Mitigation of Attacks on Email End-to-End Encryption

被引:7
|
作者
Schwenk, Joerg [1 ]
Brinkmann, Marcus [1 ]
Poddebniak, Damian [2 ]
Mueller, Jens [1 ]
Somorovsky, Juraj [3 ]
Schinzel, Sebastian [2 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Munster Univ Appl Sci, Munster, Germany
[3] Paderborn Univ, Paderborn, Germany
关键词
OpenPGP; S/MIME; EFAIL; AEAD; decryption contexts;
D O I
10.1145/3372297.3417878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
OpenPGP and S/MIME are two major standards for securing email communication introduced in the early 1990s. Three recent classes of attacks exploit weak cipher modes (EFAIL Malleability Gadgets, or EFAIL-MG), the flexibility of the MIME email structure (EFAIL Direct Exfiltration, or EFAIL-DE), and the Reply action of the email client (REPLY attacks). Although all three break message confidentiality by using standardized email features, only EFAIL-MG has been mitigated in IETF standards with the introduction of Authenticated Encryption with Associated Data (AEAD) algorithms. So far, no uniform and reliable countermeasures have been adopted by email clients to prevent EFAIL-DE and REPLY attacks. Instead, email clients implement a variety of different ad-hoc countermeasures which are only partially effective, cause interoperability problems, and fragment the secure email ecosystem. We present the first generic countermeasure against both REPLY and EFAIL-DE attacks by checking the decryption context including SMTP headers and MIME structure during decryption. The decryption context is encoded into a string DC and used as Associated Data (AD) in the AEAD encryption. Thus the proposed solution seamlessly extends the EFAIL-MG countermeasures. The decryption context changes whenever an attacker alters the email source code in a critical way, for example, if the attacker changes the MIME structure or adds a new Reply-To header. The proposed solution does not cause any interoperability problems and legacy emails can still be decrypted. We evaluate our approach by implementing the decryption contexts in Thunderbird/Enigmail and by verifying their correct functionality after the email has been transported over all major email providers, including Gmail and iCloud Mail.
引用
收藏
页码:1647 / 1664
页数:18
相关论文
共 50 条
  • [1] End-to-End Measurements of Email Spoofing Attacks
    Hu, Hang
    Wang, Gang
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1095 - 1112
  • [2] Re: What's Up Johnny? Covert Content Attacks on Email End-to-End Encryption
    Mueller, Jens
    Brinkmann, Marcus
    Poddebniak, Damian
    Schinzel, Sebastian
    Schwenk, Joerg
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 24 - 42
  • [3] Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption
    Muller, Jens
    Brinkmann, Marcus
    Poddebniak, Damian
    Schinzel, Sebastian
    Schwenk, Jorg
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [4] A certificateless one-way group key agreement protocol for end-to-end email encryption
    Yeh, Jyh-haw
    Sridhar, Srisarguru
    Dagher, Gaby G.
    Sun, Hung-Min
    Shen, Ning
    White, Kathleen Dakota
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 34 - 43
  • [5] Content-Type: multipart/oracle Tapping into Format Oracles in Email End-to-End Encryption
    Ising, Fabian
    Poddebniak, Damian
    Kappert, Tobias
    Saatjohann, Christoph
    Schinzel, Sebastian
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4175 - 4192
  • [6] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [7] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [8] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [9] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55
  • [10] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62