Content-Type: multipart/oracle Tapping into Format Oracles in Email End-to-End Encryption

被引:0
|
作者
Ising, Fabian [1 ,2 ]
Poddebniak, Damian [1 ]
Kappert, Tobias [1 ]
Saatjohann, Christoph [1 ,2 ]
Schinzel, Sebastian [1 ,2 ]
机构
[1] Munster Univ Appl Sci, Munster, Germany
[2] ATHENE, Natl Res Ctr Appl Cybersecur, Darmstadt, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case? In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent network patterns when opened in a victim's email client. We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation.
引用
收藏
页码:4175 / 4192
页数:18
相关论文
共 7 条
  • [1] Mitigation of Attacks on Email End-to-End Encryption
    Schwenk, Joerg
    Brinkmann, Marcus
    Poddebniak, Damian
    Mueller, Jens
    Somorovsky, Juraj
    Schinzel, Sebastian
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1647 - 1664
  • [2] Re: What's Up Johnny? Covert Content Attacks on Email End-to-End Encryption
    Mueller, Jens
    Brinkmann, Marcus
    Poddebniak, Damian
    Schinzel, Sebastian
    Schwenk, Joerg
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 24 - 42
  • [3] Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption
    Muller, Jens
    Brinkmann, Marcus
    Poddebniak, Damian
    Schinzel, Sebastian
    Schwenk, Jorg
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [4] A certificateless one-way group key agreement protocol for end-to-end email encryption
    Yeh, Jyh-haw
    Sridhar, Srisarguru
    Dagher, Gaby G.
    Sun, Hung-Min
    Shen, Ning
    White, Kathleen Dakota
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 34 - 43
  • [5] End-to-end stereoscopic video streaming with content-adaptive rate and format control
    Aksay, Anil
    Pehlivan, Selen
    Kurutepe, Engin
    Bilen, Cagdas
    Ozcelebi, Tanir
    Akar, Gozde Bozdagi
    Civanlar, M. Reha
    Tekalp, A. Murat
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2007, 22 (02) : 157 - 168
  • [6] Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
    Tyagi, Nirvan
    Grubbs, Paul
    Len, Julia
    Miers, Ian
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 222 - 250
  • [7] An Approach to Ensure Secure Inter-Cloud Data and Application Migration Using End-to-End Encryption and Content Verification
    Koushik S.
    Patil A.P.
    International Journal of Ambient Computing and Intelligence, 2022, 13 (01)