Privacy Enhanced Mail for WWW

by
Stephan Kolletzki
Institute for Telecooperation Technology
GMD - TKT
Dolivostr. 15
D-64293 Darmstadt

kolletzki@darmstadt.gmd.de


Keywords:
Charging and Security

Overview

Internet services are increasingly used for the transmission of sensitive and economical data. Commercial WWW service providers or teleshops allow cashless payment, where clients have to enter besides other personal data their credit card number. This is obviously a security hole. Moreover, the network used by WWW is open and contains considerably security risks.
In spite of the insecurity of the network used, how can WWW data and HTML communication be protected against unauthorised manipulation or access?

These are necessary security enhancements to the existing WWW application:

They can be realised by cryptographic means, like symmetric or asymmetric encryption and digital signature schemes.

One way how to provide security in WWW is to equip the HTML protocol with additional tokens and built-in-facilities. Another approach is to use existent tools that cooperate with the running WWW browser, independant of the current HTML version and transmission protocol, and started as a separate client-side process. In the actual situation we prefer the latter possibility of security enhanced WWW.

In our demonstration we want to present our implementation of Privacy Enhanced Mail. Originally, it was designed for electronic mail. However, it is applicable to any type of text-oriented data and therefore, it is also suitable for WWW communication.


PEM for E-Mail

Internet Privacy Enhanced Mail [PEM: RFC 1421-24] is a "standard" set of rules how to construct a communication infrastructure with a third-party trust model.

The public-key technique is used both for digital signatures (1 to n: one signs, many can verify), and for recipient-tied encryption/decryption (n to 1: many can encrypt, one can decrypt). The related public keys have to be certified by trusted third-parties, so called Certification Authorities.

Public information that is needed during verification or encryption can be stored and accessed in local databases or in X.500 directories, e.g. valid user certificates or black lists of expired or compromised certificates.

We built a PEM filter/library using our toolkit SecuDE (Security Development Environment), which complies the demands of RFC 1421-24. Secret objects can be stored as encrypted files or, if a high degree of security is needed, on a personal smartcard. It is available as UNIX/DOS-filter utility, furthermore we added PEM functionality to some Mail User Agents like ELM or XMH.


PEM for WWW

The goal of PEM in WWW is a similar handling as PEM in electronic mail with the additional usage of HTML features.

These scenarios provide a simple but effective solution:


Our demonstration

We present the usage of digital signatures and encryption in combination with electronic mail and with HTML documents in the way described above. The demonstrated Mail User Agent will be XPEM, which performs PEM (de-)enhancement in a separate process.

See also our poster in GIF and EPS format.


Privacy Enhanced Mail for WWW -- Stephan Kolletzki -- kolletzki@darmstadt.gmd.de