyber security
network and cyber security
ย 
Pgp
PgpPgp
Pgp
ย 
Pgp
PgpPgp
Pgp
ย 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
ย 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
ย 
Unit 4
Unit 4Unit 4
Unit 4
ย 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
ย 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
ย 
ch15 (1).ppt
ch15 (1).pptch15 (1).ppt
ch15 (1).ppt
ย 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
ย 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
ย 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
ย 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
ย 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
ย 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
ย 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
ย 

Recently uploaded

Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Standkumarajju5765
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...Diya Sharma
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
ย 

Recently uploaded (20)

Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 

Email security

  • 1. Aleppo university Faculty of electrical and electronic engineering Computer engineering department First semester 2016/2017 Prepared by: Mohammed Haj Hilal E-Mail Security
  • 2. 2 ๏ƒ˜ Why? 1. How to forge email? 2. How to spot spoofed email. ๏ƒ˜ Mail Infrastructure ๏ƒ˜ Security Characteristics 1. Authentication 2. Confidentiality 3. Non-repudiation ๏ƒ˜ Solutions: 1. S/MIME 2. PGP
  • 3. 3 1. Can be easily forged. 2. Can be generated almost free of cost and used for spamming. 3. Contains no guarantee for delivery. 4. Has currently no inbuilt authentication method.
  • 4. 4 ๏ƒ˜Email travels from originating computer to the receiving computer through email servers. ๏ƒ˜All email servers add to the header. ๏ƒ˜Use important internet services to interpret and verify data in a header. Typical path of an email message:Client Mail Server Mail Server Mail Server Client
  • 5. 5 Email program such as outlook is a client application. Needs to interact with an email server: A. Post Office Protocol (POP) B. Internet Message Access Protocol (IMAP) C. Microsoftโ€™s Mail API (MAPI) Post Office Service Protocol Characteristics Stores only incoming messages. POP Investigation must be at the workstation. Stores all messages IMAP MSโ€™ MAPI Lotus Notes Copies of incoming and outgoing messages might be stored on the workstation or on the server or on both. Web-based send and receive. HTTP Incoming and outgoing messages are stored on the server, but there might be archived or copied messages on the workstation. Easy to spoof identity.
  • 6. 6 ๏ถ Privacy ๏ถ Authentication ๏ถ Integrity ๏ถ Non repudiation ๏ถ Proof of submission ๏ถ Proof of delivery ๏ถ Message flow confidentiality ๏ถ Anonymity ๏ถ Containment ๏ถ Self destruct ๏ถ Message sequence integrity
  • 7. 7 ๏ถSecure/Multipurpose Internet Mail Extension ๏‚ง Originated from RSA Data Security Inc. in 1995 ๏‚ง Widely supported, e.g. in Microsoft Outlook, Netscape Messenger, Lotus Notes. ๏‚ง S/MIME provides ๏ƒผEnveloped Data ๏ƒผSigned Data ๏ƒผClear-signed Data
  • 8. 8 โ€ข S/MIME incorporates three public-key algorithms 1. DSS for digital signatures. 2. Diffie-Hellman for encrypting session keys. 3. RSA. โ€ข SHA1 or MD5 for calculating digests. โ€ข Three-key triple DES for message encryption.
  • 9. 9 generate a pseudo-random session key for either Triple DES or RC2/40. 1. for each recipient, encrypt the session key with the recipients public RSA key. 2. for each recipient, prepare a block known as Recipient-Info that contains the sender's public-key certificate identifier for the , the session key and encrypt the message content with the session key. To recover the encrypted message, the recipient: A. reconverts the base64 encoding . B. uses his private key to recover the session key. C. He uses this key to decrypt the message.
