Abstract Defective Sign & Encrypt in S/MIME,

نویسنده

  • Don Davis
چکیده

Simple Sign & Encrypt, by itself, is not very secure. Cryptographers know this well, but application programmers and standards authors still tend to put too much trust in simple Sign-and-Encrypt. In fact, every secure e-mail protocol, old and new, has codi ed na ve Sign & Encrypt as acceptable security practice. S/MIME, PKCS#7, PGP, OpenPGP, PEM, and MOSS all su er from this aw. Similarly, the secure document protocols PKCS#7, XML-Signature, and XML-Encryption su er from the same aw. Na ve Sign & Encrypt appears only in le-security and mailsecurity applications, but this narrow scope is becoming more important to the rapidly-growing class of commercial users. With leand mail-encryption seeing widespread use, and with awed encryption in play, we can expect widespread exposures. In this paper, we analyze the na ve Sign & Encrypt aw, we review the defective sign/encrypt standards, and we describe a comprehensive set of simple repairs. The various repairs all have a common feature: when signing and encryption are combined, the inner crypto layer must somehow depend on the outer layer, so as to reveal any tampering with the outer layer.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML

Simple Sign & Encrypt, by itself, is not very secure. Cryptographers know this well, but application programmers and standards authors still tend to put too much trust in simple Sign-and-Encrypt. In fact, every secure e-mail protocol, old and new, has codiied na ve Sign & Encrypt as acceptable security practice. MOSS all suuer from this aw. Similarly, the secure document protocols PKCS#7, XML-S...

متن کامل

Cryptographic Message Syntax

Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six month...

متن کامل

Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails

Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers from poor scalability due to its linear computation and communication cost. In this paper, we propose a new practical and secure scheme, called multiplex encryption. By combining the ideas of identity-based mediated RS...

متن کامل

Current Trends in IT - Security – Pragmatic Approaches

Early PKI projects fell short in getting the critical mass of users subscribed because they were too expensive and to ambigious. Now, beyond the hype, there is a demand for improvement of security step by step rather than for big projects. Now, linking up existing PKI-islands, using S/MIME, introducing single sign-on and rising awareness are hot topics. Our vision, however, remains a globally a...

متن کامل

Implementing Company Classification Policy with the S/MIME Security Label

Implementing Company Classification Policy with the S/MIME Security Label Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document discusses how company security policy for data classification can be mapped to the S/MIME security label. Actual policies from ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001