E-Mail Security
Jon Callas, PGP Corporation
Internal and Internet E-Mail Compared
Overview of Standard Protocols
Overview of Proprietary E-Mail Systems
Postcards versus Letters versus E-Mail
Transport and Message Security
Digital Signatures and Meaning
Encryption and Signing Options
Relevant Encryption Mechanisms
Notes on Cryptographic Strength
Certificates, Trust, and Fine Differences
Comparisons Between OpenPGP and S/MIME
The MARID Protocols for Authenticity
The MASS Protocols for Authenticity
How MARID and MASS Work Together
INTRODUCTION
Electronic mail, commonly called e-mail, is the most widely used form of communication today, surpassing even telephone calls. Yet very few of those messages are sent using any security mechanisms whatsoever. This chapterdescribes e-mail systems, e-mail security, and how they are used.
Internal and Internet E-Mail Compared
E-mail grew in two separate paths, with systems designed for the Internet and with systems designed for communications within an organization. With the rise of the Internet, the internal systems were adapted for Internet use, as this became the best mechanism for people in one organization to send messages ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.