  • 10. 10
  • 11. 11 ๏ถFreeware: Open PGP and variants: ๏ถwww.openpgp.org, www.gnupg.org ๏ถOpen PGP specified in RFC 2440 and defined by IETF Open PGP working group. ๏ถAvailable as plug-in for popular e-mail clients, can also be used as stand-alone software. ๏ถPGP is an e-mail security program written by Phil Zimmermann
  • 12. 12 โ€ข โ€œIf all the personal computers in the worldโ€”260 millionโ€”were put to work on a single PGP encrypted message, it would still take an estimated 12 million times the age of the universe, on average, to break a single message.โ€
  • 13. 13 PGP is an open-source freely available software package for e-mail security. It provides : ๏ƒ˜ authentication ๏ƒ˜ confidentiality ๏ƒ˜ compression ๏ƒ˜ e-mail compatibility ๏ƒ˜ segmentation and reassembly.
  • 14. 14 Digital signature DSS/SHA or RSA/SHA A hash code of a message is created using SHA-1. This message digest is encrypted using DSS or RSA with the sender's private key and included with the message. Compression ZIP A message may be compressed, for storage or transmission, using ZIP.
  • 15. 15 Symmetric encryption: โ€ข DES, 3DES, AES and others. Public key encryption of session keys: โ€ข RSA Hashing: โ€ข SHA-1, MD-5 and others. Signature: โ€ข RSA, DSS, ECDSA and others PGP use: public keys for encrypting session keys / verifying signatures. private keys for decrypting session keys / creating signatures.
  • 16. 16 Alice: ๏ฑ generates random symmetric private key, KS. ๏ฑ encrypts message with KS (for efficiency) ๏ฑ also encrypts KS with Bobโ€™s public key. ๏ฑ sends both KS(m) and KB(KS) to Bob. ๏ฑAlice wants to send confidential e-mail, m, to Bob. KS( ). KB( ).+ + - KS(m ) KB(KS ) + m KS KS KB + Internet KS( ). KB( ).- KB - KS m KS(m ) KB(KS ) + Bob: ๏ฑ uses his private key to decrypt and recover KS ๏ฑ uses KS to decrypt KS(m) to recover m
  • 17. 17 โ€ขAlice wants to provide sender authentication message integrity. โ€ขAlice digitally signs message. โ€ขsends both message (in the clear) and digital signature. H( ). KA( ) .- + - H(m )KA(H(m)) - m KA - Internet m KA( ) .+ KA + KA(H(m)) - m H( ). H(m ) compare
  • 18. 18
  • 19. 19

Editor's Notes

  1. ู…ู…ูƒู† ุชุฒูˆูŠุฑู‡ ุจุณู‡ูˆู„ุฉ ูŠุชู… ุชูˆู„ูŠุฏู‡ ุจุฏูˆู† ูƒู„ูุฉ ู„ุง ูŠุญุชูˆูŠ ุถู…ุงู† ุชุณู„ูŠู… ู„ุง ูŠุชุถู…ู† ุทุฑูŠู‚ุฉ ู„ู„ุชุญู‚ู‚ ู…ู† ุงู„ู…ูˆุซูˆู‚ูŠุฉ ููŠ ุจู†ูŠุชู‡
  2. ุงู„ุจุฑูŠุฏ ูŠุนุจุฑ ู…ู† ุงู„ู…ุตุฏุฑ ู„ู„ู‡ุฏู ุนุจุฑ ุนุฏุฉ ุณูŠุฑูุฑุงุช ูƒู„ ูˆุงุญุฏ ูŠุถูŠู ู…ุนู„ูˆู…ุงุช ุนู„ู‰ ุงู„ุชุฑูˆูŠุณุฉ ูŠุณุชุฎุฏู… ุฎุฏู…ุงุช ุงู„ุงู†ุชุฑู†ุช ุงู„ุฃุณุงุณูŠุฉ ู„ุชูุณูŠุฑ ุงู„ุชุฑูˆูŠุณุฉ
  3. outlook ูŠุญุชุงุฌ ู„ู„ุชูุงุนู„ ู…ุน ุงู„ู…ุฎุฏู… ุนู† ุทุฑูŠู‚ ุฎูˆุงุฑุฒู…ูŠุงุช ู‡ูŠ ุญูŠุซ 1-ุชุฎุฒู† ุงู„ุฑุณุงุฆู„ ุงู„ูˆุงุฑุฏุฉ ูู‚ุท 2-ุชุฎุฒู† ุฌู…ูŠุน ุงู„ุฑุณุงุฆู„ ููŠ ุงู„ุจู‚ูŠุฉ 1-ุงู„ุชุญู‚ู‚ ุนู†ุฏ ู…ุญุทุฉ ุงู„ุนู…ู„ 2-ู†ุณุฎ ู…ู† ุงู„ุฑุณุงุฆู„ ุงู„ูˆุงุฑุฏุฉ ูˆุงู„ุตุงุฏุฑุฉ ู…ู…ูƒู† ุงู† ุชุฎุฒู† ุจู…ุญุทุฉ ุงู„ุนู…ู„ ุงูˆ ุจุงู„ู…ุฎุฏู… 3- ูˆุงุฑุฏุฉ ูˆุตุงุฏุฑุฉ ุชุฎุฒู† ุจุงู„ู…ุฎุฏู… ู…ู…ูƒู† ุงู† ุชุคุฑุดู ูˆุณู‡ู„ุฉ ุงู„ุชุฒูˆูŠุฑ
