Skip to main content

SecMGW — An Open-Source Enterprise Gateway for Secure E-Mail

  • Chapter
ISSE 2004 — Securing Electronic Business Processes
  • 98 Accesses

Abstract

Securing e-mail with cryptography and PKI is an effective countermeasure against common threats like SPAM, malware, or industrial espionage. Compared to the troublesome handling of PKI-enabled applications by end-users, the idea of a centralized gateway managing all cryptographic tasks seems very attractive.

However, such a gateway represents a single point of attack as it stores a lot of keys. We show how to address this issue by means of threshold cryptography and describe the SecMGW concept which easily integrates in existing environments. SecMGW was implemented solely using open-source products making it a cost-effective solution, well-suited for small and medium enterprises.

The author's work was supported by the German National Research Foundation (DFG) as part of the PhD program “Enabling Technologies for Elecatronic Commerce„ at Technische Universität Darmstadt.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Appel, I. Biehl, A. Fuhrmann, M. Ruppert, T. Takagi, A. Takura, and C. Valentin. Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter RSA-Signaturen, DuD Fachbeitr äge, vieweg, 2000. (in German)

    Google Scholar 

  2. C. Boyd. Digital multisignatures. Cryptography and Coding, Clarendon Press, 1989.

    Google Scholar 

  3. D. Boneh, X. Ding, and G. Tsudik. A method for fast revocation of public key certificates and security capabilities. Proc. 10th USENIX Security Symposium, Washington DC, USA, 2001.

    Google Scholar 

  4. D. Crocker. Standard for the Format of ARPA Internet Text Messages. RFC 822,1982.

    Google Scholar 

  5. D. Davis. Compliance defects in public-key cryptography. Proc. 5th USENIX Security Symposium, San Jose, USA, 1996.

    Google Scholar 

  6. M. Jalali-Sohi and P. Ebinger. Towards Efficient PKIs for Restricted Mobile Devices. Proc. IASTED International Conference Communications and Computer Networks, Cambridge MA, USA, 2002.

    Google Scholar 

  7. B. Friedmann, D. Hurley, D.C. Howe, E. Feiten, and H. Nissenbaum. Users’ Conception of Web Security: A Comparative Study. Proc. Conference on Human Factors in Computing Systems, Minneapolis, USA, 2002.

    Google Scholar 

  8. R.W. Gerling and S. Kelm. E-Mail-Verschl üsselungsproxies in der Praxis. Proc. 11th DFN-CERT/PCA Workshop, Hamburg, Germany, 2004. (in German)

    Google Scholar 

  9. B. Hunter and B. Filipovic. Enabling PKI Services for Thin-Clients. Datenschutz und Datensicherheit (26), 2002.

    Google Scholar 

  10. International Data Corporation (IDC): Worldwide Email Usage Forecast, 2002–2006: Know What’s Coming Your Way. 2002.

    Google Scholar 

  11. C. Kaufman, R. Perlman, Radia, and M. Speciner. Network Security: Private Communication in a Public World. Prentice Hall, 2002.

    Google Scholar 

  12. P. MacKenzie and M.K. Reiter. Networked Cryptographic Devices Resilient to Capture. International Journal of Information Security 2(1), 2003.

    Google Scholar 

  13. R. Oppliger. Secure Messaging with PGP and S/MIME, Artech House, 2001.

    Google Scholar 

  14. T. Perrin, L. Bruns, J. Moreh and T. Olkin. Delegated Cryptography, Online Trusted Third Parties, and PKI. Proc. 1st Annual PKI Research Workshop, Gaithersburg MD, USA, 2002.

    Google Scholar 

  15. N. Pohlmann. Die virtuelle Poststelle. IT-Sicherheit im verteilten Chaos, Secu-Media Verlag, 2003. (in German)

    Google Scholar 

  16. J.B. Postel. Simple Mail Transfer Protocol, RFC 821,1982

    Google Scholar 

  17. M.A. Sasse, S. Brostoff, D. Weirich. Transforming the ‘weakest link’. BT Technology Journal 19(3), 2001.

    Google Scholar 

  18. M.A. Sasse. Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery. Proc. Conference on Human Factors in Computing Systems, Fort Lauderdale, USA, 2003.

    Google Scholar 

  19. Seemann, Henning: Pragmatic Solutions to Make E-Mail Security Work. Proc. Information Security Solutions Europe, Vienna, Austria, 2003.

    Google Scholar 

  20. T. Straub. Zur Absicherung von PKI-Outsourcing mit Hilfe verteilter digitaler Signaturen. Proc. DACH Security, Basel, Switzerland, 2004. (in German)

    Google Scholar 

  21. T. Straub. How to strengthen certificate enrolment. Proc. WartaCrypt, Bedlewo, Poland, 2004. (to appear)

    Google Scholar 

  22. J. Voßbein and R. Voßbein. KES/KPMG-Sicherheitsstudie: Lagebericht zur IT-Sicherheit. kes 3 and 4, 2002, available online http://www.kes.info. (in German)

  23. A. Whitten and J.D. Tygar. Why Johnny Can’t Encrpyt: A Usability Evaluation of PGP 5.0. Proc. 8th USENIX Security Symposium, Washington DC, USA, 1999.

    Google Scholar 

  24. T. Wu, M. Malkin, and D. Boneh. Building Intrusion Tolerant Applications. Proc. 8th USENIX Security Symposium Washington DC, USA, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Straub, T., Fleck, M., Grewe, R., Lenze, O. (2004). SecMGW — An Open-Source Enterprise Gateway for Secure E-Mail. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84984-7_24

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05910-1

  • Online ISBN: 978-3-322-84984-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics