E-Mail Security For The 21 Century
E-Mail Security For The 21 Century
E-Mail Security For The 21 Century
E-mail has inherently been an unsecured method of communicating since its inception. While today e-
mail is a frequently used and convenient method of exchanging information, such usage was not
planned for in the technology's beginning. The basic principles of e-mail were established more than
thirty years ago when the Internet, then called ARPANET, was an emerging technology. Trust was a
basic principle of the Internet back then. Universities, military, and governmental facilities were the
only users of the Internet and everyone knew everyone else. Back then there wasn't a need for
authentication of who actually sent the message because only a limited number of people could gain
access to the networks over which the messages were traveling. When networks began connecting to
each other, e-mail security became more important. Users realized that they needed verification of who
was sending the message to make sure no one has changed the message during transit, and, in some
cases, they realized they needed to secure that information against prying eyes.
By the mid 1990s, e-mail security became a needed addition to the messaging people already knew.
Two protocols emerged as standards: Pretty Good Protection (PGP) and Secure/Multipurpose Internet
Mail Extensions (S/MIME). Both offered digital signaturesi which added the capabilities of
authentication, non-repudiation, and data integrity. Message encryption added the capabilities of
confidentiality and data integrity. For the user this helped ensure two things: First, that only the
intended recipient can read the message. Second, that a person reading a message can be assure of the
PGP
When the Internet went public in the mid-1970sii, it opened up for anybody to have access. That open
access made all users more vulnerable because of the possibility that some users might have bad
intentions. Many vulnerabilities had not been discovered at the beginning, but it was only a matter of
time.
In 1982 a standard was created that standardized the way we send e-mailiii. SMTP, or Simple Mail
Transfer Protocol, was developed by Jonathan Postel who saw it necessary to create a system that
would provide reliability for sending messages over slow and unreliable network connections. A large
problem with SMTP was that it did not require authentication to be able to send messages iv. Thus
people could send messages without the server checking to make sure they were who they said they
message while it was making its way along through the network.
few people sit up and take notice. A non-binding resolution was Illustration 1: Screen shot of PGP
options box
added to Bill 266 in the US Senate that read like this:
systems permit the Government to obtain the plain text contents of voice, data, and other
This made Philip Zimmermann work hard to create his software that would allow the general public the
ability to protect themselves. He called it Pretty Good Privacy or PGP which was based on the RSA
public-key protocolv. For the first time, the general public had access to a secure means of
communication without the fear of government oversight. This could be the difference between life
and death in some countries where the government watches all network traffic coming into the country,
While PGP is being used by corporations, educational facilities, and the government to protect their
sensitive information, a new version of PGP was being created that would help push this technology
out to the public. GnuPG was developed by Werner Koch in 1999vi. GnuPG is an open source version
of PGP that supports the same types of encryption but is available for free. This was a big step in
pushing this technology out to the people. It can be downloaded for free and allows users to encrypt
PGP uses public key infrastructure (PKI) for signing and encrypting messages. When an encrypted e-
mail is sent the message is encrypted using the sender's private key and the recipient's public key. The
recipient then uses his private key and the sender's public key to decrypt the message. All private keys
should be protected with a strong passphrase and private keys should be protected against disclosure.
be signed and encrypted by the person who has the private key and not the owner, which would negate
the use of the key. Superseding keys on a regular basis will help protect the integrity of your signed
S/MIME
At nearly the same time, a new security protocol came out called S/MIME (Secure/Multipurpose
Internet Mail Extensions). S/MIME was fast becoming a standard by the Internet Engineering Task
Force (IETF) during the late 1990s. Microsoft had a hand in version three of the S/MIME protocol
having wide public acceptance by including support for this in the manufacturer's Outlook, Outlook
Express, and Exchange programs. Today, most e-mail client software packages work nearly
seamlessly with S/MIME and thus works behind the scenes to most users. It allows both email
S/MIME version 2 is not an IETF standard due to security risks associated with using smaller keys than
what is considered breakable. Version 3, however, has been awarded an IETF standard and is the only
Choosing a Solution
There are a number of options available for messaging using either PGP or S/MIME. Each have pros
and cons, but all provide a degree of security for the user. Users can decide which option works best for
PGP
Today, the PGP, or Pretty Good Protection, software requires a purchase from the PGP Corporation.
Different versions of the software are availablex for different purposes including e-mail, total computer,
and key management for enterprise solutions. PGP is also available for BlackBerryxi hand held devices
as well which supports enterprise solutions that companies may have implemented for company-wide
encryption solutions. While PGP is an excellent solution for businesses and companies, it could be an
GNU Privacy Guard (GnuPG) is an open source version of PGP and can be downloaded for free from
GnePG.org. GnuPG is the encryption back-end program for some additional open source software that
completes the solution. GnuPG provides file encryption and signing capabilities but OpenPGP
provides the front-end solution to work with e-mail client software to implement signing and
encryption capabilities.
Enigmail
Enigmail is a Mozilla projectxii that uses OpenPGP to add PGP capabilities to Thunderbird and
Seamonkey, both e-mail clients. Enigmail allows users to sign and encrypt
messages and attachments and verify signed and encrypted messages that
have been received. Enigmail uses OpenPGP Key Managerxiii to manage stored public and private keys
extension to Thunderbird.
S/MIME
S/MIME certificates are usually assigned by a trusted source and thus are usually issued
by dedicated security companies. Thawte is one of those companies that issues S/MIME
certificates, as well as SSL certificates, but does something that most companies don't.
Thawte issues personal S/MIME certificates for free and even has its own web of trust that establishes
rules for verification of the owner of the certificate. This is important as you must trust the procedure
of verification of the owner or you wouldn't be able to trust the signed documents that you receive.
There are other companies that provide S/MIME certificates but are more driven to the business world
rather easy. Most e-mail clients have settings for S/MIME security built-in. With the settings built-in
S/MIME
S/MIME messages present an unusual problem for users that do not use a client that is designed to
handle S/MIME messages. These programs actually present the signature as an attached file which can
confuse the recipient and can cause some programs to flag the message as suspicious. Many users of
“webmail” clients experience this problem and many users fear these attachments as being viruses.
With PGP, and its variants, having been out on the street for over ten years an amazingly low number
of people actually use this solution. This could be a result of having to set up and use an additional
piece of software or because people just don't see the necessity of securing their communications.
Also, a non-user might be confused by receiving a signed message from a user of PGP because of the
injection of the PGP signature at the end of the message (see Illustration 3 below). This additional
Summary
The Internet has changed greatly over the years, making security more important today, particularly for
users wishing to transmit sensitive information. PGP and S/MIME will provide users with protection
when sending messages over networks and over the Internet. Depending on which standard you wish
The author, Eric H Christensen, is an information technology professional with a government agency