Mitigation of Attacks on Email End-to-End Encryption

被引:7
|
作者
Schwenk, Joerg [1 ]
Brinkmann, Marcus [1 ]
Poddebniak, Damian [2 ]
Mueller, Jens [1 ]
Somorovsky, Juraj [3 ]
Schinzel, Sebastian [2 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Munster Univ Appl Sci, Munster, Germany
[3] Paderborn Univ, Paderborn, Germany
关键词
OpenPGP; S/MIME; EFAIL; AEAD; decryption contexts;
D O I
10.1145/3372297.3417878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
OpenPGP and S/MIME are two major standards for securing email communication introduced in the early 1990s. Three recent classes of attacks exploit weak cipher modes (EFAIL Malleability Gadgets, or EFAIL-MG), the flexibility of the MIME email structure (EFAIL Direct Exfiltration, or EFAIL-DE), and the Reply action of the email client (REPLY attacks). Although all three break message confidentiality by using standardized email features, only EFAIL-MG has been mitigated in IETF standards with the introduction of Authenticated Encryption with Associated Data (AEAD) algorithms. So far, no uniform and reliable countermeasures have been adopted by email clients to prevent EFAIL-DE and REPLY attacks. Instead, email clients implement a variety of different ad-hoc countermeasures which are only partially effective, cause interoperability problems, and fragment the secure email ecosystem. We present the first generic countermeasure against both REPLY and EFAIL-DE attacks by checking the decryption context including SMTP headers and MIME structure during decryption. The decryption context is encoded into a string DC and used as Associated Data (AD) in the AEAD encryption. Thus the proposed solution seamlessly extends the EFAIL-MG countermeasures. The decryption context changes whenever an attacker alters the email source code in a critical way, for example, if the attacker changes the MIME structure or adds a new Reply-To header. The proposed solution does not cause any interoperability problems and legacy emails can still be decrypted. We evaluate our approach by implementing the decryption contexts in Thunderbird/Enigmail and by verifying their correct functionality after the email has been transported over all major email providers, including Gmail and iCloud Mail.
引用
收藏
页码:1647 / 1664
页数:18
相关论文
共 50 条
  • [21] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [22] Homomorphic Encryption as End-to-End Solution for Smart Devices
    Shanthala, P. T.
    Annapurna, D.
    Nittala, Sravanthi
    Bhat, Arpitha S.
    Aishwarya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62
  • [23] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [24] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [25] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [26] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [27] An Add-on End-to-end Secure Email Solution in Mobile Communications
    Zhao, Shushan
    Liu, Shuping
    10TH EAI INTERNATIONAL CONFERENCE ON MOBILE MULTIMEDIA COMMUNICATIONS (MOBIMEDIA 2017), 2017, : 63 - 67
  • [28] Design and Implementation of an End-to-End Web based Trusted Email System
    Sabir, Muhammad Zeeshan
    Yousaf, Muhammad
    9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 231 - 238
  • [29] End-to-End Detection of Caller ID Spoofing Attacks
    Mustafa, Hossen
    Xu, Wenyuan
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 423 - 436
  • [30] Detecting web attacks with end-to-end deep learning
    Pan, Yao
    Sun, Fangzhou
    Teng, Zhongwei
    White, Jules
    Schmidt, Douglas C.
    Staples, Jacob
    Krause, Lee
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2019, 10 (01)