4/16/18 1
C S C 2 4 9 A P R I L 1 7 , 2 0 1 8
SECURING EMAIL WITH PRETTY GOOD PRIVACY
2
OVERVIEW
Applying security measure to the Internet
- Securing email – Pretty Good Privacy
- Secure sockets layer, SSL
- Firewalls and Intrusion Detection Systems
O VERVIEW Applying security measure to the Internet Securing email - - PDF document
4/16/18 S ECURING E MAIL WITH P RETTY G OOD P RIVACY C S C 2 4 9 A P R I L 1 7 , 2 0 1 8 O VERVIEW Applying security measure to the Internet Securing email Pretty Good Privacy Secure sockets layer, SSL Firewalls and Intrusion
C S C 2 4 9 A P R I L 1 7 , 2 0 1 8
2
Alice:
1) Generate random symmetric private key, KS 2) 3) 4) q Alice wants to send confidential e-mail, m, to Bob.
m Internet m
q Alice wants to provide sender authentication message
m Internet m
q Alice wants to provide secrecy, sender authentication & message integrity. …How? m m Internet
8
Internet
controlled by OS controlled by app developer
transport application physical link network
process
transport application physical link network
process
socket
9
socket() bind() listen() accept() recv() send() socket() bind() connect send() recv() SERVER CLIENT
Ø Want certificate exchange to be part of protocol handshake phase H( )
KA( )
KA(H(m))
KA
KS( )
KB( )
+
KB (KS ) + KS KB + Internet KS
à Section 8.5.2 for more details
Step 1: client sends TCP
client
SYN
server
SYNACK ACK
setup setup Connection
connection to Alice
CA signed certificate
Alice’s public key), & sends master secret key to Alice
shown
S S L h e l l
e r t i f i c a t e K
A +
(MS)
T C P S Y N TCP SYNACK T C P A C K decrypt using KA
–
to get MS create Master Secret (MS)
Alice à Bob MAC key
length data MAC
H( )
MB
b1b2b3 … bn d d H(d) d H(d)
H( )
EB
SSL
d H(d) Type Ver Len
encrypted using EB unencrypted
administered network public Internet firewall
q Isolate an organization’s internal network from
q Which attacks are prevented?
packet based on:
Should arriving packet be allowed in? Departing packet let out?
Policy
Firewall Setting
No outside Web access.
Drop all outgoing packets to any IP address, port 80
No incoming TCP connections, except those for institution’s public Web server only.
Drop all incoming TCP SYN packets to any IP except 130.207.244.203, port 80
Prevent Web-radios from eating up the available bandwidth.
Drop all incoming UDP packets - except DNS and router broadcasts.
Prevent your network from being used for a smurf DoS attack.
Drop all ICMP packets going to a “broadcast” address (eg 130.207.255.255).
Prevent your network from being tracerouted
Drop all outgoing ICMP TTL expired traffic
q Where is a firewall implemented?