Describe some of the common protocols used to secure e-mail.

What will be an ideal response?


Mail Extensions (MIME) that encode format by adding encryption and authentication via digital signatures based on public key cryptosystems. Privacy Enhanced Mail (PEM) has been proposed by the Internet Engineering Task Force (IETF) as a standard for public key cryptosystems. PEM uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. Pretty Good Privacy (PGP) was developed by Phil Zimmerman and uses the IDEA Cipher, a 128-bit symmetric key block encryption algorithm with 64-bit blocks for message encoding. Like PEM, it uses RSA for symmetric key exchange  and to support digital signatures. PGP does not use a centralized certificate authority; rather, it relies on a "web of trust" model to allow its users to share key information easily, albeit with some loss in the degree of control and trust in the key information. If user A has a trusting relationship with user B, and user B has a trusting relationship with user C, then user A is presumed to have a trusting relationship with user C and can therefore exchange encrypted information with user C.

Computer Science & Information Technology

You might also like to view...

Which of the following are typically found within the DMZ?

A) FTP servers B) Email servers C) Web servers D) All of the above

Computer Science & Information Technology

Future value is the amount of a loan after the first payment has been made

Indicate whether the statement is true or false

Computer Science & Information Technology

Unlike previous versions, Windows 8 has no Start button

Indicate whether the statement is true or false

Computer Science & Information Technology

Pressing the ________ key(s) demotes an item in an outline

Fill in the blank(s) with correct word

Computer Science & Information Technology