Chapter 3 Cryptography P3
Chapter 3 Cryptography P3
Chapter 3 Cryptography P3
Chapter 3
Asymmetric key algorithms (cont’d.)
SSL/TLS-
-combining
digital certificates for authentication with public key data
encryption
Over TCP /IP connection.
SSL/TLS Server driven –web browswer
Support SSL or TLS
OSI MODEL
E-mail security protocols
A number of encryption cryptosystems have been adapted in an
attempt to inject some degree of security into e-mail, a
notoriously unsecured medium.
S/MIME builds on the Multipurpose Internet Mail Extensions
(MIME) encoding format by adding encryption and
authentication through digital signatures based on public key
cryptosystems.
How Digital Certificates Are Used for
Digital Signatures
Digital certificates and digital signing of an e-mail
message
How Digital Certificates Are Used for
Digital Signatures
Digital certificates and verifying a digital signature of
an e-mail message
How Digital Certificates Are Used for
Message Encryption
Digital certificates and encryption of an e-mail
message
Digital certificates and decrypting a an e-mail message
How Digital Certificates Are Used for Digital
Signatures and Message Encryption
Digital certificates and digitally signing and encrypting
of an e-mail message
Digital certificates and decrypting an e-
mail message and verifying a digital
signature
E-mail security protocols (cont’d.)