  4. 1-ู„ุง ูŠุฌูˆุฒ ู„ุฃูŠ ุดุฎุต ู‚ุฑุงุกุฉ ุงู„ุฑุณุงู„ุฉ ู…ุง ุนุฏุง ุงู„ู…ุณุชู‚ุจู„ 2-ูŠุฌุจ ุนู„ู‰ ุงู„ู…ุณุชู‚ุจู„ ุงู† ูŠุนุฑู ู…ู† ู‡ูˆ ุงู„ู…ุฑุณู„ 3-ูŠุฌุจ ุนู„ู‰ ุงู„ู…ุณุชู‚ุจู„ ุงู† ูŠูƒูˆู† ู‚ุงุฏุฑ ุนู„ู‰ ู…ุนุฑูุฉ ุงุฐุง ุชู… ุชุนุฏูŠู„ ุงู„ุฑุณุงู„ุฉ 4-ุนุฏู… ุงู„ุงู†ูƒุงุฑ :ุงู„ู…ุณุชู‚ุจู„ ูŠุฌุจ ุงู† ูŠุชุฃูƒุฏ ุจุงู† ุงู„ู…ุฑุณู„ ู‡ูˆ ู…ู† ุงุฑุณู„ ุงู„ุฑุณุงู„ุฉ 5-ุจุฑู‡ู†ุฉ ู„ู„ู…ุฑุณู„ ุจุฅุฑุณุงู„ ุงู„ุจุฑูŠุฏ 6-ุจุฑู‡ู†ุฉ ู„ู„ู…ุฑุณู„ ุจุงุณุชู‚ุจุงู„ ุงู„ุจุฑูŠุฏ 7-ุงู„ู…ุชู†ุตุช ู„ุง ูŠุณุชุทูŠุน ู…ุนุฑูุฉ ู…ุนุฑู ุงู„ู…ุฑุณู„ 8-ุงู„ู‚ุฏุฑุฉ ุนู„ู‰ ุงู„ุงุฑุณุงู„ ุจุญูŠุซ ู„ุง ูŠุนุฑู ุงู„ู…ุฑุณู„ ู„ู„ุฑุณุงู„ุฉ(ุฅุฎูุงุก ุงู„ู…ุฑุณู„) 9-ุงู„ู‚ุฏุฑุฉ ุนู„ู‰ ุงู„ู…ุญุงูุธุฉ ุนู„ู‰ ุงู„ุฑุณุงุฆู„ ุงู„ุณุฑูŠุฉ ู…ู† ุงู„ุชุณุฑุจ ุฎุงุฑุฌ ุงู„ู…ู†ุทู‚ุฉ 10-ูŠุชู… ุชุฏู…ูŠุฑ ุงู„ุฑุณุงู„ุฉ ุนู†ุฏ ุงู„ุชุณู„ูŠู… 11-ูˆุตูˆู„ ุงู„ุฑุณุงู„ุฉ ุจุงู„ุชุฑุชูŠุจ ูˆุจุฏูˆู† ุถูŠุงุนุงุช
  5. ู…ุฒูˆุฏ ุงู„smime ูŠู‚ูˆู… 1-ุชุบู„ูŠู ุงู„ุฑุณุงู„ุฉ ู…ู† ุงุฌู„ ุงู„ุฎุตูˆุตูŠุฉ ุญูŠุซ ูŠุญุชุงุฌ ุงู„ู…ุฑุณู„ ู„ู„ูˆุตูˆู„ ู„ู…ูุชุงุญ ุนุงู… ู„ูƒู„ ู…ุณุชู‚ุจู„ ู…ุญุชู…ู„ ู„ู„ุฑุณุงู„ุฉ 2-ุชูˆู‚ูŠุน ุงู„ุฑุณุงู„ุฉ ู…ู† ุงุฌู„ ุงู„ู…ุตุงุฏู‚ุฉ ุญูŠุซ ูู‚ุท ุงู„ู…ุฒูˆุฏ ู„ SMIMEู‚ุงุฏุฑ ุนู„ู‰ ุนุฑุถ ุงู„ุฑุณุงู„ุฉ 3-ุฅุฒุงู„ุฉ ุงู„ุชูˆู‚ูŠุน ุญุชู‰ ูŠู…ูƒู† ุงู„ู…ุณุชู‚ุจู„ ู…ู† ุงู„ู…ุตุงุฏู‚ุฉ ุนู„ู‰ ุงู„ุฑุณุงู„ุฉ
