sels: a secure e-mail list service himanshu khurana, adam slagell, rafael bonilla ncsa, university...
TRANSCRIPT
![Page 1: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/1.jpg)
SELS: A Secure E-mail List Service
Himanshu Khurana, Adam Slagell, Rafael Bonilla
NCSA, University of Illinois
![Page 2: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/2.jpg)
Introduction to E-mail List Services E-mail List Services (ELSs) comprise
List Moderator (LM) – user/process that creates lists and controls list membership
List Server (LS) – maintains list and membership information, forwards e-mails, and optionally archives them
User/subscribers – subscriber to/ unsubscribe from lists with the help of LM, and send/receive e-mails with the help of LS
Increasingly popular for exchange of both public and private content security is an important concern
E.g., there are over 300,000 registered lists on LISTSERV while approximately 16% of them serve public content
Little or no work in providing security solutions for ELSs
We provide solutions for confidentiality, integrity, authentication, and anti-spamming
![Page 3: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/3.jpg)
Confidentiality, Integrity, and Authentication with S/MIME for TPEE
Header inPlaintext
Alice Bob
PKI: Bob’s encryption key PKBPKI: Alice’s signature verification key PKA
Base-64 encoded message
• Other approaches for achieving confidentiality, integrity and authentication• PEM• PGP• Identity-based encryption and Identity-based mediated RSA
• Just provides confidentiality• Challenge: certificate distribution and validation
Encrypt(m, Sig(m)) w/ k
AES, 3DES
Encrypt (k)w/ PKB
RSA, El Gamal
Plaintext mSign h(m) with SKA
(RSA, DSA)
![Page 4: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/4.jpg)
Confidentiality, Integrity and Authentication for ELSs Confidentiality
Possible Solutions Use cryptographic hardware to do decryption/encryption
Expensive, broken in the past (e.g., CCA application on IBM 4758) Use group key management to distribute symmetric key to list members
Members need to be online to execute operations for key update Our solution
Use software-based proxy re-encryption at LS to transform encrypted e-mail between sender and receivers without requiring access to plaintext
Inexpensive, does not require members to be online for updates Integrate (encryption) key distribution with user subscription
Integrity and Authentication Authentication goal includes notion that member must be a list
subscriber Our approach: Use digital signatures with LM providing signature key
validation (w.r.t. list membership)
Problem: Adversary can compromise LS to obtain e-mails
S LS R2
R1
Rn
EncPKLS(m)
Dec,EncPKRi
(m)
DecSKRi(c)
![Page 5: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/5.jpg)
Anti-Spamming Many approaches proposed for TPEE; e.g., legal
Spam is a felony in VA In CA, PA sexually explicit emails must have pre-fix: “ADV:
ADLT” Congress passed CAN SPAM act effective Jan 2004
Appropriate labeling, opt-out options Challenge: Tracing, enforcement, jurisdiction
Digital Signatures for TPEE Reject e-mail if signature does not match Challenges
Large scale certificate distribution/revocation/enrollment Block use of e-mail for initiating communication/transactions
Making mass-mailing infeasible Use economic or computational deterrence Challenges
Difficult to get the masses to pay for e-mail now Spam sent in distributed manner, computational barrier
impractical
![Page 6: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/6.jpg)
Contribution: SELS; Solutions for Confidentiality
Solution using proxy encryption techniques whereby the plaintext is not exposed at LS; instead, LS simply transforms encrypted messages
LS archives e-mails in encrypted form and provides access on-demand
User subscription process used to create and distribute keys without the need for a trusted third party
Integrity and authentication Solution using digital signatures where signature key
validation is provided by LM
Anti-spamming Use digital signatures with LM providing key validation Use HMACs as a cheaper alternative with LS participating
actively
![Page 7: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/7.jpg)
SELS Overview
LM LS
U1 U2 U3
Subscribe
EstablishPrivate key KU1
HMAC Key HU1
Establish CorrespondingPrivate key K’U1,HMAC Key HU1
Send signed,encrypted,and HMACdemail
Verify HMAC,transform andforward
Verify HMAC,decrypt andverify signature
• Assumptions• LM is an independent entity not controlled by LS• Subscription e-mails between user, LM, and LS can be secured (e.g., PGP, passwords)
Create Group
EstablishList Key KLM
Establish CorrespondingList Key KLS
LM, LS implicitly agreeKLK = KLM + KLS is list key
![Page 8: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/8.jpg)
Sending E-mails
Base-64 encoded
EmailPlaintext m
Encrypt (m,Sig(m)) w/ k
(AES, 3DES)
Encrypt (k) w/ PKA
(SELS/El Gamal)
Email HeaderSig(m) w/ SKA
(RSA, DSA)
H(X) w/ HA
(SHA-1)
X
Base-64 encoded
Transform k w/ K’A, K’B
(SELS ProxyRe-encryption)
Email Header EmailPlaintext m
Encrypt (m,Sig(m)) w/ k
(AES, 3DES)
Sig(m) w/ SKA
(RSA, DSA)
H(Y) w/ HB
(SHA-1)
Y
Key Store: Members’ corresponding private keys K’Ui
and HMAC Keys HUi
Alice LS
Key Store: (SKA, PKA),HA
Bob LS
Key Store: (SKB, PKB), HB
![Page 9: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/9.jpg)
Additional Protocol Operations Unsubscribing Users
User sends request to LM who cosigns request and sends to LS
LS deletes user’s corresponding private key Revocation Immediate
Signature key validation LM sends occasional (e.g., monthly) updates on invalid keys
Archiving and retrieval Archive after partial transformation; encrypted with KLK Complete transformation for user on request Analysis
If users have access to all e-mails, compromise of one user leads to compromise of all e-mails
Solution: Use key epochs Archive e-mails only for an epoch LM changes KLK every epoch
![Page 10: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/10.jpg)
Recent Work: Formal Verification and Implementation Formal Verification with Proverif
Fully automated protocol verification tool based on pi calculus
Verified that SELS provides confidentiality and anti-spamming
Implemented SELS Prototype in Java Integrated with Eudora E-mail Client via command-
line interface Integrated with GnuPG Toolkit for standard Signature
and Encryption operations
Work in Progress Plugin for JavaMail, Eudora Integration with Majordomo list server software
![Page 11: SELS: A Secure E-mail List Service Himanshu Khurana, Adam Slagell, Rafael Bonilla NCSA, University of Illinois](https://reader036.vdocuments.mx/reader036/viewer/2022082612/56649f125503460f94c26329/html5/thumbnails/11.jpg)
Summary Increasing use of ELS for exchanging private
content security is important
Security for ELSs is significantly different from that for two-party e-mail exchange
Provide solutions for confidentiality, integrity, authentication, and anti-spamming
E-mail plaintext not exposed at LS via proxy encryption
Formal Verification with Proverif
Implementation work ongoing