Usable Cryptography (End-to-End) Marcus Brinkmann LSM 2011-07-12.

Slides:



Advertisements
Similar presentations
1 SUNGARD AVAILABILITY SERVICES Messaging and Collaboration - Availability Service - Notification Service.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
S/MIME and PKI Dartmouth College PKI Lab. What Is S/MIME? RFC 2633 (S/MIME Version 3)RFC 2633 Extensions to MIME Uses PKI certificates, keys, and.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Masud Hasan Secue VS Hushmail Project 2.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Confused Johnny WHEN AUTOMATIC ENCRYPTION LEADS TO CONFUSION AND MISTAKES Scott Ruoti, Nathan Kim, Ben Burgon, Tim van der Horst, Kent Seamons Internet.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Module 7 Planning and Deploying Messaging Compliance.
PsycINFO Storing search results: mail, print, export Library.
ONE® Pages Training Presentation North York General Hospital.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
GROUPROCKET - Choose Collaboration Software for Your Company.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
and File Security With GnuPG Matt Brodeur
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Key management issues in PGP
Searchable Encryption in Cloud
Efficient and secure transborder exchange of patient data
Security is one of the most widely used and regarded network services
Cloud Security– an overview Keke Chen
Crypto in information security
First Class to Gmail Presentation.
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Password Management Limit login attempts Encrypt your passwords
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Configuring and Troubleshooting Routing and Remote Access
MICROSOFT OUTLOOK and Outlook service Provider
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 8 Network Security.
Fundamental Concepts in Security and its Application Cloud Computing
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Meganet Corporation VME Mail 2004
CS 465 Secure Last Updated: Nov 30, 2017.
S/MIME T ANANDHAN.
Microsoft Word 2003 Illustrated Complete
IS3230 Access Security Unit 9 PKI and Encryption
Using Groove Philip S. Vavalides Professor - IT/Networking Guilford Technical Community College Jamestown, NC.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Migration to the new EDAMIS
ONE® Pages Training Presentation
Examining a Windows NT Infrastructure (2)
Data Security for Microsoft Azure
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Public Key Infrastructure from the Most Trusted Name in e-Security
Encryption in Office 365 Shobhit Sahay Technical Product Manager
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
ONE® Mail Training Presentation
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
General Data Protection Regulation Q & A Session
Network Security Chapter 8.
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
Instructor Materials Chapter 5: Ensuring Integrity
COMPLETE BUSINESS TEXTING SOLUTION
Data Privacy by Design Expanding Security for bepress Users
Vertika Jain Convert OST to PST. What is OST File? OST file is the offline storage table. It works in offline mode. All the modification done in offline.
The Platform for Privacy Preferences Project
Presentation transcript:

Usable Cryptography (End-to-End) Marcus Brinkmann LSM

2 Introduction Mail Encryption Fail The Vision Four Examples The Zen Way of Implementation

3 Mail Encryption Fail Why Johnny Can't Encrypt (Whitten, Tygar 1999):

4 Mail Encryption Fail People do not use mail encryption. ✗ too small to measure Plaintext in the cloud. ✗ attack escalation Mail displaced by „PHP doodads“ (E. Moglen) ✗ 59% decline yo (comcast)

5 Mail Encryption Fail Organisations: ✗ X.509 (PKI with CA) Server-side (not end-to-end): ✗ data retention ✗ provability of send and receive ✗ business models

6 The Vision Suck less.

7 Four Examples Opportunistic Encryption Automatic Key Generation Key Distribution through DNS Trust On First Contact/Persistence of Pseudonym

8 Opportunistic Encryption Sucks: ✗ Wrong person to ask. ✗ Wrong place to store preferences. ✗ Mistake leads to plaintext leak. Sucks less: ✗ Get key and preferences from recipient. ✗ Always encrypt if possible. „Do you [the sender] want to encrypt this mail for this recipient and if yes, with which key?“

9 Automatic Key Generation Sucks: ✗ People choose inappropriate key parameter. ✗ Software-Amnesia. Sucks less: ✗ Use best practices by default. ✗ Mail client knows name and mail address. ✗ No more stupid questions. „What key type, size, expiration time do you want, what is your name and mail address?“

10 Automatic Key Distribution Sucks: ✗ Keyservers disjoint and quality varies. ✗ No undo. ✗ What is exported? Sucks less: ✗ Distribute keys through DNS (PKA). ✗ No search. ✗ Trust inheritance (DNSSEC). „What keyserver do you want to use? How do you want to export your key? Which file do you want to import?“

11 TOFU/POP Sucks: ✗ Yes/no question with amnesia at critical time. ✗ What is the consequence of being wrong? ✗ What does it even mean? Sucks less: ✗ Trust on first contact (like SSH) ✗ DNSSEC as CA ✗ Remember earlier contacts (persistence of pseudonym) ✗ „Trustiness“ mental model: „same key as last N times“ „Does this key belong to that person?“

12 TOFU/POP „Perspectives“ (Wendlandt et al., 2008): ✗ Network of monitors („notaries“) recording fingerprint histories in the network over time. ✗ Clients consult notary servers on trust decisions (first contact, fingerprint mismatch). Notaries provide non-local majority vote over time, disabling many MITM attacks.

13 The Zen Way of Implementation Reuse existing infrastructure: ✗ Full compatibility to OpenPGP and S/MIME. ✗ Full compatibility to other PKIs. ✗ PKA/CERT DNS available for many years now. ✗ TOFU/POP well-known from SSH.

14 The Zen Way of Implementation Acceptance by modularity: ✗ Experts generate or publish keys manually, or use different trust policies. Deeper integration can provide better user experience: ✗ Mail app has user name and account data. ✗ Mail app has semantic information on previous contacts.

15 The Zen Way of Implementation The big challenge: ✗ Changed trust model requires new generation of user interfaces. ✗ Opportunistic encryption requires widespread adoption of PKA/CERT DNS.

16 The Zen Way of Implementation Can we reach critical mass? ✗ Develop tool support and guidelines for user interaction. ✗ Engage privacy protection organisations. ✗ Shame providers into adapting their applications.

17 Thank you!