To provide these services, S/MIME uses the X.509v3 format for digital certificates, along with various encryption algorithms. Non-repudiation actions, for example, require a public-key algorithm, while privacy and data security need a fast and efficient symmetric encryption algorithm.
RFC 3370 identifies the algorithms that all S/MIME version 3 software must support. These are Secure Hash Algorithm 1 (SHA-1) and Message Digest-5 (MD5) for hashing, Digital Signature Algorithm (DSA) and RSA for signatures, and RC2 and triple Data Encryption Standard (3DES) for message encryption. The requirements ensure a base level of interoperability among all S/MIME implementations. Email clients, however, can add additional algorithms, provided they correctly identify which algorithms a particular message uses.
The United States government no longer restricts encryption strength, and the default encryption algorithm in Outlook, Outlook Web Access and most email clients is 3DES. Although it is slower than the original DES, the triple Data Encryption Standard is more secure. When Microsoft Outlook runs on a 40-bit operating system that does not have 128-bit encryption capabilities, it uses the RC2 algorithm by default.
Depending on the email client you use, it can be tricky to change this default setting. The figure below shows the security properties that you can set in Outlook Express 6, which include the encryption algorithm. In Outlook 2003's online help feature, there is no mention of how to change the algorithm. However, there is no particular reason to need to change this setting.
Figure 1: Outlook Express 6 Security Settings
Dig Deeper on PKI and Digital Certificates
Related Q&A from Michael Cobb
What is BGP hijacking or IP hijacking and how do cybercriminals pull off the attacks? Expert Michael Cobb explains how enterprises can mitigate these...continue reading
Is the Dell eDellRoot security threat a serious problem and, if so, can it be prevented with self-signed root certificate authorities? Expert Michael...continue reading
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.