M-Switch Encryption
The M-Switch Encryption option enables message encryption/decryption using S/MIME for SMTP messages and STANAG 4406 Encryption for X.400 messages.
M-Switch provides an encryption option which enables message encryption and decryption capabilities (using S/MIME for SMTP messages and STANAG 4406 Encryption for X.400 messages).
Server-to-Server Operation
The simplest way to deploy M-Switch servers with the Encryption add-on is in a pair-wise configuration, where messages are encrypted by one server and then decrypted by its peer. This provides a setup where messages between a pair of MTAs, possibly with other MTAs in between that switch the encrypted messages, support end points that do not encrypt messages.
There are several situations where this approach may be reasonable, such as:
- Two organizations run messaging locally without the use of encryption, which may be for technical reasons (e.g., components that do not support encryption) or for policy reasons (e.g., to not encrypt data in a secure local environment). M-Switch Encryption enables messages to be encrypted when they are transferred between organizations, thus providing protection.
- Support for email clients that do not provide encryption. Typically, local protection, such as use of TLS, can provide security to and from the client, and then M-Switch Encryption can provide server-to-server protection.
Server to Client Operation
M-Switch servers with the Encryption add-on can also be used in an asymmetrical configuration, as shown below. As with the symmetric configuration, one side of the system is unencrypted. However, on the encrypted side, encryption is handled at the client level. This might be used to support a mix of organizations where some use client encryption and others do not.
When it receives an encrypted message from a client, the M-Switch Encryption add-on will need to decrypt it. An encrypted message will be encrypted for several recipients, using the public key of that recipient. This means that the sender needs to encrypt the message for the specific instance of the encryption-equipped server. This is often achieved by the user copying the gateway, which is a practical, although not entirely desirable approach.
When encrypting a message for an end client, the M-Switch server will need the public key for that user. It obtains this key by looking up a local database based on the recipient’s address. This database can be manually populated or automatically by caching a certificate, from when that user has sent a signed message.
M-Switch Encryption supports two types of message encryption, both of which are based on the use of the Cryptographic Message Syntax (CMS) open standard specified in RFC 5652.
The first is S/MIME encryption (RFC 5751) for use with SMTP-based messaging. This uses CMS enveloped data, which is the encryption approach used in widely deployed S/MIME clients.
The second type is STANAG 4406 encryption for use with STANAG 4406 military messaging. This uses a technique called “triple wrap”, where there are three layers:
- An inner CMS layer which has message signatures and security labels.
- An enveloped data CMS layer which provides the encryption.
- An outer CMS layer which has message signatures and security labels.
Signature capabilities are provided in all products in the M-Switch family. M-Switch Encryption adds the encryption layer. Where triple wrap is used, M-Switch Encryption can add and remove all three layers. It can also add encryption only (no signature layers) and can add encryption and signature layers to a signed message.
Configuration options allow for the encryption of all messages or the encryption of messages on a selective basis. Decryption is always performed if a suitable private key is available. M-Switch Encryption supports the following CMS Capabilities and Algorithms:
|
Key Encryption
|
Key TransportKey Agreement
|
|---|---|
|
Content Encryption Algorithms
|
AES-128-CBC
|
|
Key Transport Algorithms
|
RSA Encryption
|
|
Key Agreement Algorithms
|
Ephemeral Static Diffie-HellmanElliptic Curve Diffie-Hellman
|
|
Key Wrap Algorithms
|
AES-128 Key Wrap
|
The M-Switch Encryption add-on complies with the following Open Standards:
|
STANAG 4406 Edition 2: Annex B
|
Military Message Handling System, Annex B: Interoperability of Secure MMHS, March 2005
|
|---|---|
|
STANAG 4631
|
Profile for the use of Cryptographic Message Syntax (CMS) and Enhanced Security Services (ESS) for S/MIME
|
|
FIPS PUB 140-2
|
Security Requirements for Cryptographic Modules. NIST, July 2007
|
|
Diffie-Hellman Key Agreement Method. E. Rescorla, June 1999
|
|
|
Triple-DES and RC2 Key Wrapping, R. Housley, December 2001
|
|
|
Cryptographic Message Syntax (CMS) Algorithms. R. Housley, August 2002
|
|
|
Advanced Encryption Standard (AES) Key Wrap Algorithm. J.Schaad, R. Housley, September 2002
|
|
|
Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS), J. Schadd, July 2003
|
|
|
Securing X.400 Content with Secure/Multipurpose Internet Mail Extensions (S/MIME), P. Hoffman, C. Bonatti, A. Eggen, July 2004
|
|
|
Transporting Secure/Multipurpose Internet Mail Extensions (S/MIME) Objects in X.400. P. Hoffman, C. Bonatti, July 2004
|
|
|
Cryptographic Message Syntax (CMS). R. Housley, September 2009
|
|
|
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification. B. Ramsdell, January 2010
|
|
|
Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS). S. Turner, D. Brown; January 2010
|
Ready to request an Evaluation?
Thankyou for considering Isode’s software products. To request an evaluation, please select the product(s) you are interested in, then fill out the enquiry form.
Select your Evaluation products:
Customer Portal
For access to our customer portal please login below.
If you are having trouble accessing the portal, please contact our support team who will be happy to help.
Need help with your account? Contact us