Rights Management and Encryption Part 2: Secure Multipurpose Internet Mail Extension
6 hours 59 minutes
Welcome back sideburns to the M s. 3. 65 Security Administration. Course.
I'm your senator, Jim Daniels.
And we're a module for in this for 65 for protection
rights management in encryption
secure, multipurpose Internet Mel extension
in this lesson.
Unlike the mind Bulow, we're gonna ask you listen
and learn how s mime and email signatures are applied within M s 3. 65.
We have a little bit of fun. This wasn't
so Here are two examples of secure minds.
In the first example, we see that there are two minds that air in a Well, it's like a old school prison like a cell.
And the other one,
they're actually in a
invisible sale, one of them trying to push out and the other is riding on the invisible bars.
So secure mine.
Here we go. This is two examples.
Let's look at some famous duos.
Famous duos. We have Wayne and Garth.
We have Barton, Ernie PB and J went Millie. We have the nilly Mario E. G went Woody and Buzz Lightyear, Beavis and Butthead. Who can forget them? Right?
the most famous duo of all
is the old do of digital signatures, plus a message encryption.
I guarantee you, when you sat down to watch his video, you have zero clue
that Beavis and Butthead and digital signatures a message encryption. We're gonna be in the same sentence.
Digital signatures provide
non repudiation and data integrity.
Message encryption provides confidentiality
and data integrity.
Again. Message encryption does not provide authentication.
Confidentiality? Yes, but authentication no
s mime is based on using certificates that worked with a product key and public key.
If you sign a message with a product key, you can only be validated by using the public key.
Somebody encrypts a message with the public key. It can only be decrypted with the private key.
Let's look at the digital signatures with That's fine
Again, they provide several capabilities
non repudiation and that ends agree
and a signature works by allowing the recipient to know the message was sent by the personal organization and claims to have sent the message.
It is authentically from that person or that organization.
The uniqueness of a signature prevents the owner of a signature from disowning the signature
that's called non repudiation.
You can't say Hey, it wasn't me,
right? Non repudiation.
If you have kids
that make a mess,
those kids blame it on the other one, right? So how it works,
so there's no non repudiation in that situation. However,
if one kid had fingerprints all over
or you had your camera, that will provide non repudiation because, you know kid number two days.
Data integrity is a result of specific operations that make digital signatures possible.
Although digital signatures provide that integrity,
they do not provide confidentiality
to apply digital signature.
It works by performing a signing operation on the text of the email message when the messages sent
and verifying that operation when it's red.
So the center sounds a message message sent. Recipient
has a sign. Message verified. There you go,
one under the hood.
The message. Bodies captured. The hash is calculated.
The centers private keys retrieved. The hash value is in Krivda with the centers product key
and crypto hash Value is appended to the message, and the message is set.
So that's what happens when a signature is applied. So the receiver gets all of that information.
When they're recipient opens
that message verification is performed.
So again, the message received.
Encrypted hash is retrieved,
the bodies retrieved.
The hash has calculated the public he's retrieved
in crypto hash is decrypt it with the senders. Public key
decrypt a hash is compared with a calculator. Hash
The signature is verified.
If somebody intercepts it,
it changes the thumbprint of the message. If they tamper with it, it changes the thumbprint
so the validation will fill.
Encryption is a way to change the content so it cannot be read or understood until it's changed back
to a readable and understandable for
message. Encryption provides to services,
confidentiality and data integrity.
The message isn't credited by utilizing recipients public. He
available to everyone because it's public,
says it right in the name public.
Thus, message encryption does not provide off indication,
and it does not provide repudiation.
Message Encryption makes the content unreadable. Performance encryption operation When it set.
So the center
encrypts the message
sends it, and recipient must decrypt a message.
The way this works,
the bodies captured
the public he's retrieved.
The one time session key is generated. The message body is encrypted with that session. Key
concession keys encrypted with the recipients public he
session keys added to the encrypted message the message sent.
So then, when the recipient guessing and they decrypt it,
give the message. In
the creative message. Body and session key are retrieved.
The product key is retrieved from the recipient.
The session keys decrypted with the recipients. Private Key.
The message body is decrypted with a decrypted session key,
and then the decrypted messages returned to the recipient
Digital State in Terms and Message encryption are not mutually exclusive.
The two services are designed to be used in conjunction with each other
because each sigh separately. Address is one side of the sender recipient relationship.
Triple wrap messages.
One of my favorite things Air triple wrapped.
The Triple wrap Trump's Supreme
look at that. I mean, it's just beefy and cheesy and
crunchy and melty.
If you're for Taco Bell and you're looking for sponsorships or something since something to me since something that's library like hookers up, I mean, look, you're right there in the video. You're in a cyber security video talking about right there.
I want the enhancements of the latest s mind. Version three
is known as Triple wrapping,
a triple ramp as my message is one that sign
encrypted and assigned again.
Extra layer of encryption provides an additional layer of security
when users sign and encrypt messages with that look on the Web using s mind the messages automatically triple wrapped
If you're not too hungry from thinking about a triple wrap
from Taco Bill
seeking an answer, this message encryption provides wish specific security services.
Choose all that apply
data integrity, non repudiation,
confidentiality and secrecy.
Which of those services
are provided with messages Different that integrity, confidentiality or provided with message Encryption authenticity. Non repudiation or not,
secrecy is just 30 off, so you should have automatically tell secrecy out.
So to recap, today's lesson
S mime is based on using certificates that work with that private and public key.
Encryption is a way to change the content so it cannot be read or understood
until it's changed back into its readable and understandable form.
Message encryption provides to security services, confidentiality and that integrity.
Hopefully, you are in a little bit about s mime When this lesson
Thank you. I hope you see you for the next one. Take care