STEAK: Security-Transparent Email with Automatically-managed Keys
نویسندگان
چکیده
Email is a core communication mechanism for society. Current email protocols, like SMTP and IMAP, do not provide fundamental security properties like confidentiality, integrity, and authenticity. Users can optionally employ public-key cryptography like PGP on top of email, but the steps for doing so are too complicated for the average user. This paper presents SecurityTransparent Email with Automatically-managed Keys (STEAK), a backwards-compatible email system that offers stronger security guarantees than SMTP while retaining most of the usability benefits of webmail. Our main contribution is a key management protocol that performs key generation, distribution, and revocation securely and automatically. Like webmail, users can seamlessly access email from various devices. For message exchange, unlike conventional email, STEAK uses a pull-based approach where senders host messages for receivers to download. We exploit this to implement an “unsend” feature, as well as economically disincentivize spam. Our prototype implementation and a qualitative usability evaluation show that STEAK requires less workflow changes than using PGP with email. Our preliminary performance evaluation shows that the system is responsive enough for typical use.
منابع مشابه
Transparent Internet E-mail Security
This paper describes the design and prototype implementation of a comprehensive system for securing Internet e-mail transparently, so that the only user intervention required is the initial setup and speciication of a trust policy. Our system uses the PolicyMaker trust management engine for evaluating the trustworthiness of keys, in particular whether the given binding between key and name is v...
متن کاملA High Capacity Email Steganography Scheme using Dictionary
The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...
متن کاملTrust Management for E-Commerce
All human interaction is based on trust, meaning that we choose interaction partners and make commitment decisions based on how much we trust the other party. This applies to commerce as well as to ecommerce. In normal commerce, established frameworks, legal and other, provide protection and assurance upon which trust is built. Because e-commerce is largely based on information technology, IT s...
متن کاملAn open middleware for smart cards
Security of applications and services is becoming increasingly important for today’s software applications. The design and development of complex software systems is much better off if security issues are addressed since the early stages of the design and development, rather than applied as a late patch to an existing application. In order to achieve an adequate level of security while exchangi...
متن کاملA Fast, Blind, Transparent, and Robust Image Watermarking Algorithm with Extended Torus Automorphism Permutation
In this paper, we present a novel algorithm for watermarking a grayscale digital image with a binary watermark in the DCT domain. The algorithm is transparent since the watermark is not really embedded in the host image. This results in zero distortion of the watermarked host image. The embedded watermark is robust to most common unintentional attacks by intelligently utilizing the signs of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014