Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The contents of this chapter include all of the following: secure email, PGP, S/MIME, domain-keys identified email, electronic mail security, email security, email security enhancements, pretty good privacy (PGP), PGP operation – authentication, PGP operation – confidentiality & authentication,. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 24 Review have considered: IEEE 802.11 Wireless LANs protocol overview and security Wireless Application Protocol (WAP) protocol overview Wireless Transport Layer Security (WTLS) Chapter 17 summary. Chapter 15 – Electronic Mail Security Opening quote. Email Security Email is one of the most widely used and regarded network services Currently message contents are not secure may be inspected either in transit or by suitably privileged users on destination system In virtually all distributed environments, electronic mail is the most heavily used network-based application. But current email services are roughly like "postcards”, anyone who wants could pick it up and have a look as its in transit or sitting in the recipients mailbox. Email Security Enhancements Confidentiality protection from disclosure Authentication of sender of message Message integrity protection from modification Non-repudiation of origin protection from denial by sender With the explosively growing reliance on electronic mail for every conceivable purpose, there grows a demand for authentication and confidentiality services. What we want is something more akin to standard mail (contents protected inside an envelope) if not registered mail (have confidence about the sender of the mail and its contents). That is, the “classic” security services listed are desired. Pretty Good Privacy (PGP) The Pretty Good Privacy (PGP) secure email program, is a remarkable phenomenon Has grown explosively and is now widely used Largely the effort of a single person, Phil Zimmermann Who selected the best available crypto algorithms to use & integrated them into a single program The Pretty Good Privacy (PGP) | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 24 Review have considered: IEEE 802.11 Wireless LANs protocol overview and security Wireless Application Protocol (WAP) protocol overview Wireless Transport Layer Security (WTLS) Chapter 17 summary. Chapter 15 – Electronic Mail Security Opening quote. Email Security Email is one of the most widely used and regarded network services Currently message contents are not secure may be inspected either in transit or by suitably privileged users on destination system In virtually all distributed environments, electronic mail is the most heavily used network-based application. But current email services are roughly like "postcards”, anyone who wants could pick it up and have a look as its in transit