Application Flashcards
SMTP (Simple Mail Transfer Protocol)
used for fowarding email messages
POP (Post OFfice Protocol)
contacting your email service and downloading all of your new messages from it.
IMAP (Internet Message Access Protocol)
allows you to access your email wherever you are, from any device.
Process of One to Multiple Email
message generates a symmetric key and encrypts with all recipients public keys
when received the recipients extract the symmetric key and decrypt the message with symmetric key
Process of One to One Email
Sender sends email to local MTA
MTA forwards email to another MTA
Receiver receives email
Process of One to Distribution List Email
Exploder Server has public-private keys for every list
symmetric key is generated and email encrypted with exploder server public key
Email sent to Exploder server
Exploder decrypts using private key and obtains symmetric key
Exploder encrypts symmetric key with members public key
Exploder forwards message and symmetric key to recipients
Symmetric Cryptosystem
Plaintext -> Recipient's public key (Encryption) -> Ciphertext -> Recipient's Private Key (Decryption) -> Original Plaintext
Asymmetric Cryptosystem
□ Plaintext ->
Encryption key -> Ciphertext ->
Decryption key -> Original Plaintext
Digital Signature
technique used to validate authenticity and integrity of message/digital doc
Digital Certificate
electronic document that binds together a public-key with an identity and can be used to verify that a public key belongs to a particular person or entity
Digital Certificate process
Bob sends his public key to Vera (Certificate Signing Request) (.csr)
Vera verifies that Bob “is who he says he is”
Vera “digitally signs” and returns it to Bob (SSL/TLS Certificate) (.crt)
PGP (Pretty Good Privacy)
De-facto standard email encryption scheme for providing security services for email communication
which of CIA does PGP have
Confidentiality and Integrity
Security mechanism and components of PGP?
Hashing, Encryption, Compression, Formatting
S/MIME
secure email standard
good option for security of non text content
centralized authority