Explain how can we achieved privacy in an e-mail system, Computer Network Security

 

Explain how can we achieved privacy in an e-mail system. 

The full form of PEM is Privacy Enhanced Mail:

PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted  by  Internet Architecture Board (JAB) to private secure electronic mail above the Internet. It was at first designed by the Internet Research Task Force, Privacy and the Security Research Group (PSRG). The   PEM   protocols   provide   for   authentication   message   integrity, the encryption,    and the key management.

PEM Documents are as follows:

The specification for the PEM comes from the following four documents,

™  Messages encryption and the authentication procedures.

™  Certificate-based key management procedure.

™  Algorithms modes and identifiers procedure.

™  Key certification and related services procedure.

Procedure for PEM Messages is given below:

PEM’s core is its message format. The below written format is necessary for PEM the messages.

™  Identifying the type of processing performed on the message that is the PEM messages should be in human readable form.

™  This can be done by using the PEM software. A PEM message is always signed and it is optionally encrypted.

™  Compute the message hash using either the MDI (denoted by “RSA-MD I “) or the MD 5

(Which would be denoted by the “RSA-MD5”)?

™  With the help of DES, encrypt concatenated message (that is hash and message) and encode this message with the base 64 coding and then transmit this message.

™  There are many key certifications  available such as PCA (Policy Certificate Authority), IPRA (Internet Policy Registration Authority). Each certificate has a unique number that includes an MD5 hash signed by the certificate authority’s private key.

 

Posted Date: 7/20/2012 5:48:00 AM | Location : United States







Related Discussions:- Explain how can we achieved privacy in an e-mail system, Assignment Help, Ask Question on Explain how can we achieved privacy in an e-mail system, Get Answer, Expert's Help, Explain how can we achieved privacy in an e-mail system Discussions

Write discussion on Explain how can we achieved privacy in an e-mail system
Your posts are moderated
Related Questions
Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