E-Mail Security: CS 470 Introduction To Applied Cryptography Instructor: Ali Aydin Selcuk
E-Mail Security: CS 470 Introduction To Applied Cryptography Instructor: Ali Aydin Selcuk
E-Mail Security: CS 470 Introduction To Applied Cryptography Instructor: Ali Aydin Selcuk
CS 470
Introduction to Applied Cryptography
Instructor: Ali Aydin Selcuk
CS470, A.Selcuk
E-mail Security
privacy
authentication
integrity
non-repudiation
anonymity
proof of submission
proof of delivery
message flow confidentiality, etc.
CS470, A.Selcuk
E-mail Security
Key Management
A per-message symmetric key is used for
message encryption,
which is conveyed in the mail, encrypted under a
long-term key (typically a public key)
Long-term keys can be established,
offline
online, with help from a trusted third party
online, through a webpage (for public keys)
CS470, A.Selcuk
E-mail Security
Multiple Recipients
Message key will be encrypted under each recipients
long term key in the message header.
Bobs ID, KBob{S}
Carols ID, KCarol{S}
Teds ID, KTed{S}
S{m}
E.g.:
To: Bob, Carol, Ted
From: Alice
Key-info: Bob-4276724736874376
Key-info: Carol-78657438676783457
Key-info: Ted-12873486743009
Msg-info: UHGuiy77t65fhj87oi.....
CS470, A.Selcuk
E-mail Security
CS470, A.Selcuk
E-mail Security
E-mail Security
confidentiality: by encryption
auth./integrity: by signature or MAC
non-repudiation: by signature
some eccentric services,
anonymity
message flow confidentiality
non-repudiation with secret keys
CS470, A.Selcuk
E-mail Security
Secure/MIME (S/MIME)
PEM never took off; CA hierarchy difficult to realize
S/MIME: PEM design incorporated into MIME
CS470, A.Selcuk
E-mail Security
Encryption
A symmetric per-message key is sent encrypted under
the interchange key.
The message is encrypted under the per-message key
(typically with DES in CBC mode)
Authentication
Message is authenticated by a MIC
(Q: Any authentication for the per-message key?)
CS470, A.Selcuk
E-mail Security
E-mail Security
10
CS470, A.Selcuk
E-mail Security
11
E-mail Security
12
PGP Operation
All long-term user keys are public
Signature:
Message & timestamp are hashed (MD5 or SHA1) and
signed (RSA or DSS)
Compression (ZIP)
Encryption:
Message is encrypted with a per-message symmetric
key (typically with IDEA in CFB mode)
which is encrypted with the recipients public key
(RSA or DH (ElGamal))
E-mail Security
13
CS470, A.Selcuk
E-mail Security
14
E-mail Security
15
DKIM
Once deployed, it will significantly limit phishing
attacks with forged domain addresses.
Deployment is increasing rapidly.
Example: Gmails collaboration with PayPal &
eBay
CS470, A.Selcuk
E-mail Security
16