SlideShare uma empresa Scribd logo
1 de 18
Email Security
Need of an hour 
Email Security
• Email security is dealing with issues of unauthorized access
and inspection of electronic mail. This unauthorized access
can happen while an email is in transit, as well as when it is
stored on email servers.
• Email has to go from many untrusted servers to reach to its
destination and one can intercept or modify it to harm the
sender or to make some profit.
CIA for Email (Yeah! Again CIA )
• Confidentiality: Email should be only viewed by the person it
is intended to.
• Integrity: Original content should be received by the receiver.
• Availability: Receiver should be able to access the mail any
time he requires.
Steps to secure our Emails
Security at sender’s side
Security at Receiver’s side
Secure transmission of emails
Security at sender’s side
 Can be implemented by non-technical person
 Use incognito mode while sending mails
 Avoid using public computers
Security at receiver’s side
 Avoid downloading attachments from unknown
sender’s
Check Email Headers to verify identity of sender
Secure Transmission of Emails
 PGP (Pretty Good Privacy)
 S/MIME
(Secure/Multipurpose Internet Mail Extension)
PGP
 Pretty Good Privacy
 PGP provides a confidentiality and authentication service
that can be used for electronic mail and file storage
applications.
 Available free worldwide
 Based on extremely secure algorithm
 Not developed by governmental organization
PGP: Services
Authentication
Confidentiality
Compression
Email Compatibility
Segmentation
PGP: Authentication
Encrypted Data is sent to the destination
PGP: Confidentiality
PGP: Compression
• Compresses the data before encrypting
• Compression is done after signing (Locking with session key)
• Use ZIP Compression Algorithm
PGP: Email Compatibility
• Binary Data is obtained after applying PGP
• Converted to ASCII to able to send it over mail
• Uses Radix64 Algorithm for conversion
NOTE: PGP divides big emails in smaller sizes just
before sending. (Segmentation)
S/MIME
 Secure / Multipurpose Internet Mail Extensions
 S/MIME is standard for exchanging secure mails with the
help of encryption
 Previously, Mails were supposed to carry text only
 S/MIME provides support for varying content
 Supported by major email programs like Outlook, Netscape
S/MIME: Signed Mail
Image copied from internet (Not the complete PPT :P)
S/MIME: Encrypted Mail
Image copied from internet (Not the complete PPT :P)
S/MIME: Functions
 Enveloped Data : Encrypted content and Associated keys
 Signed Data : Encoded message + Signed digest
 Clear-signed data : Clear text message + Encoded signed
digest
 Signed & Enveloped Data : Nesting of signed & encrypted
entities
Thank You 
This was
all
about
Mail
Security!
Rohit TeenaSampurnaUtkarshaPriyanka

Mais conteúdo relacionado

Mais procurados

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
 

Mais procurados (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Web Security
Web SecurityWeb Security
Web Security
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Cryptography
CryptographyCryptography
Cryptography
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Semelhante a Email Security : PGP & SMIME

BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
limsh
 
Netwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of wwwNetwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of www
pratamakiki860
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
jayaprasanna10
 

Semelhante a Email Security : PGP & SMIME (20)

1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
Email sec11
Email sec11Email sec11
Email sec11
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
ch15 (1).ppt
ch15 (1).pptch15 (1).ppt
ch15 (1).ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 
Pgp
PgpPgp
Pgp
 
Network security
Network securityNetwork security
Network security
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
CNS ppt.pdf
CNS ppt.pdfCNS ppt.pdf
CNS ppt.pdf
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 
Netwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of wwwNetwok & Email Security.pptx is a large of www
Netwok & Email Security.pptx is a large of www
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Email Security : PGP & SMIME

  • 2. Email Security • Email security is dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers. • Email has to go from many untrusted servers to reach to its destination and one can intercept or modify it to harm the sender or to make some profit.
  • 3. CIA for Email (Yeah! Again CIA ) • Confidentiality: Email should be only viewed by the person it is intended to. • Integrity: Original content should be received by the receiver. • Availability: Receiver should be able to access the mail any time he requires.
  • 4. Steps to secure our Emails Security at sender’s side Security at Receiver’s side Secure transmission of emails
  • 5. Security at sender’s side  Can be implemented by non-technical person  Use incognito mode while sending mails  Avoid using public computers
  • 6. Security at receiver’s side  Avoid downloading attachments from unknown sender’s Check Email Headers to verify identity of sender
  • 7. Secure Transmission of Emails  PGP (Pretty Good Privacy)  S/MIME (Secure/Multipurpose Internet Mail Extension)
  • 8. PGP  Pretty Good Privacy  PGP provides a confidentiality and authentication service that can be used for electronic mail and file storage applications.  Available free worldwide  Based on extremely secure algorithm  Not developed by governmental organization
  • 10. PGP: Authentication Encrypted Data is sent to the destination
  • 12. PGP: Compression • Compresses the data before encrypting • Compression is done after signing (Locking with session key) • Use ZIP Compression Algorithm
  • 13. PGP: Email Compatibility • Binary Data is obtained after applying PGP • Converted to ASCII to able to send it over mail • Uses Radix64 Algorithm for conversion NOTE: PGP divides big emails in smaller sizes just before sending. (Segmentation)
  • 14. S/MIME  Secure / Multipurpose Internet Mail Extensions  S/MIME is standard for exchanging secure mails with the help of encryption  Previously, Mails were supposed to carry text only  S/MIME provides support for varying content  Supported by major email programs like Outlook, Netscape
  • 15. S/MIME: Signed Mail Image copied from internet (Not the complete PPT :P)
  • 16. S/MIME: Encrypted Mail Image copied from internet (Not the complete PPT :P)
  • 17. S/MIME: Functions  Enveloped Data : Encrypted content and Associated keys  Signed Data : Encoded message + Signed digest  Clear-signed data : Clear text message + Encoded signed digest  Signed & Enveloped Data : Nesting of signed & encrypted entities
  • 18. Thank You  This was all about Mail Security! Rohit TeenaSampurnaUtkarshaPriyanka

Notas do Editor

  1. first version developed by Phil Zimmermann