Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.

Similar presentations


Presentation on theme: "PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc."— Presentation transcript:

1 http://prismproof.org/ PRISM-PROOF Email Phillip Hallam-Baker Comodo Group Inc.

2 http://prismproof.org/

3 http://prismproof.org/ Not just one program

4 http://prismproof.org/ Not just one government

5 http://prismproof.org/ Not just governments

6 http://prismproof.org/ Not just email

7 http://prismproof.org/ Goal Make Internet security ubiquitous for 2 billion users

8 http://prismproof.org/ Personal Privacy Environment

9 http://prismproof.org/ Like making lightning strike

10 http://prismproof.org/ The guy who has made it happen…

11 http://prismproof.org/ Why the Web succeeded: Open Standards – HTML / HTTP / URI – Build on legacy (e.g. SGML) Open architecture – Don’t tie users to one publication model Public domain Reference code – Please take our code and sell it Some good technical innovations – URIs – Punt on the hard stuff (indexing, consistency)

12 http://prismproof.org/ PPE Open Standards (or proposals) – All specifications are submitted as Internet Drafts – Build on legacy (e.g. S/MIME) Open Architecture – Don’t tie users to one trust model Open Source Code – Generated from the specifications Some technical choices – Strong Email Addresses – Punt on the hard stuff

13 http://prismproof.org/ Dividing the Problem 1.Mail system integration – Frictionless secure email using strong addresses 2.Key Assertion distribution infrastructure – How do we find key assertions 3.Trust Model [Research] – Deciding if we trust a key 4.Transport [Research] – e.g. PRISM-proof transport work here

14 http://prismproof.org/ Dividing the Problem Share this 1.Mail system integration 2.Distribution infrastructure Research here 3.Trust Model 4.Transport

15 http://prismproof.org/ Please ‘steal’ this spec

16 http://prismproof.org/ Why I am here Recruit – Users – Testers – Coders (not just for crypto!) – Web Site (Bootstrap) – Architects – Reviewers – Evangelists

17 http://prismproof.org/ Xanadu, the Web in 1960

18 http://prismproof.org/ You already have email encryption

19 http://prismproof.org/ So why isn’t email secure today? Patents Limited machine capabilities The cryptowars Standards wars

20 http://prismproof.org/ Symmetric Cryptography E.g. Enigma – Sender sets wheels to ERG to encrypt – Receiver sets wheels to ERG to decrypt – The wheel settings are the key Same key is used to encrypt and decrypt Message is secret if the key is secret.

21 http://prismproof.org/ Public Key Cryptography Separate keys to encrypt and decrypt – Cannot decrypt if only the encryption key is known – Can make the encryption key public. – Message is secret if the secret key is secret, and you used the right key to encrypt! – Main systems used are RSA and Diffie-Hellman

22 http://prismproof.org/ Digital Signatures Made possible by two key cryptography – Secret key is used to sign – Public key is used to verify

23 http://prismproof.org/ Public Key Infrastructure Use Digital Signatures to authenticate keys Use Public key encryption to exchange symmetric keys Use symmetric key encryption to protect data

24 http://prismproof.org/ PEM (1993) Privacy Enhanced Mail – Hierarchy of Certificate Authorities Kings Lords Knights SerfsPeasantsDSHs

25 http://prismproof.org/ Antithesis PGP Web of Trust – Everyone is a peer S/MIME – Rework of PEM with multiple roots of authority

26 http://prismproof.org/ PGP Marketing Department

27 http://prismproof.org/ 15 Year Standards Stalemate S/MIME – Deployed in 5 billion clients PGP – Monopoly of mindshare

28 http://prismproof.org/ Why has neither won? S/MIME Too hard to get certificates Too much hassle to use PGP Incomprehensible to many Too much hassle to use

29 http://prismproof.org/ Solution

30 http://prismproof.org/ Frictionless Security

31 http://prismproof.org/ Frictionless Security Secure system must require no additional effort – No additional configuration – No additional steps in use – No maintenance or renewals – Except if the user wants to verify that their security is correct.

32 http://prismproof.org/ PPE 0.1 (Windows Live Mail Experience)

33 http://prismproof.org/ Configuring to receive encrypted mail Run Key Manager, Generates – Strong email address with – Phinger – Recovery codes Publish Phinger on Web Server Now anyone can send you encrypted mail – And you can read it on 95% of EXISTING clients

34 http://prismproof.org/ Help Wanted! UI experts to perform integration for – Outlook – Thunderbird – Apple Mail – iOS Mail –

35 http://prismproof.org/ Personal PKI Master Online Monthly Encryption Per Device Authentication

36 http://prismproof.org/ Strong Email Address AD6TK2-NDKN2W-JRME7DA-RXYYHZ-T4A?alice.prism.proof@orac.hallambaker.com ? @ The fingerprint of the root of Alice’s personal PKI hierarchy The account to send the email to Website where the phinger is published

37 http://prismproof.org/ Phinger Contains – Personal Public key hierarchy Offline Master / Online / Use Keys – Policy Statements (per protocol) Email – SMTP to example.com with STARTTLS phingerprint = X – S/MIME preferred under cert/key X. – By invitation only use cert/key Y.

38 http://prismproof.org/ [ KeyManager 1.0 ] Publication to the Web site is automatic – Enroll certificate in key server infrastructure – Make use of Google Certificate Transparency Register encrypted secret keys – To enable recovery if they are lost – To enable easy registration of a second device Can tell people ‘encrypted mail is preferred’

39 http://prismproof.org/ Sending a secure email Introducing PEEP – Privacy Enhancing Proxy Mail Client PEEP Machine

40 http://prismproof.org/ PEEP 0.1 Looks for messages sent to a Strong Email Address – These MUST be sent encrypted – Retrieves the phinger – Encrypts the message as directed (Currently only S/MIME could be PGP as well)

41 http://prismproof.org/ [ PEEP 1.0] Checks every outbound address – Queries a service to see if the user prefers encrypted mail – Introduces trusted parties Certificate Authorities Peers

42 http://prismproof.org/ Interesting research here PPE 1.0 Key ManagerMail Sender Key Broker OmniPublish OmniQuery

43 http://prismproof.org/ Endorsement Current research issue – How to make it easy to endorse another person? – QR codes make strong email address transfer easy. Please don’t laser engrave your iPhones yet

44 http://prismproof.org/ SPAM End to End Encryption defeats (some) Spam filters – So you might not want to use end to end encryption all the time. Instead publish the encryption key of your spam filter – Only release your end to end key to selected parties Require messages to be signed by approved sender

45 http://prismproof.org/ Conclusion Privacy Protected Everything provides – Secure email encryption Security rests on well tested/reviewed standards – Frictionless security No additional user effort at all I need your help to make it happen. – http://prismproof.org/


Download ppt "PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc."

Similar presentations


Ads by Google