The Challenges of Ubiquitous End-to-End Encrypted Email

نویسنده

  • Alexander Maxwell
چکیده

Although end-to-end encrypted email as been accessible for many years, it has yet to see ubiquitous uptake by the general public. In an effort to determine why this is the case, encrypted email schemes, PGP and S/MIME have been studied. Although they meet the requirements of sending an encrypted email, they fail to meet some requirements that are needed to make the use of end-to-end encrypted email ubiquitous. Meeting the requirements of end-to-end encrypted email allows for implementing secure email in a closed setting. In a closed setting, cryptographic artifacts can be managed by the trusted third party who is providing encrypted email service. When applied to an open setting, the management of cryptographic artifacts is left to the end user. In order to manage these artifacts, four requirements of ubiquity are proposed to reduce the barriers to end-to-end encrypted email adoption in an open setting. The challenges of end-to-end encrypted email are why current secure email schemes do not meet the ubiquity requirements. The challenges of end-to-end encrypted email are the establishment of trust, the management of key material, cross-platform, and supporting backwards compatibility. It is suggested that the root of the four challenges of end-to-end encrypted email is the reliance of end users to have a sematic understanding of the underlying implementation of end-to-end encrypted email and relying on users to make secure decisions. It is believed that by providing infrastructure and security management processes to support the artifacts of end-to-end encrypted email, the requirement of sematic understanding can be changed to that of a procedural understanding. As a result, the barriers of ubiquitous use of end-to-end encrypted email will be reduced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Intrusion Detection and Ubiquitous Host to Host Encryption

Growing concern for individual privacy, driven by an increased public awareness of the degree to which many of our electronic activities are tracked by interested third parties (e.g. Google knows what I am thinking before I finish entering my search query), is driving the development anonymizing technologies (e.g. Tor). The coming mass migration to IPv6 as the primary transport of Internet traf...

متن کامل

Enhanced Certificate Transparency and End-to-End Encrypted Mail

The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend certificate transparency, a proposal in this direction, so that it efficiently handles certificate revocation. We show how this extension can be used to build a secure end-to-end email or messaging system using ...

متن کامل

Transactions on Engineering and Sciences, Vol. I, August 2013

Content distribution applications such as digital broadcasting, video-on-demand services, video conferencing, surveillance, and telesurgery are confronted with difficulties besides the inevitable compression and quality challenges with respect to intellectual property management, authenticity, privacy regulations, and access control. Meeting such security requirements in an end-to-end video dis...

متن کامل

legal aspects of end of life and end stage disease

Abstract:  Aims: End of Life (EOL) care providers potentially face by variety of legal and professional dilemma. This study is designed to review and analyze these challenges and approaches to solve them. Materials & Methods:   In this narrative review study, legal aspects of end-of-life care in subjects such as medical assisted dying, decision-making capacity and withdrawal of life-sustaining...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017