Bearbeiter | (nur für Mitarbeiter:innen einsehbar) |
Betreuer | Dr. Dominik Schürmann |
Dr. Jürgen Koslowski | |
Professor | Prof. Dr.-Ing. Lars Wolf |
IBR Gruppe | CM (Prof. Wolf) |
Art | Masterarbeit, Projektarbeit |
Status | abgeschlossen |
IntroductionOpenPGP is a standard consisting of methods for key management, digital signatures, encryption, and data formats. It is currently defined by RFC 4880 with several extensions. It is mainly utilized for sending end-to-end signed and encrypted emails to allow confidentiality, integrity, and authenticity between sender and recipient. Its cryptography and key management has been proven to be resistant against modern active attackers and was required by Edward Snowden to allow secure communications with him. While man-in-the-middle attacks against TLS connections are easy after infiltrating a certificate authority, OpenPGP provides a more decentralized approach to key distribution and authenticity between originator and sender. The most common implementations are the open-source command-line program gpg written in C, its corresponding user interfaces like Enigmail, and the Bouncy Castle library written in Java. With Symantec Encryption Desktop and Symantec Encryption Server, two well developed proprietary implementations exist, too. While the OpenPGP standard keeps its promises and has a sound message syntax and well thought out formats, it also has some weak points. These are for example:
TasksThe resulting thesis should contain a detailed security analysis of the OpenPGP standard including the theoretic background of the cryptographic schemes, an attack model, and possible attack scenarios. Available literature must be referenced, while attack scenarios described in the literature should be reproduced. Optionally, exploits should be written and/or available OpenPGP implementations should be improved. Preferably, the results of this thesis could improve the OpenPGP standard itself to make it resistant under new attack models.
SupervisorsThis thesis will be supervised by Dr. Dominik Schürmann (IBR, CM group) and Dr. Jürgen Koslowski (ITI). RequirementsFor this work a very good understanding of real-world cryptography and protocols is required. To implement countermeasures, good knowledge of Java or C is required. If you are interested, send an email to Dr. Dominik Schürmann including the following information:
Links
|