Explain how can we achieved privacy in an e-mail system, Computer Network Security

Assignment Help:

 

Explain how can we achieved privacy in an e-mail system. 

The full form of PEM is Privacy Enhanced Mail:

PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted  by  Internet Architecture Board (JAB) to private secure electronic mail above the Internet. It was at first designed by the Internet Research Task Force, Privacy and the Security Research Group (PSRG). The   PEM   protocols   provide   for   authentication   message   integrity, the encryption,    and the key management.

PEM Documents are as follows:

The specification for the PEM comes from the following four documents,

™  Messages encryption and the authentication procedures.

™  Certificate-based key management procedure.

™  Algorithms modes and identifiers procedure.

™  Key certification and related services procedure.

Procedure for PEM Messages is given below:

PEM’s core is its message format. The below written format is necessary for PEM the messages.

™  Identifying the type of processing performed on the message that is the PEM messages should be in human readable form.

™  This can be done by using the PEM software. A PEM message is always signed and it is optionally encrypted.

™  Compute the message hash using either the MDI (denoted by “RSA-MD I “) or the MD 5

(Which would be denoted by the “RSA-MD5”)?

™  With the help of DES, encrypt concatenated message (that is hash and message) and encode this message with the base 64 coding and then transmit this message.

™  There are many key certifications  available such as PCA (Policy Certificate Authority), IPRA (Internet Policy Registration Authority). Each certificate has a unique number that includes an MD5 hash signed by the certificate authority’s private key.

 


Related Discussions:- Explain how can we achieved privacy in an e-mail system

Tracing a route, There is another probing methods i-e Trace Route. To get m...

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

Keystroke-based access control model, Suppose you are working for one of th...

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Draw the waveform for an asynchronous transmission, QUESTION: (a) For ...

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Cipher methods-cryptography, Cipher Methods There are 2 methods of encry...

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

Explain how the framework will align to the model, MB Enterprise Systems Lt...

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Computer fundamentals, Ask You have been asked by a new client to assist i...

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

What are the ethical issues and implications, An injunction to 'think ethic...

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

Risk control strategies-risk management, Risk Control Strategies Once th...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd