{"id":31528,"date":"2017-03-01T17:41:06","date_gmt":"2017-03-01T22:41:06","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/research-proposes-full-journey-email-encryption-the-stack.php"},"modified":"2017-03-01T17:41:06","modified_gmt":"2017-03-01T22:41:06","slug":"research-proposes-full-journey-email-encryption-the-stack","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/research-proposes-full-journey-email-encryption-the-stack.php","title":{"rendered":"Research proposes &#8216;full-journey&#8217; email encryption &#8211; The Stack"},"content":{"rendered":"<p><p>    A group of researchers from Austin, NYU and Cornell    universities have developed a scheme for genuine end-to-end    email encryption  though that term might need to be redefined    in the context of their project.  <\/p>\n<p>    Traditional end-to-end email encryption only provides security    in transit between mail servers  once on the servers    themselves, the emails are processed as plain text,    facilitating processes such as spam filters.  <\/p>\n<p>    The group proposes a system    called Pretzel, which develops a cryptographic algorithm that    permits two parties to blindly contribute to encryption, and    extends the concept to email.  <\/p>\n<p>    However the researchers admit that providers will need to    furnish additional computing resources in order to handle the    encryption process.  <\/p>\n<p>    The benefit of the scheme is the near-impossibility of    interception\/decryption from emails captured in transit.    Gaining control of network nodes is a widespread practice on    both sides of the law, with headlines in recent years going to    official and malfeasant actors taking control of Tor exit nodes    with a view to de-anonymising information.  <\/p>\n<p>    In practice genuine end-to-end encryption has been available    via PGP since the early 1990s, and the functionality is offered    by certain of the larger providers  notably those who are    party to the decrypted emails at the client end, at which point    the information can be monetised by targeted advertising.  <\/p>\n<p>    But the researchers note that the limited availability of PGP    has more commercial than governmental imperatives behind it:  <\/p>\n<p>    A crucial reasonat least the one that is often citedis    that encryption appears to be incompatible with value-added    functions (such as spam filtering, email search, and predictive    personal assistanceand with the functions by which free    webmail providers monetize user data (for example, topic    extraction)These functions are proprietary; for example, the    provider might have invested in training a spam filtering    model, and does not want to publicize it (even if a dedicated    party can infer itSo it follows that the functions must    execute on providers servers with access to plaintext    emails.  <\/p>\n<p>    Pretzels innovation is in following up email decryption    (usually provided by public\/private keys as in PGP) with a    second protocol which operates between the email provider and    each mail recipient, called secure two-party computation (2PC).    2PC schemes can process any function in a manner hidden from    one or more of the concerned parties.  <\/p>\n<p>    However the processing needs of full-scale 2PC systems would    not be realistic as a transport mechanism, and so the    researchers have produced a slimmed-down and more linear    throughput, with certain algorithm functionality baked into    the procedure.  <\/p>\n<p>    At the moment the teams implementation of Pretzel permits core    commercial operations such as email scanning (i.e. for    advertising or spam-identification purposes), and a limited    subset of other usual mail server functions. The researchers    hope to add the ability to accommodate predictive personal    assistance services and virus scanning in the future, as well    as the ability to hide metadata  some of the most    fiercely-sought information among security services and hackers    alike.  <\/p>\n<p>    Ultimately, our goal is just to demonstrate an    alternative. We dont claim that Pretzel is an optimal point in    the three-way tradeoff among functionality, performance, and    privacywe dont yet know what such an optimum would be. We    simply claim that it is different from the status quo (which    combines rich functionality, superb performance, but no    encryption by default) and that it is potentially    plausible.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/thestack.com\/security\/2017\/03\/01\/research-proposes-full-journey-email-encryption\/\" title=\"Research proposes 'full-journey' email encryption - The Stack\">Research proposes 'full-journey' email encryption - The Stack<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A group of researchers from Austin, NYU and Cornell universities have developed a scheme for genuine end-to-end email encryption though that term might need to be redefined in the context of their project. Traditional end-to-end email encryption only provides security in transit between mail servers once on the servers themselves, the emails are processed as plain text, facilitating processes such as spam filters<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31528","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31528"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31528"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31528\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}