Explain how can we achieved privacy in an e-mail system, Computer Network Security

Assignment Help:

 

Explain how can we achieved privacy in an e-mail system. 

The full form of PEM is Privacy Enhanced Mail:

PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted  by  Internet Architecture Board (JAB) to private secure electronic mail above the Internet. It was at first designed by the Internet Research Task Force, Privacy and the Security Research Group (PSRG). The   PEM   protocols   provide   for   authentication   message   integrity, the encryption,    and the key management.

PEM Documents are as follows:

The specification for the PEM comes from the following four documents,

™  Messages encryption and the authentication procedures.

™  Certificate-based key management procedure.

™  Algorithms modes and identifiers procedure.

™  Key certification and related services procedure.

Procedure for PEM Messages is given below:

PEM’s core is its message format. The below written format is necessary for PEM the messages.

™  Identifying the type of processing performed on the message that is the PEM messages should be in human readable form.

™  This can be done by using the PEM software. A PEM message is always signed and it is optionally encrypted.

™  Compute the message hash using either the MDI (denoted by “RSA-MD I “) or the MD 5

(Which would be denoted by the “RSA-MD5”)?

™  With the help of DES, encrypt concatenated message (that is hash and message) and encode this message with the base 64 coding and then transmit this message.

™  There are many key certifications  available such as PCA (Policy Certificate Authority), IPRA (Internet Policy Registration Authority). Each certificate has a unique number that includes an MD5 hash signed by the certificate authority’s private key.

 


Related Discussions:- Explain how can we achieved privacy in an e-mail system

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Why is this setup not secure, Question: a) You are using Active Directo...

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

Internet protocol(ip), Internet Protocol IP Gives computer-to-comp...

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

What is feedforward multilayer perceptron neural network, Question: (a)...

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

Analysis of the problem of cyber attack, Q. Analysis of the Problem of cybe...

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Why use an ids, WHY USE AN IDS? IDS prevent from problem behaviors by in...

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

Explain why spreadsheets are so useful, Question: Spreadsheet packages ...

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

Address resolution protocol (arp), ADDRESS RESOLUTION PROTOCOL (ARP) T...

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

What is the main security vulnerability of ipv4, Question: (a) What is...

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd