extremely sensitive communication secure secret and
play

Extremely Sensitive Communication Secure, Secret, and Private e-mail - PowerPoint PPT Presentation

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Extremely Sensitive Communication Secure, Secret, and Private e-mail Loek Sangers UvA KPMG June 30, 2016 Loek Sangers UvA KPMG Research


  1. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Extremely Sensitive Communication Secure, Secret, and Private e-mail Loek Sangers UvA KPMG June 30, 2016 Loek Sangers UvA KPMG Research Project 2

  2. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Research Questions How can e-mail communication be changed to provide a trusted (secure, secret, and private) way of communication? 1 What are the requirements for secure, secret, and private e-mail? 2 What are the gaps in currently available solutions with regard to these requirements? 3 What system architecture enhancements can be provided to these solutions to fill these gaps? 4 What is the feasibility of implementing these system architecture enhancements? Loek Sangers UvA KPMG Research Project 2

  3. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Motivation Private communication SMTP not build for it State surveillance Existing solutions don’t provide enough StartTLS OpenPGP S/MIME Figure 1: SMTP Loek Sangers UvA KPMG Research Project 2

  4. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Definitions Secure: Unreadable for anyone but sender and recipient Secret: Unknown that a message is submitted or retrieved by a specific user Private: Only two entities that know who both the sender and recipient are, are exactly those two Bob Alice Mail System Loek Sangers UvA KPMG Figure 2: Mail System Research Project 2

  5. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Requirements Secure End-to-End Encryption Perfect Forward Secrecy Secret Purpose of traffic Origin of traffic Private Meta-data Protected against compromised servers Spam Discoverable servers Loek Sangers UvA KPMG Research Project 2

  6. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Available Systems - Secure Requirements: End-to-End Encryption Perfect Forward Secrecy Client software OpenPGP S/MIME opmsg Key validation Certificate Authorities Web of trust Key distribution Out of band Publishing Loek Sangers UvA KPMG Research Project 2

  7. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Available Systems - Secret Requirements: Purpose of traffic Origin of traffic Multi-purpose connection HTTPS VPN Anonymizing overlay network Tor I2P Loek Sangers UvA KPMG Research Project 2

  8. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Available Systems - Private Requirements: Meta-data Protected against compromised servers Spam Discoverable servers Anonymous remailers Cypherpunk Figure 3: Mix Network Mixmaster Mixminion Mix network Spam protection by opt-out Signatures Loek Sangers UvA KPMG Research Project 2

  9. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Solutions - Secure New key distribution system Scalability Perfect forward secrecy Including keys in messages Already being developed Loek Sangers UvA KPMG Research Project 2

  10. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Solutions - Secret Anonymizing overlay networks Already exist Could use broader adoption Multi-purpose connections Already exist Target server needs multiple purposes Loek Sangers UvA KPMG Research Project 2

  11. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Solutions - Private New Mix type Multi-Binomial Shared Pool Multi-Binomial Independent Pool Hash of content Server key rollover Spam Signatures, both server and client Expected format Flagging spam senders in key distribution system Server discovery system Loek Sangers UvA KPMG Research Project 2

  12. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Proposed System - Message Content 1 Unencrypted message (fixed size) Encrypted previous server 2 Signed by Sender Encrypted last server Encrypted + 3 Encrypted for Recipient Unencrypted 4 Signed with public key of Message + Recipient Signature Sender 5 Encrypted for each server Signature Recipient Figure 4: Content Encryption Loek Sangers UvA KPMG Research Project 2

  13. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Proposed System - Message Headers Fixed number of entries, each contains: Address of next hop Hash of content Decryption key Entries moved up after being used Random entry appended at the end Loek Sangers UvA KPMG Research Project 2

  14. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Conclusion Secure, Secret, and Private e-mail is possible, but: Key distribution system Mail server discovery system Client side software (stand-alone or browser plugin) Public adoption important Profitable for companies Demanded by public Loek Sangers UvA KPMG Research Project 2

  15. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Summary Requirements Available Systems Solutions Proposed System Questions? Loek Sangers UvA KPMG Research Project 2

  16. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Use Cases Individuals Companies Loek Sangers UvA KPMG Research Project 2

  17. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Summary Requirements Available Systems Solutions Proposed System Questions? Loek Sangers UvA KPMG Research Project 2

  18. Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Resources Figure 1: "https://en.wikipedia.org/wiki/Simple_ Mail_Transfer_Protocol#/media/File: SMTP-transfer-model.svg" Figure 3: "https://en.wikipedia.org/wiki/File: Decryption_mix_net.png" Loek Sangers UvA KPMG Research Project 2

Recommend


More recommend