  6. Dssู„ู„ุชูˆู‚ูŠุน ุงู„ุฑู‚ู…ูŠ ุฏูŠู ู‡ูŠู„ู…ุงู† ู„ุชุดููŠุฑ ู…ูุงุชูŠุญ ุงู„ุฌู„ุณุฉ RSA SH1 ุฃูˆ MD5 ู„ุญุณุงุจ ุงู„ุถุบุท 3Key DES ู„ุชุดููŠุฑ ุงู„ุฑุณุงู„ุฉ ุงู„ู…ุฑุณู„ ู„ุฏูŠู‡ ู‚ุงุฆู…ุฉ ู…ู† ุฅู…ูƒุงู†ูŠุงุช ููƒ ุงู„ุชุดููŠุฑ ู„ู„ู…ุณุชู‚ุจู„ูŠู† ุงู„ู…ุญุชู…ู„ูŠู† ุญูŠุซ ูŠุชู… ุงุฎุชูŠุงุฑ ุงู„ุฃูุถู„ ู…ู† ุงุฌู„ ูƒู„ ุญุงู„ุฉ ุงุฐุง ุงุณุชู‚ุจู„ ุงู„ู…ุฑุณู„ ุฑุณุงู„ุฉ ู…ู† ุงู„ู…ุณุชู‚ุจู„ูŠู† ุงู„ู…ุญุชู…ู„ูŠู† ูŠู‚ูˆู… ุจุงุณุชุฎุฏุงู… ู†ูุณ ุงู„ุงู„ูŠุฉ ุงู„ุชูŠ ุชู… ุชุดููŠุฑ ุงู„ุฑุณุงู„ุฉ ู…ุน ู‡ุฐุง ุงู„ู…ุณุชู‚ุจู„
  7. ุนู†ุฏ ุงู„ู…ุฑุณู„ ูŠุชู… ุชูˆู„ูŠุฏ ู…ูุชุงุญ ุฌู„ุณุฉ ุนุดูˆุงุฆูŠ ุงู…ุง ุจุงุณุชุฎุฏุงู… DES ุฃูˆ RC 1-ู„ูƒู„ ู…ุณุชู‚ุจู„ ูŠุชู… ุชุดููŠุฑ ู…ูุชุงุญ ุงู„ุฌู„ุณุฉ ุจุงุณุชุฎุฏุงู… ู…ูุชุงุญ ุงู„ู…ุณุชู‚ุจู„ ุงู„ุนุงู… ุจุฎูˆุงุฑุฒู…ูŠุฉ RSA 2-ูŠุชู… ุชุฌู‡ูŠุฒ ุจู„ูˆูƒ ูŠุญุชูˆูŠ ุงู„ู…ูุชุงุญ ุงู„ุนุงู… ู„ู„ู…ุฑุณู„ ู…ุน ุงู„ุฎูˆุงุฑุฒู…ูŠุฉ ุงู„ุชูŠ ุชู… ุงุณุชุฎุฏุงู…ู‡ุง ูˆู…ูุชุงุญ ุงู„ุฌู„ุณุฉ ุงู„ู…ุดูุฑ ูˆุงู„ุฑุณุงู„ุฉ ุงู„ู…ุดูุฑุฉ ุจุงุณุชุฎุฏุงู… ู…ูุชุงุญ ุงู„ุฌู„ุณุฉ ุนู†ุฏ ุงู„ู…ุณุชู‚ุจู„ 1-ูŠุชู… ุฅุนุงุฏุฉ ุชุญูˆูŠู„ ุงู„ุฑุณุงู„ุฉ ุจุงุณุชุฎุฏุงู… ุชุดููŠุฑ Base64 2-ุงุณุชุฎุฏุงู… ุงู„ู…ูุชุงุญ ุงู„ุฎุงุต ู„ู„ู…ุณุชู‚ุจู„ ู„ู…ุนุฑูุฉ ู…ูุชุงุญ ุงู„ุฌู„ุณุฉ 3-ุงุณุชุฎุฏุงู… ู…ูุชุงุญ ุงู„ุฌู„ุณุฉ ุงู„ุฐูŠ ุชู… ููƒ ุชุดููŠุฑู‡ ู…ู† ุงุฌู„ ููƒ ุชุดููŠุฑ ุงู„ุฑุณุงู„ุฉ
  8. ุชุณุชุฎุฏู… ุฎูˆุงุฑุฒู…ูŠุฉ IDEA ู„ู„ุชุดููŠุฑ ู„ู„ู†ุต ุงู„ุนุงุฏูŠ ูˆ RSA ู…ู† ุงุฌู„ ุงู„ู…ูุชุงุญ ุงู„ุนุงู… ูˆุงู„ู…ูุชุงุญ ุงู„ุฎุงุต
