Documente Academic
Documente Profesional
Documente Cultură
email encryption
Nicolas T. Courtois
- University College London
email Encryption
Conventional Encryption
2 Nicolas T. Courtois
email Encryption
Secret-Key Encryption
Bob
Alice
3 Nicolas T. Courtois
email Encryption
Secret-Key Encryption
Bob
Alice
4 Nicolas T. Courtois
email Encryption
Example
Truecrypt hard drive encryption
5 Nicolas T. Courtois
email Encryption
Asymmetric Techniques
6 Nicolas T. Courtois
email Encryption
Vocabulary
Public-Key Cryptography ==
Asymmetric Cryptography
there is no secret in encryption,
there is one in decryption
7 Nicolas T. Courtois
email Encryption
Public key:
can be distributed to
many parties.
Does not have to be public
8 Nicolas T. Courtois
email Encryption
Eve
encryption decryption
algorithm c c algorithm
key generation
pk algorithm sk
(public key) (private key)
9 Nicolas T. Courtois
email Encryption
10 Nicolas T. Courtois
email Encryption
EPK(A)(m)
A B
Key management?
11 Nicolas T. Courtois
email Encryption
EPK(A)(m)
A B
a dog?
12 Nicolas T. Courtois
email Encryption
h(rB), B, EPK(A)(rB, B)
A B
13 Nicolas T. Courtois
email Encryption
Digital Signatures
14 Nicolas T. Courtois
email Encryption
15 Nicolas T. Courtois
email Encryption
Digital Signatures
m yes/no
(m,)
signing verification
algorithm algorithm
forgery
sk pk
(private key) (public key)
17 Nicolas T. Courtois
email Encryption
Requirements so far:
Three main functions:
1. Identify the signer
2. Approbation
3. Integrity of the message
18 Nicolas T. Courtois
email Encryption
Integrity: Hash-then-Sign
m
0- bits
19 Nicolas T. Courtois
email Encryption
20 Nicolas T. Courtois
email Encryption
Vocabulary
frequently confused
•qualified certif.
21 Nicolas T. Courtois
email Encryption
22 Nicolas T. Courtois
email Encryption
Non Repudiation
1. Identify the signer
23 Nicolas T. Courtois
email Encryption
24 Nicolas T. Courtois
email Encryption
SMTP Protocol
THE original email protocol.
25 Nicolas T. Courtois
email Encryption
26 Nicolas T. Courtois
email Encryption
Hybrid Encryption
random IV mi mi
key K
Data Encapsulation Module
K block block
Eve K
cipher + cipher +
mode mode
ci ci
Key Encapsulation Module
r PK encryption PK decryption
encapsulated
algorithm + key algorithm +
K “good” padding verif. padding K
past: setup phase
key generation
pk algorithm sk
(public key) (private key)
27 Nicolas T. Courtois
email Encryption
Background
28 Nicolas T. Courtois
email Encryption
29 Nicolas T. Courtois
email Encryption
PGP Revolution
Zimmerman in 1991 wrote the first email encryption program which
was adopted worldwide. He says:
:
31 Nicolas T. Courtois
email Encryption
Software 1+2
Frequently there are two separate programs:
1. Key management and command line tool
– PGP=paid,
– GnuPG = free
2. Encryption/Decryption/Signature/Verification
programs or front-ends
32 Nicolas T. Courtois
email Encryption
Example
1. Install GnuPG from gnupg.org
33 Nicolas T. Courtois
email Encryption
Software
1. Key management and command line:
• Example: GnuPG from gnupg.orgGnuPG (free GNU version
of PGP = RFC4880)
– Almost invisible tool, works in the background…
– Download from gnupg.org
• Requires a compiler such as Visual Studio 8, use nmake or so..
• Version 1.4.9. Easy to install:
http://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/binary/gnup
g-w32cli-1.4.9.exe
34 Nicolas T. Courtois
email Encryption
Example – 1.
After installation:
35 Nicolas T. Courtois
email Encryption
Software 2.
2. Encryption/Decryption/Signature/Verification
• Frontends: http://gnupg.org/related_software/frontends.en.html
• Enigmail -- for Mozilla Thunderbird
• Enigform ---- Mozilla Firefox
• EudoraGPG --- for Eudora
• ez-pine-gpg ---- pine
• GPGOE ---- plugin for Outlook Express
• Mac GNU Privacy Guard , GPGMail etc.. ---- for Apple
36 Nicolas T. Courtois
email Encryption
GPG4Win – on Windows
allows to encrypt files/email/text easily
Mc OS X:
• GPGDropThing –
• FireGPG which is a Firefox plugin. How to use it?
37 Nicolas T. Courtois
email Encryption
creates also
a button
to encrypt
attachments
38 Nicolas T. Courtois
email Encryption
Example - Enigmail
2. Instal Enigmail -- for Mozilla Thunderbird
From here:
https://addons.mozilla.org/en-US/thunderbird/downloads/file/92940/enigmail-
1.1.2-tb-win.xpi
39 Nicolas T. Courtois
email Encryption
40 Nicolas T. Courtois
email Encryption
41 Nicolas T. Courtois
email Encryption
Example
Enigmail -- for Mozilla Thunderbird
42 Nicolas T. Courtois
email Encryption
My Keys
…
43 Nicolas T. Courtois
email Encryption
Their Properties
44 Nicolas T. Courtois
email Encryption
45 Nicolas T. Courtois
email Encryption
Key Properties
46 Nicolas T. Courtois
email Encryption
Steps
1. Install GnuPG software
2. Generate a pair of keys.
3. Choose a strong password for storage of…
4. Sign your own and other people’s keys. Why?
5. Make your key known (publish or distribute).
Key Management
Sign your own and other people’s keys.
Why?
How?
48 Nicolas T. Courtois
email Encryption
49 Nicolas T. Courtois
email Encryption
Revolutionary or Dangerous?
The US Customs started a criminal investigation of Zimmermann,
for allegedly violating
the Arms Export Control Act…
Dropped after 3 years of investigation
and a lot of public/press outrage…
50 Nicolas T. Courtois
email Encryption
51 Nicolas T. Courtois
email Encryption
52 Nicolas T. Courtois
email Encryption **Attack Tree
for PGP © Bruce
Schneier
53 Nicolas T. Courtois
email Encryption
PKI Comparison
• PGP
– web of trust, totally decentralized system
• users can chose how much they trust each key
• is trust transitive? not really
• in particular, can also implement normal hierarchical PKI.
• S/MIME [RSA Labs]
– uses the same standard PKI as SSL: X.509 certificates.
54 Nicolas T. Courtois
email Encryption
BUT:
• almost never used,
– if signatures were the default behaviour, we would maybe
have less spam?
55 Nicolas T. Courtois
email Encryption
Email Storage
Questions:
• should received and decrypted email be stored encrypted?
• why when sending a message we sometimes need to add
ourselves to the recipient list?
56 Nicolas T. Courtois
email Encryption
Unsolved problems:
• privacy of the recipient
• privacy of the sender
• hiding the existence of the message (=> Steganography).
57 Nicolas T. Courtois