New encoding for foolproof email security

Advertisement
By Indo-Asian News Service | Updated: 12 September 2012 12:42 IST
Among the billions of emails sent back and forth daily are some that do contain personal, proprietary and sensitive information, documents, media, photos, videos and sound files.

Unfortunately, the open nature of email means that they can be intercepted and, if not encrypted, easily read by malicious third parties. Even with the PGP - pretty good privacy - encryption scheme first used in 1995, if a sender's private "key" is compromised all their previous emails encrypted with that key can be exposed.

Computer scientists Duncan Wong and Xiaojian Tian of City University of Hong Kong, explain how previous researchers had attempted to define perfect email privacy that utilizes PGP by developing a technique that would preclude the decryption of other emails should a private key be compromised, the International Journal of Security and Networks reports.

Unfortunately, say Wong and Tian, this definition fails if one allows the possibility that the email server itself may be compromised by hackers or other malicious users, according to a Hong Kong statement.

Advertisement

The team has now defined perfect forward secrecy for email as follows and suggested a technical solution to enable email security to be independent of the server used to send the message.

Advertisement

"An e-mail system provides perfect forward secrecy if any third party, including the e-mail server, cannot recover previous session keys between the sender and the recipient even if the long-term secret keys of the sender and the recipient are compromised," suggest Wong and Tian.

By building a new email protocol on this principle, the team suggests that it is now possible to exchange emails with almost zero risk of interference from third parties. "Our protocol provides both confidentiality and message authentication in addition to perfect forward secrecy," they explain.

Advertisement

The team's protocol involves Alice sending Bob an encrypted email with the hope that Charles will not be able to intercept and decrypt the message. Before the email is encrypted and sent, the protocol suggested by Wong and Tian has Alice's computer send an identification code to the email server.

The server creates a random session "hash" that is then used to encrypt the actual encryption key for the email Alice is about to send. Meanwhile, Bob as putative recipient receives the key used to create the hash and bounces back an identification tag. This allows Alice and Bob to verify each other's identity.

Advertisement

These preliminary steps are all automatically and without Alice or Bob needing to do anything in advance. Now, Alice writes her email, encrypts it using PGP and then "hashes" it using the random key from the server. When Bob receives the encrypted message he uses his version of the hash to unlock the container within which the PGP-encrypted email sits.

Bob then uses Alice's public PGP key to decrypt the message itself. No snoopers on the internet between Alice and Bob, not even the email server ever have access to the PGP encrypted email in the open.

Moreover, because a different key is used to lock up the PGP encrypted email with a second one-time layer, even if the PGP security is compromised, past emails created with the same key cannot be unlocked.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: pretty good privacy, email, PGP
Advertisement
Popular Mobile Brands
  1. Samsung Galaxy S26+ Reportedly Listed for Sale Online Ahead of Launch
  2. Lava Bold N2 Will Be Launched in India on This Date: See Expected Specs
  3. Xiaomi 17 Series Leak Hints at Imminent Launch Ahead of MWC at These Prices
  4. Anthropic's First Indian Office in Bengaluru Is Now Open
  5. Poco X8 Pro Spotted on Geekbench With This Dimensity 8000 Series Chipset
  6. Apple to Reportedly Launch Low-Cost MacBook in 'Playful Colors' in March
  7. Oppo K14x 5G With 6,500mAh Battery Goes on Sale in India: See Price, Offers
  8. Vivo X300 FE Reportedly Bags IMDA and TUV Certifications Ahead of Launch
  1. iPhone 18 Series to Drop SIM Card Slot in Europe to Make Room for Slightly Larger Battery: Report
  2. Poco X8 Pro Spotted on Geekbench With MediaTek Dimensity 8500 Ultra SoC, Android 16
  3. Xiaomi 17, Xiaomi 17 Ultra Global Price Details, Launch Date and Colour Options Leaked
  4. X Building Smart 'Cashtags' to Let Users Check Cryptocurrency Prices in Real-Time
  5. Samsung Galaxy A27 5G Listing on IMEI Database Suggests a Galaxy A26 Successor Is on the Way
  6. Anthropic Inaugurates First Indian Office in Bengaluru, Starts Hiring Local Talent
  7. Apple Tipped to Adopt Samsung's Privacy Display Technology for MacBook Models by 2029
  8. Oppo Find X10 Series Tipped to Launch in H2 2026 With Built-In Magnets for Wireless Charging
  9. AMD and TCS to Co-Develop Helios AI Data Centre Architecture, Deliver 200MW Data Centre Blueprint
  10. Tecno Spark 50 4G Tipped to Launch Globally Soon; Design, Colourways, Key Features Leaked
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.