Mitigation of Attacks on Email End-to-End Encryption

被引:7
|
作者
Schwenk, Joerg [1 ]
Brinkmann, Marcus [1 ]
Poddebniak, Damian [2 ]
Mueller, Jens [1 ]
Somorovsky, Juraj [3 ]
Schinzel, Sebastian [2 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] Munster Univ Appl Sci, Munster, Germany
[3] Paderborn Univ, Paderborn, Germany
关键词
OpenPGP; S/MIME; EFAIL; AEAD; decryption contexts;
D O I
10.1145/3372297.3417878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
OpenPGP and S/MIME are two major standards for securing email communication introduced in the early 1990s. Three recent classes of attacks exploit weak cipher modes (EFAIL Malleability Gadgets, or EFAIL-MG), the flexibility of the MIME email structure (EFAIL Direct Exfiltration, or EFAIL-DE), and the Reply action of the email client (REPLY attacks). Although all three break message confidentiality by using standardized email features, only EFAIL-MG has been mitigated in IETF standards with the introduction of Authenticated Encryption with Associated Data (AEAD) algorithms. So far, no uniform and reliable countermeasures have been adopted by email clients to prevent EFAIL-DE and REPLY attacks. Instead, email clients implement a variety of different ad-hoc countermeasures which are only partially effective, cause interoperability problems, and fragment the secure email ecosystem. We present the first generic countermeasure against both REPLY and EFAIL-DE attacks by checking the decryption context including SMTP headers and MIME structure during decryption. The decryption context is encoded into a string DC and used as Associated Data (AD) in the AEAD encryption. Thus the proposed solution seamlessly extends the EFAIL-MG countermeasures. The decryption context changes whenever an attacker alters the email source code in a critical way, for example, if the attacker changes the MIME structure or adds a new Reply-To header. The proposed solution does not cause any interoperability problems and legacy emails can still be decrypted. We evaluate our approach by implementing the decryption contexts in Thunderbird/Enigmail and by verifying their correct functionality after the email has been transported over all major email providers, including Gmail and iCloud Mail.
引用
收藏
页码:1647 / 1664
页数:18
相关论文
共 50 条
  • [41] Usability of End-to-End Encryption in E-Mail Communication
    Reuter, Adrian
    Abdelmaksoud, Ahmed
    Boudaoud, Karima
    Winckler, Marco
    FRONTIERS IN BIG DATA, 2021, 4
  • [42] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [43] Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption
    Rohloff, Kurt
    Cousins, David Bruce
    Sumorok, Daniel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1031 - 1041
  • [44] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
  • [45] Deep Learning for Detecting Network Attacks: An End-to-End Approach
    Zou, Qingtian
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 221 - 234
  • [46] ESPRESSO: Advanced End-to-End Flow Correlation Attacks on Tor
    Chawla, Tisha
    Mittal, Shubh
    Mathews, Nate
    Wright, Matthew
    PROCEEDINGS OF THE 8TH ASIA-PACIFIC WORKSHOP ON NETWORKING, APNET 2024, 2024, : 219 - 220
  • [47] RIMformer: An End-to-End Transformer for FMCW Radar Interference Mitigation
    Zhang, Ziang
    Chen, Guangzhi
    Weng, Youlong
    Yang, Shunchuan
    Jia, Zhiyu
    Chen, Jingxuan
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62
  • [48] Blockchain-enabled End-to-End Encryption for Instant Messaging Applications
    Singh, Raman
    Chauhan, Ark Nandan Singh
    Tewari, Hitesh
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 501 - 506
  • [49] DCGAN-based symmetric encryption end-to-end communication systems
    An, Yongli
    Wang, Mengtao
    Chen, Lei
    Ji, Zhanlin
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 154
  • [50] Design of Cryptographic model for End-to-End Encryption in FPGA based systems
    Chatterjee, Runa
    Chakraborty, Rajdeep
    Mandal, J. K.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465