Signed, Sealed and Delivered How the emphasis on “encrypting” mail has hurt the cause of email security, and what to do about it. Simson L. Garfinkel MIT.

Slides:



Advertisements
Similar presentations
With your instructor, Jeremy Hyland
Advertisements

Internet Online Safety How to have FUN and Stay in Control.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Caleb Stepanian, Cindy Rogers, Nilesh Patel
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
CS470, A.Selcuk Security1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
What do I need to know?.   Instant Messages  Social Networking.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Security Jonathan Calazan December 12, 2005.
ing Your Grandchildren Pleasures and Pitfalls.
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
By Laura Trawin.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
ICT Essential Skills. (electronic mail) Snail Mail.
Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Cryptography 101 Frank Hecker
PROBLEM STATEMENT: Our research seeks to understand the current usability situation of files and encryption software. Particularly we focus in Gnupg4win.
1 The Business Case for DomainKeys Identified Mail.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Masud Hasan Secue VS Hushmail Project 2.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 9 Securing internet messaging.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Week 7 - Wednesday.  Web security – user side.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
management management using Gmail Ceri Clark.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0
Key management issues in PGP
Internet Business Associate v2.0
Security is one of the most widely used and regarded network services
Learn how to protect yourself against common attacks
Misc. Security Items.
CS 465 Secure Last Updated: Nov 30, 2017.
Pooja programmer,cse department
Presentation transcript:

Signed, Sealed and Delivered How the emphasis on “encrypting” mail has hurt the cause of security, and what to do about it. Simson L. Garfinkel MIT Computer Science and Artificial Intelligence Laboratory

Security 101 Internet is not “secure” “ is like a postcard” --- anybody can read it People can forge with your name on it. Encryption is the only protection for .

PGP: Pretty Good Privacy (1992) “ encryption for everybody” Protects private from government snoops “Web of Trust” Many books written Fringe activity web of trust Phil Zimmermann

S/MIME: Secure Mail, Circa 1998 RSA Data Security promotes “S/MIME” standard. Certificate-based identification S/MIME incorporated into: Microsoft Outlook Express Microsoft Outlook Lotus Notes CN: Simson L. Garfinkel DN: CN: Marian Garfinkel DN:

1999: Security Mess #1 PGP not compatible with S/MIME Ongoing legal battles between PGP & RSADSI Plug-ins add to confusion ProductPGPS/MIME Eudora Lotus Notes ** Microsoft Outlook * Microsoft Outlook Express * Netscape Messenger *

1999: Security Mess #2 Usability must be to blame! PGP is hard to use… “Why Johnny Can’t Encrypt.” Alma Whitten & D. Tygar, Usenix Security, 1999 S/MIME is easy, but you need a certificate, and getting a certificate is hard… Whitten Tygar

Security Today 16 years since the release of PGP Most Internet mail is not encrypted but… For many people, is nevertheless “secure.”

What is Security Anyway? For the academic security establishment: “Secure” was synonymous with “encrypted” (sealed) Reflects longstanding bias of military security objectives ascendancy over commercial objectives. “A comparison of commercial and military computer security models,” Clark & Wilson, Proceedings 1987 IEEE Symposium on Security and Privacy, pp “Secure” doesn’t mean “encrypted!”

Security means… CONFIDENTIALITY -- Others can’t read it INTEGRITY -- Message not modified after SEND AUTHENTICITY -- From: is really sender RELIABILITY -- It really gets there How do we get these today?

Security Today CONFIDENTIALITY If I send mail to I’m pretty sure that nobody else is going to read it… … because I trust AOL … because I trust my ISP and the Internet … because my mail just isn’t that important

Security Today CONFIDENTIALITY If both me and my mother are AOL users, then I only need to trust AOL… … if I don’t trust AOL, then the game is already over (I’m using AOL’s software!)

Security Today CONFIDENTIALITY -- Others can’t read it INTEGRITY -- Message not modified after SEND Mail is rarely modified after it is sent. Crypto guarantees don’t apply to: Quoted material Forwarded messages (unless message forwarded as an attachment.) Few people (if any) seem to realize when their mail is modified, anyway.

