New encoding for foolproof email security

Advertisement
By Indo-Asian News Service | Updated: 12 September 2012 12:42 IST
New encoding for foolproof email security
Among the billions of emails sent back and forth daily are some that do contain personal, proprietary and sensitive information, documents, media, photos, videos and sound files.

Unfortunately, the open nature of email means that they can be intercepted and, if not encrypted, easily read by malicious third parties. Even with the PGP - pretty good privacy - encryption scheme first used in 1995, if a sender's private "key" is compromised all their previous emails encrypted with that key can be exposed.

Computer scientists Duncan Wong and Xiaojian Tian of City University of Hong Kong, explain how previous researchers had attempted to define perfect email privacy that utilizes PGP by developing a technique that would preclude the decryption of other emails should a private key be compromised, the International Journal of Security and Networks reports.

Unfortunately, say Wong and Tian, this definition fails if one allows the possibility that the email server itself may be compromised by hackers or other malicious users, according to a Hong Kong statement.

The team has now defined perfect forward secrecy for email as follows and suggested a technical solution to enable email security to be independent of the server used to send the message.

Advertisement

"An e-mail system provides perfect forward secrecy if any third party, including the e-mail server, cannot recover previous session keys between the sender and the recipient even if the long-term secret keys of the sender and the recipient are compromised," suggest Wong and Tian.

By building a new email protocol on this principle, the team suggests that it is now possible to exchange emails with almost zero risk of interference from third parties. "Our protocol provides both confidentiality and message authentication in addition to perfect forward secrecy," they explain.

Advertisement

The team's protocol involves Alice sending Bob an encrypted email with the hope that Charles will not be able to intercept and decrypt the message. Before the email is encrypted and sent, the protocol suggested by Wong and Tian has Alice's computer send an identification code to the email server.

The server creates a random session "hash" that is then used to encrypt the actual encryption key for the email Alice is about to send. Meanwhile, Bob as putative recipient receives the key used to create the hash and bounces back an identification tag. This allows Alice and Bob to verify each other's identity.

Advertisement

These preliminary steps are all automatically and without Alice or Bob needing to do anything in advance. Now, Alice writes her email, encrypts it using PGP and then "hashes" it using the random key from the server. When Bob receives the encrypted message he uses his version of the hash to unlock the container within which the PGP-encrypted email sits.

Bob then uses Alice's public PGP key to decrypt the message itself. No snoopers on the internet between Alice and Bob, not even the email server ever have access to the PGP encrypted email in the open.

Moreover, because a different key is used to lock up the PGP encrypted email with a second one-time layer, even if the PGP security is compromised, past emails created with the same key cannot be unlocked.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: pretty good privacy, email, PGP
Advertisement
Popular Mobile Brands
  1. Oppo Reno 14 5G Series Global Launch Scheduled for This Date
  2. iPhone 16 Pro, iPhone 16 Pro Max Price Discounted on Flipkart: See Offers
  3. Samsung Galaxy Buds Core Listed Online, Revealing Design, Specifications
  4. Samsung Galaxy S24 FE Gets a Price Cut on Amazon: See Offer
  1. SpaceX Starship Rocket Explodes During Ground Test at Texas Launch Pad
  2. NASA Postpones Axiom Mission 4 Launch to Ensure Space Station Readiness After Repairs
  3. Doom: The Dark Ages Review: Rip and Tear, Medieval Style
  4. Save Nalla Pasanga Now Streaming on Aha Tamil: Everything You Need to Know About Romantic Web Series
  5. Yugi Tamil Movie Now Streaming on Aha: A Gritty Tale of Crime, Surrogacy, and Revenge
  6. Lovely Now Available on Amazon Prime Video: What You Need to Know About Malayalam Fantasy Drama
  7. The Hunt- The Rajiv Gandhi Assassination Case OTT Release Date Revealed
  8. Salakaar OTT Release: When and Where to Watch Mouni Roy Starrer Spy Thriller Online?
  9. Samsung Galaxy S24 FE Gets a Price Cut on Amazon: See Offer
  10. Samsung Galaxy Buds Core Listed on Company Site; Design, Specifications Revealed
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.