Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

4.5.3. Post-Quantum Cryptography and Emerging Threats

💡 First Principle: Cryptographic algorithms are building blocks — they are never deployed raw in production. TLS, IPsec, and S/MIME are the protocols that combine these building blocks into practical solutions for specific communication security problems. Understanding which protocol solves which problem, and at which network layer, is directly tested.

TLS (Transport Layer Security):

Protects application layer communications — HTTP (HTTPS), SMTP, IMAP, database connections. Operates at the transport layer (Layer 4), transparently wrapping application layer protocols.

VersionStatusNotes
SSL 2.0 / 3.0❌ ProhibitedMultiple critical vulnerabilities; deprecated 2015 (RFC 7568)
TLS 1.0❌ DeprecatedPOODLE, BEAST vulnerabilities; deprecated 2021 (RFC 8996)
TLS 1.1❌ DeprecatedSame as above; deprecated 2021
TLS 1.2✅ AcceptableStill widely deployed; cipher suite selection critical; DHE/ECDHE required for forward secrecy
TLS 1.3✅ Required for new deploymentsRemoved weak cipher suites; mandates forward secrecy; faster handshake; preferred

TLS 1.3 improvements: Removed RSA key exchange (no forward secrecy), RC4, DES, 3DES, MD5, SHA-1 from cipher suites. Reduced handshake from 2 round trips to 1 (0-RTT for resumption, with replay attack caveats). All cipher suites in TLS 1.3 use AEAD (authenticated encryption).

IPsec:

Operates at the network layer (Layer 3) — encrypts IP packets, transparent to applications. Used for VPNs (site-to-site and remote access) and securing network segments.

Two modes:

ModeWhat's ProtectedUse Case
Transport ModePayload only; IP header unencryptedEnd-to-end between two hosts; host-to-host VPN
Tunnel ModeEntire original IP packet encapsulated in new IP packetNetwork-to-network VPN (gateway-to-gateway); remote access VPN

Two protocols:

ProtocolProvidesHeaderNotes
AH (Authentication Header)Integrity + authentication of IP header and payloadProtocol 51Does NOT encrypt; cannot traverse NAT (NAT changes IP header, breaking AH)
ESP (Encapsulating Security Payload)Confidentiality + integrity + authentication of payloadProtocol 50Encrypts payload; most commonly used; can traverse NAT with NAT-T

IKE (Internet Key Exchange) — manages security associations (SAs) and key exchange for IPsec:

  • IKEv1 Phase 1: Establish secure channel between peers (Main mode or Aggressive mode)
  • IKEv1 Phase 2: Negotiate IPsec SA parameters (Quick mode)
  • IKEv2: Simplified, more efficient, built-in NAT traversal, better support for mobile clients
Email Security Protocols:
ProtocolWhat It ProtectsHowLimitation
S/MIMEEmail message confidentiality + integrity + nonrepudiationAsymmetric encryption + digital signatures using X.509 certificatesRequires certificate infrastructure; both parties need certs
PGP/GPGSame as S/MIMEWeb of Trust model instead of PKI hierarchyDifficult key management; "web of trust" doesn't scale for enterprise
DKIMEmail authenticity in transit (sender domain verification)DNS-published public key verifies sending server's signature on headersDoes NOT encrypt; proves the email came from the domain's mail server
SPFSender IP authorizationDNS TXT record lists authorized IP addresses for a domainDoes NOT encrypt; only validates sending IP
DMARCPolicy for SPF/DKIM failuresDNS record tells receiving server what to do when SPF/DKIM fails (quarantine, reject)Builds on SPF and DKIM; doesn't work without them

⚠️ Exam Trap: DKIM, SPF, and DMARC protect email authenticity and help prevent spoofing — they do NOT encrypt email content. An email protected by all three is still readable in transit by anyone who intercepts it. S/MIME or PGP is required for content confidentiality. These are complementary controls addressing different threats.

Reflection Question: A healthcare organization wants to ensure that emails containing PHI sent to external specialists are (1) readable only by the intended recipient, (2) verifiably from the healthcare organization's domain, and (3) provably from the specific sending physician. Which combination of protocols addresses all three requirements, and what infrastructure is required to implement it?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications