IS Unit-3
IS Unit-3
(AUTONOMOUS)
Accredited by NAAC & NBA (Under Tier - I) ISO 9001:2015 Certified Institution
Approved by AICTE, New Delhi. and Affiliated to JNTUK, Kakinada
L.B. REDDY NAGAR, MYLAVARAM, KRISHNA DIST., A.P.-521 230.
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
EMAIL PRIVACY
By
Mr. Ch. Srinivasa Rao
Assistant Professor
Dept.of CSE, LBRCE
Email Security
email is one of the most widely used and
regarded network services
currently message contents are not secure
may be inspected either in transit
or by suitably privileged users on destination
system
Email Security Enhancements
confidentiality
protection from disclosure
authentication
of sender of message
message integrity
protection from modification
non-repudiation of origin
protection from denial by sender
Pretty Good Privacy (PGP)
Encryption is performed by keys, but it’s important to square how keys and
algorithms/ciphers fit together.
The algorithm or cipher used is just that, it’s a sequence of steps that must be used
to encrypt the plaintext.
Depending on the cryptosystem, either the values within that algorithm, or the
value the algorithm arrives at itself, are the keys.
We’ll clarify that point in a minute, just think of it this way: the algorithms are the
general principles/rules used by a given cryptosystem, the keys are what actually
performs the function
Summary
have considered:
IPsec security framework
AH
ESP
key management & Oakley/ISAKMP
Cryptographic suites