• Treffer 5 von 5
Zurück zur Trefferliste

What's up John­ny? – Co­vert Con­tent At­tacks on Email End-to-End En­cryp­ti­on

  • We show practical attacks against OpenPGP and S/MIMEencryption and digital signatures in the context of email. Instead of tar-geting the underlying cryptographic primitives, our attacks abuse legiti-mate features of the MIME standard and HTML, as supported by emailclients, to deceive the user regarding the actual message content. Wedemonstrate how the attacker can unknowingly abuse the user as a de-cryption oracle by replying to an unsuspicious looking email. Using thistechnique, the plaintext of hundreds of encrypted emails can be leakedat once. Furthermore, we show how users could be tricked into signingarbitrary text by replying to emails containing CSS conditional rules.An evaluation shows that "out of" OpenPGP-capable email clients,as well as "out of" clients supporting S/MIME, are vulnerable to atleast one attack. We provide different countermeasures and discuss theiradvantages and disadvantages.

Metadaten exportieren

Weitere Dienste

Metadaten
Verfasserangaben:Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk
Titel des übergeordneten Werkes (Deutsch):17th In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty (ACNS 2019)
Dokumentart:Beitrag in einer Konferenzveröffentlichung
Sprache:Deutsch
Datum der Veröffentlichung (online):21.05.2019
Jahr der Erstveröffentlichung:2019
Betreiber des Publikationsservers:FH Münster - University of Applied Sciences
Datum der Freischaltung:21.05.2019
Erste Seite:1
Letzte Seite:18
Fachbereiche:Elektrotechnik und Informatik (ETI)
Publikationsliste:Schinzel, Sebastian
Lizenz (Deutsch):License LogoBibliographische Daten