Explain how can we achieved privacy in an e-mail system, Computer Network Security

Assignment Help:

 

Explain how can we achieved privacy in an e-mail system. 

The full form of PEM is Privacy Enhanced Mail:

PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted  by  Internet Architecture Board (JAB) to private secure electronic mail above the Internet. It was at first designed by the Internet Research Task Force, Privacy and the Security Research Group (PSRG). The   PEM   protocols   provide   for   authentication   message   integrity, the encryption,    and the key management.

PEM Documents are as follows:

The specification for the PEM comes from the following four documents,

™  Messages encryption and the authentication procedures.

™  Certificate-based key management procedure.

™  Algorithms modes and identifiers procedure.

™  Key certification and related services procedure.

Procedure for PEM Messages is given below:

PEM’s core is its message format. The below written format is necessary for PEM the messages.

™  Identifying the type of processing performed on the message that is the PEM messages should be in human readable form.

™  This can be done by using the PEM software. A PEM message is always signed and it is optionally encrypted.

™  Compute the message hash using either the MDI (denoted by “RSA-MD I “) or the MD 5

(Which would be denoted by the “RSA-MD5”)?

™  With the help of DES, encrypt concatenated message (that is hash and message) and encode this message with the base 64 coding and then transmit this message.

™  There are many key certifications  available such as PCA (Policy Certificate Authority), IPRA (Internet Policy Registration Authority). Each certificate has a unique number that includes an MD5 hash signed by the certificate authority’s private key.

 


Related Discussions:- Explain how can we achieved privacy in an e-mail system

Explain the random key distribution, Q. Explain the random key distribution...

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Legal, LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities an...

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

Limitations of ethical dilemma, The best results obtained in the PIIT class...

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

It service support within the itil framework, Problem (a) IT Service Suppo...

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Draw a suitable physical network diagram, Question a) From the capture ...

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Address resolution with closed-form computation, ADDRESS RESOLUTION WITH CL...

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

Intrusion detection and classification, i want to detec and classify networ...

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd