A public key certification hierarchy for PEM is being established by the Internet Society. Public key management in PEM is based on the use of certificates as defined by the CCITT Directory Authentication Framework. Although the RFCs permit the use of either symmetric or asym-metric (public key) cryptography (for instance, the RSA cryptosys-tem) to distribute symmetric keys, the RFCs strongly recommend the use of asymmetric cryptography for this purpose and to gen-erate and validate digital signatures for messages and certifi-cates. example, the Data Encryption Standard (DES), to provide (optional) encryption of messages. PEM is compatible with RFC 822 message processing con-ventions and is transparent to SMTP mail relays. These combine to provide users with a facility in which message confidentiality, authenticity, and integrity can be ef-fected. Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastruc-ture. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mail and web service. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. Web service is defined as "a software system designed to support interoperable machine-to-machine interaction over a network" and e-mail is "communicate electronically on the computer". Using a personal email certificate one can digitally sign an email so that recipients can verify that it's really from the sender as well as encrypt the messages so that only the intended recipients can view it. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. When a password is put into clear text on a wire, it can easily be intercepted. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). ![]() Every time one checks his/her e-mail, the password is being sent over the wire. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. ![]() Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |