20CS17 – INFORMATION SECURITY
LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING (AUTONOMOUS) Accredited by NAAC & NBA (Under Tier - I) ISO 9001:2015 Certified Institution Approved by AICTE, New Delhi. and Affiliated to JNTUK, Kakinada L.B. REDDY NAGAR, MYLAVARAM, KRISHNA DIST., A.P.-521 230. DEPARTMENT OF INFORMATION TECHNOLOGY |
EMAIL PRIVACY
Program & Semester: B.Tech & VI SEM
Section: CSE-C
Academic Year: 2023 - 22
By
Mr. M. Vijay Kumar
Sr Assistant Professor
Dept.of IT, LBRCE
Email Security
Email Security Enhancements
Pretty Good Privacy (PGP)
PGP Operation – Authentication
PGP Operation – Confidentiality
PGP Operation – Confidentiality & Authentication
PGP Operation – Compression
PGP Operation – Email Compatibility
PGP Operation – Summary
PGP Session Keys
PGP Public & Private Keys
PGP Message Format
PGP Key Rings
Key terms
PGP Message Generation
PGP Message Reception
PGP Key Management
Example
S/MIME (Secure/Multipurpose Internet Mail Extensions)
S/MIME Functions
S/MIME Cryptographic Algorithms
S/MIME Messages
S/MIME Certificate Processing
Certificate Authorities
Class Identity Checks Usage
1 name/email check web browsing/email
2 + enroll/addr check email, subs, s/w validate
3 + ID documents e-banking/service access
IP Security
IPsec
IPsec Uses
Benefits of IPsec
IP Security Architecture
IPsec Services
Security Associations
Authentication Header (AH)
Authentication Header
Transport & Tunnel Modes
Encapsulating Security Payload (ESP)
Encapsulating Security Payload
Transport vs Tunnel Mode ESP
Combining Security Associations
Combining Security Associations
Key Management
Oakley
ISAKMP
ISAKMP
ISAKMP Payloads & Exchanges
What are encryption ciphers? And what are cipher suites?
Cipher suites
- who used it to communicate with his generals during military operations.
Cipher suites
Cipher suites…
����Keys vs. Algorithms
Summary