Explain how can we achieved privacy in an e-mail system, Computer Network Security

Assignment Help:

 

Explain how can we achieved privacy in an e-mail system. 

The full form of PEM is Privacy Enhanced Mail:

PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted  by  Internet Architecture Board (JAB) to private secure electronic mail above the Internet. It was at first designed by the Internet Research Task Force, Privacy and the Security Research Group (PSRG). The   PEM   protocols   provide   for   authentication   message   integrity, the encryption,    and the key management.

PEM Documents are as follows:

The specification for the PEM comes from the following four documents,

™  Messages encryption and the authentication procedures.

™  Certificate-based key management procedure.

™  Algorithms modes and identifiers procedure.

™  Key certification and related services procedure.

Procedure for PEM Messages is given below:

PEM’s core is its message format. The below written format is necessary for PEM the messages.

™  Identifying the type of processing performed on the message that is the PEM messages should be in human readable form.

™  This can be done by using the PEM software. A PEM message is always signed and it is optionally encrypted.

™  Compute the message hash using either the MDI (denoted by “RSA-MD I “) or the MD 5

(Which would be denoted by the “RSA-MD5”)?

™  With the help of DES, encrypt concatenated message (that is hash and message) and encode this message with the base 64 coding and then transmit this message.

™  There are many key certifications  available such as PCA (Policy Certificate Authority), IPRA (Internet Policy Registration Authority). Each certificate has a unique number that includes an MD5 hash signed by the certificate authority’s private key.

 


Related Discussions:- Explain how can we achieved privacy in an e-mail system

Explain the purpose of the dr and bdr, QUESTION a) Compare and contras...

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Parsing ipv6 headers, PARSING IPv6 HEADERS Base header is fixed in siz...

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Social network development in java , Social Network development in Java: ...

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Categories of controls-risk management, Categories of Controls Controlli...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

define broadcast, In broadcast topology there are further two types 1) ...

In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o

Fuckkkkk, Ask question #Minimum.. 100 words accepted#

Ask question #Minimum.. 100 words accepted#

How does tcp perform the functions, Problem: (a) Assume that a new ap...

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd