Download presentation
Presentation is loading. Please wait.
Published byLucas Wheeler Modified over 9 years ago
1
http://prismproof.org/ PRISM-PROOF Email Phillip Hallam-Baker Comodo Group Inc.
2
http://prismproof.org/
3
http://prismproof.org/ Not just one program
4
http://prismproof.org/ Not just one government
5
http://prismproof.org/ Not just governments
6
http://prismproof.org/ Not just email
7
http://prismproof.org/ Goal Make Internet security ubiquitous for 2 billion users
8
http://prismproof.org/ Personal Privacy Environment
9
http://prismproof.org/ Like making lightning strike
10
http://prismproof.org/ The guy who has made it happen…
11
http://prismproof.org/ Why the Web succeeded: Open Standards – HTML / HTTP / URI – Build on legacy (e.g. SGML) Open architecture – Don’t tie users to one publication model Public domain Reference code – Please take our code and sell it Some good technical innovations – URIs – Punt on the hard stuff (indexing, consistency)
12
http://prismproof.org/ PPE Open Standards (or proposals) – All specifications are submitted as Internet Drafts – Build on legacy (e.g. S/MIME) Open Architecture – Don’t tie users to one trust model Open Source Code – Generated from the specifications Some technical choices – Strong Email Addresses – Punt on the hard stuff
13
http://prismproof.org/ Dividing the Problem 1.Mail system integration – Frictionless secure email using strong addresses 2.Key Assertion distribution infrastructure – How do we find key assertions 3.Trust Model [Research] – Deciding if we trust a key 4.Transport [Research] – e.g. PRISM-proof transport work here
14
http://prismproof.org/ Dividing the Problem Share this 1.Mail system integration 2.Distribution infrastructure Research here 3.Trust Model 4.Transport
15
http://prismproof.org/ Please ‘steal’ this spec
16
http://prismproof.org/ Why I am here Recruit – Users – Testers – Coders (not just for crypto!) – Web Site (Bootstrap) – Architects – Reviewers – Evangelists
17
http://prismproof.org/ Xanadu, the Web in 1960
18
http://prismproof.org/ You already have email encryption
19
http://prismproof.org/ So why isn’t email secure today? Patents Limited machine capabilities The cryptowars Standards wars
20
http://prismproof.org/ Symmetric Cryptography E.g. Enigma – Sender sets wheels to ERG to encrypt – Receiver sets wheels to ERG to decrypt – The wheel settings are the key Same key is used to encrypt and decrypt Message is secret if the key is secret.
21
http://prismproof.org/ Public Key Cryptography Separate keys to encrypt and decrypt – Cannot decrypt if only the encryption key is known – Can make the encryption key public. – Message is secret if the secret key is secret, and you used the right key to encrypt! – Main systems used are RSA and Diffie-Hellman
22
http://prismproof.org/ Digital Signatures Made possible by two key cryptography – Secret key is used to sign – Public key is used to verify
23
http://prismproof.org/ Public Key Infrastructure Use Digital Signatures to authenticate keys Use Public key encryption to exchange symmetric keys Use symmetric key encryption to protect data
24
http://prismproof.org/ PEM (1993) Privacy Enhanced Mail – Hierarchy of Certificate Authorities Kings Lords Knights SerfsPeasantsDSHs
25
http://prismproof.org/ Antithesis PGP Web of Trust – Everyone is a peer S/MIME – Rework of PEM with multiple roots of authority
26
http://prismproof.org/ PGP Marketing Department
27
http://prismproof.org/ 15 Year Standards Stalemate S/MIME – Deployed in 5 billion clients PGP – Monopoly of mindshare
28
http://prismproof.org/ Why has neither won? S/MIME Too hard to get certificates Too much hassle to use PGP Incomprehensible to many Too much hassle to use
29
http://prismproof.org/ Solution
30
http://prismproof.org/ Frictionless Security
31
http://prismproof.org/ Frictionless Security Secure system must require no additional effort – No additional configuration – No additional steps in use – No maintenance or renewals – Except if the user wants to verify that their security is correct.
32
http://prismproof.org/ PPE 0.1 (Windows Live Mail Experience)
33
http://prismproof.org/ Configuring to receive encrypted mail Run Key Manager, Generates – Strong email address with – Phinger – Recovery codes Publish Phinger on Web Server Now anyone can send you encrypted mail – And you can read it on 95% of EXISTING clients
34
http://prismproof.org/ Help Wanted! UI experts to perform integration for – Outlook – Thunderbird – Apple Mail – iOS Mail –
35
http://prismproof.org/ Personal PKI Master Online Monthly Encryption Per Device Authentication
36
http://prismproof.org/ Strong Email Address AD6TK2-NDKN2W-JRME7DA-RXYYHZ-T4A?alice.prism.proof@orac.hallambaker.com ? @ The fingerprint of the root of Alice’s personal PKI hierarchy The account to send the email to Website where the phinger is published
37
http://prismproof.org/ Phinger Contains – Personal Public key hierarchy Offline Master / Online / Use Keys – Policy Statements (per protocol) Email – SMTP to example.com with STARTTLS phingerprint = X – S/MIME preferred under cert/key X. – By invitation only use cert/key Y.
38
http://prismproof.org/ [ KeyManager 1.0 ] Publication to the Web site is automatic – Enroll certificate in key server infrastructure – Make use of Google Certificate Transparency Register encrypted secret keys – To enable recovery if they are lost – To enable easy registration of a second device Can tell people ‘encrypted mail is preferred’
39
http://prismproof.org/ Sending a secure email Introducing PEEP – Privacy Enhancing Proxy Mail Client PEEP Machine
40
http://prismproof.org/ PEEP 0.1 Looks for messages sent to a Strong Email Address – These MUST be sent encrypted – Retrieves the phinger – Encrypts the message as directed (Currently only S/MIME could be PGP as well)
41
http://prismproof.org/ [ PEEP 1.0] Checks every outbound address – Queries a service to see if the user prefers encrypted mail – Introduces trusted parties Certificate Authorities Peers
42
http://prismproof.org/ Interesting research here PPE 1.0 Key ManagerMail Sender Key Broker OmniPublish OmniQuery
43
http://prismproof.org/ Endorsement Current research issue – How to make it easy to endorse another person? – QR codes make strong email address transfer easy. Please don’t laser engrave your iPhones yet
44
http://prismproof.org/ SPAM End to End Encryption defeats (some) Spam filters – So you might not want to use end to end encryption all the time. Instead publish the encryption key of your spam filter – Only release your end to end key to selected parties Require messages to be signed by approved sender
45
http://prismproof.org/ Conclusion Privacy Protected Everything provides – Secure email encryption Security rests on well tested/reviewed standards – Frictionless security No additional user effort at all I need your help to make it happen. – http://prismproof.org/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.