You are on page 1of 17

Security services in following layer

 Application layer:
In this layer consist of three services
confidentiality , authentication , integrity.
• Transport layer:
In transport layer security services provided with
help of transport protocol.
• Network layer:
security is provided at the network layer on a host –
host basis.
• Link layer:
when security is provided on a link basis , then the
data in all frames travelling over the link receive the security
Secure E-mail

 Here first we create high – level design of secure e-

mail system.
 Before designing a secure e-mail system we should
consider which security feature most desirable for
 Following feature are used in secure e-mail system
2.sender authentication
3.message integrity.
Mr. A uses symmetric session key, to
send a secret e-mail to Mr. B

m Ks(.)
Ks(.) m

+ intern
et -

ks kB+ Kb+(.) (.)
Using hash function & digital

m Ks(.) ka Ks(.)

+ internet pare

 PGP is an e-mail encryption scheme that has become a de
facto standard.
 Versions of PGP are available in public domain, and then
PGP versions are PGPI 2004,zimmermann 2004.
 Depending on the version PGP software uses MD5 or SHA
for calculating the message digest.
 Sum of the symmetric key encryptions are CAST, triple-
 In addition PGP provides data compression.
 When PGP installed ,the software creates a public key pair
for the user..
 PGP also provide a mechanism for public key certification.
m H(.) Ka^-(.)

+ Ks(.)

- interne


cryptography , a hash function,

uses symmetric key cryptography , public key

Features of SSL
 SSL server authentication:
In this case allowing user
to confirm a server identity.
• An SSL – enabled browser maintain list of trusted
certification authorities (CAs) with public key of
• This feature allows the browser to authenticate the
server before the user submits a payment card
• SSL client authentication:
It allowing a server to
confirm a user’s identity .
 Encrypted SSL:
information send between
browser and server.

* Its encrypted by sending software and

decrypted by receiving software.
Secure sockets layer(SSL) and Transport
layer security(TLS)
 Various mechanisms of SSL & TLS:-


3.key distribution

4.message integrity signature.
Secure sockets layer(SSL)

 SSL developed by Netscape in 1994.

 This protocol design to provide data encryption &
 The protocol begins with handshake phase that
indicates an encryption algorithm..
 Once handshake is completed then all the data will be
encrypted with help of session key.
 Applications:
* internet commerce , browsers and web
Working of SSL

 The browser and server run the handshake

protocol which
(1)authenticates the server
(2)generates a shared symmetric key.

* These tasks make use of RSA public key

Steps for SSL handshake

 The browser sends the server browser’s SSL

version number & cryptographic preference

 The server sends the browser the server’s

SSL version , cryptographic preference and
it’s certificate.

 The browser has a list of trusted CAs and a

public key for each CA on the list.
 The browser generates a symmetric
key & encrypts with server public
key &sends to the server.
 The browser sends a informing
message to the server ..
 The server sends a informing
message to the browser..
 The SSL handshake is complete and
then the data will be encrypt
&decrypt with help of session key.
High – level overview of the handshake
phase of SSL
Bob browse Alice sends Bob
Alice’s secure her certificate

Bob extract
public key

generates a
symmetric Alice extract
key and the symmetric
encrypts it key
Limitations of SSL

 SSL was not specifically created for payment

card transaction .

 Client authorization is one of the limitations of

Thank you