Documente Academic
Documente Profesional
Documente Cultură
Application layer:
In this layer consist of three services
confidentiality , authentication , integrity.
• Transport layer:
In transport layer security services provided with
help of transport protocol.
• Network layer:
security is provided at the network layer on a host –
host basis.
• Link layer:
when security is provided on a link basis , then the
data in all frames travelling over the link receive the security
services.
Secure E-mail
m Ks(.)
Ks(.) m
+ intern
et -
kB-
ks kB+ Kb+(.) (.)
(.)
Using hash function & digital
signature
m Ks(.) ka Ks(.)
com
+ internet pare
-
kB-
(.)
PGP (PRETTY GOOD PRIVACY):
PGP is an e-mail encryption scheme that has become a de
facto standard.
Versions of PGP are available in public domain, and then
PGP versions are PGPI 2004,zimmermann 2004.
Depending on the version PGP software uses MD5 or SHA
for calculating the message digest.
Sum of the symmetric key encryptions are CAST, triple-
DES, or IDEA.
In addition PGP provides data compression.
When PGP installed ,the software creates a public key pair
for the user..
PGP also provide a mechanism for public key certification.
m H(.) Ka^-(.)
+ Ks(.)
- interne
t
Kb^+
(.)
2.authentication
3.key distribution
4.message integrity
5.digital signature.
Secure sockets layer(SSL)
Bob extract
Alice’s
public key
Bob
generates a
random
symmetric Alice extract
key and the symmetric
encrypts it key
using
Limitations of SSL