Extremely Sensitive Communication Secure, Secret, and Private e-mail - - PowerPoint PPT Presentation

extremely sensitive communication secure secret and
SMART_READER_LITE
LIVE PREVIEW

Extremely Sensitive Communication Secure, Secret, and Private e-mail - - PowerPoint PPT Presentation

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary Extremely Sensitive Communication Secure, Secret, and Private e-mail Loek Sangers UvA KPMG June 30, 2016 Loek Sangers UvA KPMG Research


slide-1
SLIDE 1

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Extremely Sensitive Communication Secure, Secret, and Private e-mail

Loek Sangers

UvA KPMG

June 30, 2016

Loek Sangers UvA KPMG Research Project 2

slide-2
SLIDE 2

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Research Questions

How can e-mail communication be changed to provide a trusted (secure, secret, and private) way of communication?

1 What are the requirements for secure, secret, and private

e-mail?

2 What are the gaps in currently available solutions with regard

to these requirements?

3 What system architecture enhancements can be provided to

these solutions to fill these gaps?

4 What is the feasibility of implementing these system

architecture enhancements?

Loek Sangers UvA KPMG Research Project 2

slide-3
SLIDE 3

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Motivation

Private communication SMTP not build for it State surveillance Existing solutions don’t provide enough

StartTLS OpenPGP S/MIME Figure 1: SMTP

Loek Sangers UvA KPMG Research Project 2

slide-4
SLIDE 4

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Definitions

Secure: Unreadable for anyone but sender and recipient Secret: Unknown that a message is submitted or retrieved by a specific user Private: Only two entities that know who both the sender and recipient are, are exactly those two

Mail System Alice Bob

Figure 2: Mail System

Loek Sangers UvA KPMG Research Project 2

slide-5
SLIDE 5

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Requirements

Secure

End-to-End Encryption Perfect Forward Secrecy

Secret

Purpose of traffic Origin of traffic

Private

Meta-data Protected against compromised servers Spam Discoverable servers

Loek Sangers UvA KPMG Research Project 2

slide-6
SLIDE 6

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Available Systems - Secure

Requirements:

End-to-End Encryption Perfect Forward Secrecy

Client software

OpenPGP S/MIME

  • pmsg

Key validation

Certificate Authorities Web of trust

Key distribution

Out of band Publishing

Loek Sangers UvA KPMG Research Project 2

slide-7
SLIDE 7

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Available Systems - Secret

Requirements:

Purpose of traffic Origin of traffic

Multi-purpose connection

HTTPS VPN

Anonymizing overlay network

Tor I2P

Loek Sangers UvA KPMG Research Project 2

slide-8
SLIDE 8

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Available Systems - Private

Requirements:

Meta-data Protected against compromised servers Spam Discoverable servers

Anonymous remailers

Cypherpunk Mixmaster Mixminion

Mix network Spam protection by opt-out Signatures

Figure 3: Mix Network

Loek Sangers UvA KPMG Research Project 2

slide-9
SLIDE 9

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Solutions - Secure

New key distribution system

Scalability Perfect forward secrecy

Including keys in messages Already being developed

Loek Sangers UvA KPMG Research Project 2

slide-10
SLIDE 10

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Solutions - Secret

Anonymizing overlay networks

Already exist Could use broader adoption

Multi-purpose connections

Already exist Target server needs multiple purposes

Loek Sangers UvA KPMG Research Project 2

slide-11
SLIDE 11

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Solutions - Private

New Mix type

Multi-Binomial Shared Pool Multi-Binomial Independent Pool

Hash of content Server key rollover Spam

Signatures, both server and client Expected format Flagging spam senders in key distribution system

Server discovery system

Loek Sangers UvA KPMG Research Project 2

slide-12
SLIDE 12

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Proposed System - Message Content

1 Unencrypted message (fixed

size)

2 Signed by Sender 3 Encrypted for Recipient 4 Signed with public key of

Recipient

5 Encrypted for each server Unencrypted Message + Signature Sender Encrypted + Signature Recipient Encrypted last server Encrypted previous server

Figure 4: Content Encryption

Loek Sangers UvA KPMG Research Project 2

slide-13
SLIDE 13

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Proposed System - Message Headers

Fixed number of entries, each contains:

Address of next hop Hash of content Decryption key

Entries moved up after being used Random entry appended at the end

Loek Sangers UvA KPMG Research Project 2

slide-14
SLIDE 14

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Conclusion

Secure, Secret, and Private e-mail is possible, but:

Key distribution system Mail server discovery system Client side software (stand-alone or browser plugin)

Public adoption important

Profitable for companies Demanded by public

Loek Sangers UvA KPMG Research Project 2

slide-15
SLIDE 15

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Summary

Requirements Available Systems Solutions Proposed System Questions?

Loek Sangers UvA KPMG Research Project 2

slide-16
SLIDE 16

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Use Cases

Individuals Companies

Loek Sangers UvA KPMG Research Project 2

slide-17
SLIDE 17

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Summary

Requirements Available Systems Solutions Proposed System Questions?

Loek Sangers UvA KPMG Research Project 2

slide-18
SLIDE 18

Introduction Requirements Available Systems Solutions Proposed System Conclusion Summary Summary

Resources

Figure 1: "https://en.wikipedia.org/wiki/Simple_ Mail_Transfer_Protocol#/media/File: SMTP-transfer-model.svg" Figure 3: "https://en.wikipedia.org/wiki/File: Decryption_mix_net.png"

Loek Sangers UvA KPMG Research Project 2