No Integrity, no cry

Security means… CONFIDENTIALITY -- Others can’t read it INTEGRITY -- Message not modified after SEND AUTHENTICITY -- From: is really sender Big part of today’s SPAM problem! We don’t really need a certificate hierarchy… … we need to know that this is different than that other

Security means… CONFIDENTIALITY -- Others can’t read it INTEGRITY -- Message not modified after SEND AUTHENTICITY -- From: is really sender Authentic AOL MailInternet Mail Received on AOL

Security means… CONFIDENTIALITY -- Others can’t read it INTEGRITY -- Message not modified after SEND AUTHENTICITY -- From: is really sender RELIABILITY -- It really gets there SPAM filtering is the threat!

Threat Models “Security” is about protecting from specific threats. PGP’s threat model: oppressive governments vs. human rights workers. Web-of-trust protects against infiltration S/MIME’s threat model: Unlicensed implementations & Patent violations Certificate hierarchy promotes centralized control.

Today’s Security Threats SPAM Forged From: addresses SPAM filters block legitimate mail Phishing claiming to be from Citibank directs recipient to website in Russia… Hypothesis: Today’s threats can be solved through digitally-signed mail alone.

What’s Digitally Signed Mail? Mail signed with a secret key.

What’s Digitally Signed Mail? Mail signed with a secret key. Signature verified with a public key.

What’s Digitally Signed Mail? Mail signed with a secret key. Signature verified with a public key. Provides: Proof that the secret key was used. Proof of identity if secret key is signed... Assurance that message wasn’t modified after it was sent. Not needed for today’s threats!

Digital Signatures Today S/MIME support is nearly universal Works great if Certificate Authority is known: Horrible if CA is unknown: Problem: Users can’t make their own certificates; they have to get them.

Plan for Secure 1. Organizations that send should get certificates and send S/MIME-signed mail. 2. Next-generation of S/MIME clients should: Accept all certificates. Report when a certificate changes. (SSH security model.)

Amazon S/MIME Survey I gave a talk about self-signed certificate in January 2004 at Amazon. Unknown to me, Amazon had been sending S/MIME-signed to its European Amazon Marketplace Sellers since June 2003.

Amazon Marketplace VAT Invoice

Research Questions Could people verify the signature? Did people know that the messages were signed? Did people know what a signed message meant? What did people think that the signed message meant? How did receiving a signed message affect their attitudes?

Methodology Web survey posted in Amazon Sellers Forums. 5 web pages; 40 questions total 2 minutes to complete each page Different URLs for Europe vs. America Europe Sellers – had received signed messages from Amazon US Sellers – had not receive signed messages from Amazon

Respondents 1083 sellers clicked on the link 470 submitted the first web page 417 completed all five pages Very educated: 26.1% advanced degree 34.9% college degree Very computer literate: 18% “very sophisticated” computer user 63.7% “comfortable” using computers

Knowledge and Attitudes What do the respondents know?

“What Kinds of Have You Received?” Many knew what they had received. Passive learning about encryption by recipients. AllEuropeUS that was digitally-signed 22% 33%**20%** sealed with encryption 9% 16%*7%* Signed and Sealed 7%10%6% I do not think that I have received messages signed or sealed 37%30%39% I have not received messages signed or sealed 21%23%20% I’m sorry, I don’t understand what you mean by “signed,” “sealed” or “encrypted” 26% 17%*28%* * p < 0.05; ** p < 0.01

More Proof of Passive Learning Practically speaking, is there a difference between digitally-signed mail and sealed mail? Europe: 67%** yes ; 7% no; 25%** don’t know US: 51% yes** ; 7% no; 43%** don’t know Practically speaking, is there a difference between mail that is sealed and mail that is both signed and sealed? Europe: 62%* yes ; 9% no ; 28%** don’t know US: 48%* yes; 8% no; 44%** don’t know

“Savvy” vs. “Green” Savvy are respondents who: Say they have a 1 (“very good”) or 2 understanding of crypto on a 5-point scale (23 & 53 respondents) Say they have received a digitally-signed message (104 respondents) Say they have received a sealed message (39 respondents) Say that they “always” or “sometimes” send digitally-signed message (29 respondents) |Savvy| = 138 |Green| = 279 Savvy vs. Green: 78% vs. 42% on test question (p<.001)

