Lecture 8 - Security at The Application Layer
Lecture 8 - Security at The Application Layer
Lecture 8 - Security at The Application Layer
Computers and
Information Security
Fall 2023/2024
Lecture # 8
Security at the Application Layer:
PGP and S/MIME
1
Contents
16.2
16.1.1 E-mail Architecture
Figure 16.1 E-mail architecture
16.3
16.1.2 E-mail Security
Cryptographic Algorithms
Note
In e-mail security, the sender of the message needs
to include the name or identifiers
of the algorithms used in the message.
Certificates
It is obvious that some public-key algorithms must be
used for e-mail security.
16.4
16.1.2 Continued
Cryptographic Secrets
Note
In e-mail security, the encryption/decryption is
done using a symmetric-key algorithm,
but the secret key to decrypt the message is
encrypted with the public key of the
receiver and is sent with the message.
16.5
16-2 PGP
Pretty Good Privacy (PGP) can be used to create a secure e-
mail message or to store a file securely for future retrieval.
16.7
16.2.1 Scenarios, continued
2- Message Integrity
Figure 16.3 An authenticated message
16.8
16.2.1 Scenarios, continued
3- Compression
Figure 16.4 A compressed message
16.9
16.2.1 Scenarios, continued
16.10
16.2.2 Continued
PGP Algorithms
16.11
16.2.2 Continued
16.12
16.2.2 Continued
16.13
16.2.2 Continued
16.14
16.2.3 PGP Certificates
X.509 Certificates
Protocols that use X.509 certificates depend on the
hierarchical structure of the trust.
Note
In X.509, there is a single path from the fully
trusted authority to any certificate.
16.15
16.2.3 Continued
PGP Certificates
In PGP, there is no need for CAs; anyone in the ring can
sign a certificate for anyone else in the ring.
Note
In PGP, there can be multiple paths from fully or
partially trusted authorities to any subject.
16.17
16.2.4 Key Revocation
It may become necessary for an entity to revoke his or
her public key from the ring. This may happen if the
owner of the key feels that the key is compromised
(stolen, for example) or just too old to be safe.
16.18
16.2.5 Extracting Information from Rings
Figure 16.10 Extracting information at the sender site
16.19
16.2.5 Continued
Figure 16.11 Extracting information at the receiver site
16.20
16.2.6 PGP Packets
16.21
16.2.6 Continued
16.22
16-3 S/MIME
Another security service designed for electronic mail is
Secure/Multipurpose Internet Mail Extension
(S/MIME). The protocol is an enhancement of the
Multipurpose Internet Mail Extension (MIME) protocol.
16.24
16.3.1 S/MIME , continued
Figure 16.24 MIME header
16.25
16.3.1 S/MIME , continued
MIME-Version
This header defines the version of MIME used. The
current version is 1.1.
Content-Type
The content type and the content subtype are separated
by a slash. Depending on the subtype, the header may
contain other parameters.
16.26
16.3.1 S/MIME , continued
16.27
16.3.2 S/MIME
S/MIME adds some new content types to include security
services to the MIME. All of these new types include the
parameter “application/pkcs7-mime,” in which “pkcs”
defines “Public Key Cryptography Specification.”
16.29
16.3.2 Continued
Figure 16.28 Enveloped-data content type
16.30
16.3.2 Continued
16.31
16.3.2 Continued
Figure 16.30 Authenticated-data content type
16.32
16.3.2 Continued
Cryptographic Algorithms
S/MIME defines several cryptographic algorithms. The
term “must” means an absolute requirement; the term
“should” means recommendation.
16.33
16.3.2 Continued
Example 16.3
The following shows an example of an enveloped-data in which a
small message is encrypted using triple DES.
16.34