  9. 1- ุงู„ุชูˆู‚ูŠุน ุงู„ุฑู‚ู…ูŠ DSS ุชุดูุฑ ุจุงุณุชุฎุฏุงู… ุงู„ู…ูุชุงุญ ุงู„ุฎุงุต ู„ู„ู…ุฑุณู„ 2-ุชุดููŠุฑ ุงู„ุฑุณุงู„ุฉ 3DES ุฃูˆ ุฏูŠู ู‡ูŠู„ู…ุงู† ุจุงุณุชุฎุฏุงู… ู…ูุชุงุญ ุงู„ุฌู„ุณุฉ ูˆุซู… ูŠุชู… ุชุดููŠุฑ ู‡ุฐุง ุงู„ู…ูุชุงุญ ุจุงุณุชุฎุฏุงู… ุฏูŠู ู‡ูŠู„ู…ุงู† ู…ุน ู…ูุชุงุญ ุงู„ู…ุณุชู‚ุจู„ ุงู„ุนุงู… 3-ุงู„ุถุบุท ุจุงุณุชุฎุฏุงู… ZIP ุญูŠุซ ู…ู† ุงู„ู…ู…ูƒู† ุถุบุทู‡ุง ู…ู† ุงุฌู„ ุงู„ู…ุณุงุญุฉ 4-ุงู„ุชู‚ุทูŠุน ู„ู„ู…ู„ุงุฆู…ุฉ ู…ุน ุงู„ุญุฌู… ุงู„ุงุนุธู…ูŠ ู„ู„ุฑุณุงู„ุฉ ุญูŠุซ ุชู‚ูˆู… ุจุงู„ุชู‚ุทูŠุน ูˆุงู„ุชุฌู…ูŠุน
  10. ุชุณุชุฎุฏู… ู…ูุงุชูŠุญ ุนุงู…ุฉ ู…ู† ุงุฌู„ ุชุดููŠุฑ ู…ูุชุงุญ ุงู„ุฌู„ุณุฉ ูˆุงู„ุชุฃูƒุฏ ู…ู† ุงู„ุชูˆู‚ูŠุน ูˆู…ูุงุชูŠุญ ุฎุงุตุฉ ู„ููƒ ุงู„ุชุดููŠุฑ ู„ู…ูุงุชูŠุญ ุงู„ุฌู„ุณุฉ ูˆุงู†ุดุงุก ุงู„ุชูˆู‚ูŠุน
  11. 1-ุชูˆู„ุฏ ู…ูุชุงุญ ุฎุงุต ุนุดูˆุงุฆูŠKs 2-ุชุดูุฑ ุงู„ุฑุณุงู„ุฉ ุจู‡ 3-ุชุดูุฑ ุงู„ู…ูุชุงุญ ุงู„ุฎุงุต Ks ุจุงุณุชุฎุฏุงู… ุงู„ู…ูุชุงุญ ุงู„ุนุงู… ู„BOB 4-ุชุฑุณู„ ุงู„ู…ูุชุงุญ ุงู„ุฎุงุต ูˆุชุดููŠุฑู‡ ู„BOB ุนู†ุฏ ุงู„ู…ุณุชู‚ุจู„ 1-ูŠุณุชุฎุฏู… ู…ูุชุงุญู‡ ุงู„ุฎุงุต ู„ููƒ ุชุดููŠุฑ ุงู„ู…ูุชุงุญ Ks 2-ูŠุณุชุฎุฏู… Ks ู„ููƒ ุชุดููŠุฑ ุงู„ุฑุณุงู„ุฉ
  12. ู„ู„ุชุญู‚ู‚ ู…ู† ุงู„ุชูƒุงู…ู„ ุจูŠู† ุงู„ู…ุฑุณู„ ูˆุงู„ู…ุณุชู‚ุจู„ 1-ุชูˆู‚ุน ุงู„ุฑุณุงู„ุฉ ุจุนุฏ ุงู„ุชุดููŠุฑ ูˆุชุฑุณู„ ุงู„ุฑุณุงู„ุฉ ุงู„ุงุตู„ูŠุฉ ู…ุน ุงู„ู…ูˆู‚ุนุฉ ุจุงุณุชุฎุฏุงู… ุงู„ู…ูุชุงุญ Ka 2-ุนู†ุฏ ุงู„ู…ุณุชู‚ุจู„ ูŠุชู… ููƒ ุชุดููŠุฑ ุงู„ุฑุณุงู„ุฉ ุจุงุณุชุฎุฏุงู… Ka+ุนู†ุฏ ุงู„ู…ุณุชู‚ุจู„ ูˆู…ู‚ุงุฑู†ุฉ ุงู„ุฑุณุงู„ุชูŠู† ููŠ ุญุงู„ุฉ ุงู„ุชุทุงุจู‚ ุชุชุญู‚ู‚ ุงู„ู…ุตุงุฏู‚ุฉ