What should be digitally signed? AllSavvyGreen Advertisements17% Questions to online merchants33%26%*36%* Receipts from online merchants59% Personal sent or received at work40% Personal sent or received at home21% Bank or credit-card statement65% Tax returns or complaints to regulators74% newsletters from politicians22% Mail to political leaders voicing opinion38%

What should be sealed? AllSavvyGreen Advertisements3% Questions to online merchants18% Receipts from online merchants47%39%*51%* Personal sent or received at work38%26%***44%*** Personal sent or received at home31%25*34%* Bank or credit-card statement79% Tax returns or complaints to regulators74% newsletters from politicians3% Mail to political leaders voicing opinion15% Europe: 30% US: 51%

Survey Conclusions 1 People feel that different kinds of deserve different kinds of protection. Should be signed: Receipts from online merchants (59%) Tax returns or complaints to regulators (74%) Should be sealed: Bank or credit-card statements (79%) Tax returns or complaints to regulators (74%) Although many security gurus say that personal mail should be sealed and/or signed, Savvy users don’t feel that way.

People Can Receive Signed Mail! 65% had S/MIME-capable mail clients 42% Outlook Express 31% Outlook 10% Netscape Mail 3% Apple Mail The rest use systems that could be trivially modified to display S/MIME signatures 18% AOL 29% Hotmail 43% Yahoo Mail 25% Your organization’s web mail 12% Your ISP’s web mail

… But people don’t know it! “Does your client handle encryption?” + S/MIME- S/MIME Yes34% ***14% *** No5% I don’t know54% *66% * “What’s encryption?”7%**14%** * p <.05; ** p <.01 ; *** p <.001

People have the software; why don’t they use it? “I don’t because I don’t care” “I doubt any of my usual recipients would understand the significance of the signature.” “Never had the need to send these kinds of s.” “I don’t think it’s necessary to encrypt my & frankly it’s just another step & something else I don’t have the time for!”

Receiving vs. Sending Receiving signed mail is easy! You can just receive it! Receiving sealed mail is hard You need a cert! If you lose your cert, you can’t read your old mail! Sending is hard To send signed mail, you need a cert! To send sealed mail, you need the recipient's cert!

The Danger of Receiving Sealed Mail [Delete your cert, you won’t be able to read stored mail.] “Before you read the paragraph above, did you know that you might lose the ability to read mail sealed with encryption after you had received it?” UsersNon-Users Yes56% ***25% *** No40% ***63% *** Don’t know4% *11% * * p <.05; *** p < 0.001

Why don’t people sign mail? Do you send digitally-signed mail? 45% - Never; I don’t know how 19% - Rarely; it is not necessary for my kind of mail 10% - I usually don’t; I don’t care enough to do it 4% - Sometimes 2% - Always 24% - Sorry, I don’t understand what you mean by “digitally-signed”

Why don’t people seal mail? Do you send that is sealed? 17% - Rarely; not necessary for my kind of mail 41% - I don’t; don’t know how 14% - I don’t; afraid recipient won’t be able to read it 8% - Rarely; I just don’t care 6% - No; it’s just too hard 4% - Sometimes 22% - Sorry, don’t know what you mean by “sealed” or “encrypted”

Outlook Bugs A variety of bugs in Microsoft Outlook cause problems with S/MIME-signed mail. Outlook tries to sign replies to signed mail --- even if the user doesn’t have a key! Mail that is signed with an attachment but no text can’t be read. Microsoft must address these problems before we can recommend signing for the masses.

Metaphors for digital signatures 37% - “It’s like signing your name at the bottom of a message” 31% - It’s like putting your fingerprint on the bottom of a message 28% - It’s like having the message notarized 19% - It’s like printing the message on official stationery 8% - It’s like taking a photograph of the message 6% - Other

Conclusions… Signing: Companies like Amazon and eBay should start sending out signed mail today. Although individuals can send signed mail today, there’s little compelling reason to do so. Sealing: The technology still isn’t ready Fortunately, we don’t really need it right now.