CybersecurityBolstering e-mail security

Published 11 September 2012

On the whole, security is not a primary concern for most day-to-day e-mails, but some e-mails do contain personal, proprietary, and sensitive information, documents, media, photos, videos, and sound files; the open nature of e-mail means that they can be intercepted and if not encrypted, easily read by malicious third parties

Millions of us send billions of e-mails back and forth each day without much concern for their security. On the whole, security is not a primary concern for most day-to-day e-mails, but some e-mails do contain personal, proprietary, and sensitive information, documents, media, photos, videos, and sound files. Unfortunately, the open nature of e-mail means that they can be intercepted and if not encrypted, easily read by malicious third parties. Even with the PGP — pretty good privacy — encryption scheme first used in 1995, if a sender’s private “key” is compromised all their previous emails encrypted with that key can be exposed.

An Inderscience release reports that computer scientists Duncan Wong and Xiaojian Tian of City University of Hong Kong, writing in the International Journal of Security and Networks, explain how previous researchers had attempted to define perfect email privacy that utilizes PGP by developing a technique that would preclude the decryption of other e-mails should a private key be compromised. Unfortunately, say Wong and Tian this definition fails if one allows the possibility that the e-mail server itself may be compromised, by hackers or other malicious users.

The team has now defined perfect forward secrecy for e-mail as follows and suggested a technical solution to enable e-mail security to be independent of the server used to send the message: “An e-mail system provides perfect forward secrecy if any third party, including the e-mail server, cannot recover previous session keys between the sender and the recipient even if the long-term secret keys of the sender and the recipient are compromised.”

By building a new e-mail protocol on this principle, the team suggests that it is now possible to exchange e-mails with almost zero risk of interference from third parties. “Our protocol provides both confidentiality and message authentication in addition to perfect forward secrecy,” they explain.

The release notes that the team’s protocol involves Alice sending Bob an encrypted e-mail with the hope that Charles will not be able to intercept and decrypt the message. Before the e-mail is encrypted and sent the protocol suggested by Wong and Tian has Alice’s computer send an identification code to the e-mail server. The server creates a random session “hash” that is then used to encrypt the actual encryption key for the e-mail Alice is about to send. Meanwhile, Bob as putative recipient receives the key used to create the hash and bounces back an identification tag. This allows Alice and Bob to verify each other’s identity.

These preliminary steps are all automatically and without Alice or Bob needing to do anything in advance. Now, Alice writes her e-mail, encrypts it using PGP and then “hashes” it using the random key from the server. When Bob receives the encrypted message he uses his version of the hash to unlock the container within which the PGP-encrypted e-mail sits. Bob then uses Alice’s public PGP key to decrypt the message itself. No snoopers on the internet between Alice and Bob, not even the e-mail server ever have access to the PGP encrypted e-mail in the open. Moreover, because a different key is used to lock up the PGP encrypted e-mail with a second one-time layer, even if the PGP security is compromised past e-mails created with the same key cannot be unlocked.

— Read more inDuncan S. Wong and Xiaojian Tian,  “E-mail protocols with perfect forward secrecy” in International Journal Security and Networks 7, no. 1 (2012): 1-5 (doi: 10.1504/IJSN.2012.048491)