On 9/17/2014 9:43 AM, Henry Augustus Chamberlain wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
17/09/2014
Hello.
I think I might have a way to make email encryption easily accessible
to the general public, and would be very grateful if you could share
any comments you might have.
I think the existing algorithms (RSA, Diffie-Hellman, Elliptic Curve
equivalents) are perfectly sound, as are the software programs (GPG
and email client plug-ins), but the user is still required to
understand concepts like public/private keys and digital signatures. I
think these conceptual difficulties are what are holding back a more
widespread adoption of email encryption, and this is what I wish to
solve. (See "Why Johnny Can't Encrypt".)
I propose that we use the local part of the email address to store the
public key, so instead of [email protected]
<mailto:[email protected]>, my email address would be
(64 random letters)@gmail.com <http://gmail.com>. (This is by no means
a new principle - Bitcoin does something similar, although it uses a
hash of the public key rather than the key itself.) RSA keys are too
long, but elliptic curve keys would work fine.
I think combining addresses and keys actually makes intuitive sense.
When you send an email to a particular address, you expect it to be
read by that person and no-one else. Likewise, when you receive an
email from some particular address, you expect to have originated from
that address and nowhere else. This is precisely what public-key
encryption guarantees, by means of encryption in the former case and
digital signatures in the latter case. Using keys as addresses would
remove the need for the user to understand public keys, encryption and
digital signatures: everything would "just work" automatically -
without compromising security in any way.
Having long (and unmemorable) email addresses would certainly create
some problems, although perhaps fewer than one might initially
imagine. "Mailto" links on web pages would continue to work as they
always have done, as would institutions' email directories and private
individuals' address books. Exchanging email addresses in person might
be problematic, but QR codes might be of use here: they can be
displayed on a smartphone screen or printed on business cards. Passing
email addresses over the telephone remains a problem (although in the
case of mobile phones, a text message could be used instead).
Somebody not using encrypted emails could still click on your "mailto"
link and send you an email, although it will be unencrypted (and they
would probably ask you why your email address is such a strange one!).
Perhaps some people might choose to add a footer to unencrypted emails
- like Hotmail used to do - explaining that they use encryption, and
encouraging others to do likewise.
The issue of private keys still remains, but perhaps they could take
the place of passwords: when configuring a desktop (or mobile) email
client, one would provide a private key file (or a QR code) instead of
a password. SSH already allows users to login using public key
certificates rather than passwords. Configuring a phone (or new PC) is
only ever done once, so hopefully this small hurdle would not impose
an undue burden on the user. Webmail would be tricky to use, since a
user could hardly be expected to memorise a 64 character password, but
one might question whether webmail can have any place at all in an
end-to-end encryption system.
In summary, I believe my proposal would allow encrypted emails to very
closely resemble the existing unencrypted system that users are
accustomed to. As far as the user is concerned, encrypted emails work
just like normal emails, except that the email addresses are longer,
and their password is replaced with a QR code that needs to be printed
off and stored somewhere safe. In return for this, their messages are
guaranteed to be encrypted end-to-end and digitally signed, or from
the user's point of view, emails would "just work" the way they
should: "To Mr X" means that only Mr X can receive it, and "From Mr Y"
means that only Mr Y could have sent it.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=MiF+
-----END PGP SIGNATURE-----
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography
As someone who deals with security measures each day I need to come at
it from that angle. Your method is great save for the fact that
spammers love spoofed addresses. I doubt anyone could trust something like
[email protected]
Am I missing something? If I'm not, it seems more measures should be
taken. What about digital signatures? Would you change the scheem?
--
Kevin
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography