Technische Universität Braunschweig
  • Study & Teaching
    • Beginning your Studies
      • Prospective Students
      • Degree Programmes
      • Application
      • Fit4TU
      • Why Braunschweig?
    • During your Studies
      • Fresher's Hub
      • Term Dates
      • Courses
      • Practical Information
      • Beratungsnavi
      • Additional Qualifications
      • Financing and Costs
      • Special Circumstances
      • Health and Well-being
      • Campus life
    • At the End of your Studies
      • Discontinuation and Credentials Certification
      • After graduation
      • Alumni*ae
    • For Teaching Staff
      • Strategy, Offers and Information
      • Learning Management System Stud.IP
    • Contact
      • Study Service Centre
      • Academic Advice Service
      • Student Office
      • Career Service
  • Research
    • Research Profile
      • Core Research Areas
      • Clusters of Excellence at TU Braunschweig
      • Research Projects
      • Research Centres
      • Professors‘ Research Profiles
    • Early Career Researchers
      • Support in the early stages of an academic career
      • PhD-Students
      • Postdocs
      • Junior research group leaders
      • Junior Professorship and Tenure-Track
      • Habilitation
      • Service Offers for Scientists
    • Research Data & Transparency
      • Transparency in Research
      • Research Data
      • Open Access Strategy
      • Digital Research Announcement
    • Research Funding
      • Research Funding Network
      • Research funding
    • Contact
      • Research Services
      • Academy for Graduates
  • International
    • International Students
      • Why Braunschweig?
      • Degree seeking students
      • Exchange Studies
      • TU Braunschweig Summer School
      • Refugees
      • International Student Support
    • Going Abroad
      • Studying abroad
      • Internships abroad
      • Teaching and research abroad
      • Working abroad
    • International Researchers
      • Welcome Support
      • PhD Studies
      • Service for host institutes
    • Language and intercultural competence training
      • Learning German
      • Learning Foreign Languages
      • Intercultural Communication
    • International Profile
      • Internationalisation
      • International Cooperations
      • Strategic Partnerships
      • International networks
    • International House
      • About us
      • Contact & Office Hours
      • News and Events
      • International Days
      • 5th Student Conference: Internationalisation of Higher Education
      • Newsletter, Podcast & Videos
      • Job Advertisements
  • TU Braunschweig
    • Our Profile
      • Aims & Values
      • Regulations and Guidelines
      • Alliances & Partners
      • The University Development Initiative 2030
      • Foundation University
      • Facts & Figures
      • Our History
    • Career
      • Working at TU Braunschweig
      • Vacancies
    • Economy & Business
      • Entrepreneurship
      • Friends & Supporters
    • General Public
      • Check-in for Students
      • The Student House
      • Access to the University Library
    • Media Services
      • Communications and Press Service
      • Services for media
      • Film and photo permits
      • Advices for scientists
      • Topics and stories
    • Contact
      • General Contact
      • Getting here
  • Organisation
    • Presidency & Administration
      • Executive Board
      • Designated Offices
      • Administration
      • Committees
    • Faculties
      • Carl-Friedrich-Gauß-Fakultät
      • Faculty of Life Sciences
      • Faculty of Architecture, Civil Engineering and Environmental Sciences
      • Faculty of Mechanical Engineering
      • Faculty of Electrical Engineering, Information Technology, Physics
      • Faculty of Humanities and Education
    • Institutes
      • Institutes from A to Z
    • Facilities
      • University Library
      • Gauß-IT-Zentrum
      • Professional and Personnel Development
      • International House
      • The Project House of the TU Braunschweig
      • Transfer Service
      • University Sports Center
      • Facilities from A to Z
    • Equal Opportunity Office
      • Equal Opportunity Office
      • Family
      • Diversity for Students
  • Search
  • Quicklinks
    • People Search
    • Webmail
    • cloud.TU Braunschweig
    • Messenger
    • Cafeteria
    • Courses
    • Stud.IP
    • Library Catalogue
    • IT Services
    • Information Portal (employees)
    • Link Collection
    • DE
    • EN
    • IBR YouTube
    • Facebook
    • Instagram
    • YouTube
    • LinkedIn
    • Mastodon
Menu
  • Organisation
  • Faculties
  • Carl-Friedrich-Gauß-Fakultät
  • Institutes
  • Institute of Operating Systems and Computer Networks
  • Open Theses
Logo IBR
IBR Login
  • Institute of Operating Systems and Computer Networks
    • News
    • About us
      • Whole Team
      • Directions
      • Floor Plan
      • Projects
      • Publications
      • Software
      • News Archive
    • Connected and Mobile Systems
      • Team
      • Courses
      • Theses
      • Projects
      • Publications
      • Software
      • Datasets
    • Reliable System Software
      • Overview
      • Team
      • Teaching
      • Theses & Jobs
      • Research
      • Publications
    • Algorithms
      • Team
      • Courses
      • Theses
      • Projects
      • Publications
    • Microprocessor Lab
    • Education
      • Winter 2025/2026
      • Summer 2025
      • Theses
    • Services
      • Library
      • Mailinglists
      • Webmail
      • Knowledge Base
      • Wiki
      • Account Management
      • Services Status
    • Spin-Offs
      • Docoloc
      • bliq (formerly AIPARK)
      • Confidential Technologies
    • Research Cooperations
      • IST.hub

Sicherheitsevaluation von Kryptografischen Verfahren in OpenPGPSecurity Evaluation of Cryptographic Schemes in OpenPGP

Student(visible for staff only)
SupervisorDr. Dominik Schürmann
Dr. Jürgen Koslowski
ProfessorProf. Dr.-Ing. Lars Wolf
IBR GroupCM (Prof. Wolf)
TypeMaster Thesis, Project Thesis
Statusfinished

Introduction

OpenPGP is a standard consisting of methods for key management, digital signatures, encryption, and data formats. It is currently defined by RFC 4880 with several extensions. It is mainly utilized for sending end-to-end signed and encrypted emails to allow confidentiality, integrity, and authenticity between sender and recipient. Its cryptography and key management has been proven to be resistant against modern active attackers and was required by Edward Snowden to allow secure communications with him. While man-in-the-middle attacks against TLS connections are easy after infiltrating a certificate authority, OpenPGP provides a more decentralized approach to key distribution and authenticity between originator and sender.

The most common implementations are the open-source command-line program gpg written in C, its corresponding user interfaces like Enigmail, and the Bouncy Castle library written in Java. With Symantec Encryption Desktop and Symantec Encryption Server, two well developed proprietary implementations exist, too.

While the OpenPGP standard keeps its promises and has a sound message syntax and well thought out formats, it also has some weak points. These are for example:

  1. Donald T. Davis criticizes simple sign-then-encrypt-schemes like the one used in OpenPGP in his paper "Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML.". Although this paper was published in 2001, the problems are still relevant. Reading this paper leads to a more fundamental question: What exactly are the semantics of an OpenPGP signature? This question sounds obvious at first, but is actually not answered in OpenPGP's RFC. Does a signature provide integrity, authenticity, or non-repudiation?
  2. Symmetric encryption in OpenPGP's standard is not protected by a state-of-the art authenticated encryption algorithm. Most other protocols today employ AES-GCM (Galois-Counter Mode), which is a provably secure authenticated encryption using a MAC (GMAC). OpenPGP however, uses it's own creation called MDC with a fixed hash algorithm. The standard even has a section about future work on this problem. Recently, OpenPGP has been employed on smartphones, virtual servers, and for webmail applications. Does the attack model of OpenPGP still hold in these cases or does it need to be adjusted allowing CCA-attacks?

Tasks

The resulting thesis should contain a detailed security analysis of the OpenPGP standard including the theoretic background of the cryptographic schemes, an attack model, and possible attack scenarios. Available literature must be referenced, while attack scenarios described in the literature should be reproduced. Optionally, exploits should be written and/or available OpenPGP implementations should be improved. Preferably, the results of this thesis could improve the OpenPGP standard itself to make it resistant under new attack models.

  • First of all, a comprehensive literature research needs to be done to understand OpenPGP's cryptographic schemes, state-of-the-art cryptographic schemes/protocols, and the severity of the described issues. Some papers exist showing CCA-attacks against OpenPGP; these should be validated and evaluated if the problems have been fixed in recent versions of the RFC.
  • OpenPGP's cryptographic schemes should be evaluated and compared with state-of-the-art solutions. What attack scenarios are covered by OpenPGP and which not? Do attack models such as CPA- and CCA-attacks apply to OpenPGP?
  • The RFCs must be read and compared with the actual implementations in gpg and Bouncy Castle. Are their workarounds in place to prevent the attacks by Davis or can these issues be exploited in practice? If exploitable, a demonstration should be written in the language of your choice.
  • If any issues could be confirmed, possible countermeasures should be proposed and adapted for the OpenPGP standard. Optionally, these could be implemented by Bouncy Castle's OpenPGP classes or gpg.

Supervisors

This thesis will be supervised by Dr. Dominik Schürmann (IBR, CM group) and Dr. Jürgen Koslowski (ITI).

Requirements

For this work a very good understanding of real-world cryptography and protocols is required. To implement countermeasures, good knowledge of Java or C is required.

If you are interested, send an email to Dr. Dominik Schürmann including the following information:

  • Course of studies
  • Subject-related term
  • A small description of your knowledge in cryptography (have you taken the Cryptography courses by the ITI?)

Links

  • Adaptive-CCA on OpenPGP revisited
  • An attack on CFB mode encryption as used by OpenPGP
  • Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML.
  • Discussion on the Cryptography mailinglist: Does PGP use sign-then-encrypt or encrypt-then-sign?
  • On the Security of Joint Signature and Encryption
  • RFC 4880 OpenPGP Message Format
  • RFC 3156 MIME Security with OpenPGP
  • RFC 6637 Elliptic Curve Cryptography (ECC) in OpenPGP

last changed 2015-12-14, 16:24 by Dr. Dominik Schürmann

For All Visitors

Vacancies of TU Braunschweig
Career Service' Job Exchange 
Merchandising

For Students

Term Dates
Courses
Degree Programmes
Information for Freshman
TUCard

Internal Tools

Glossary (GER-EN)
Change your Personal Data

Contact

Technische Universität Braunschweig
Universitätsplatz 2
38106 Braunschweig

P. O. Box: 38092 Braunschweig
GERMANY

Phone: +49 (0) 531 391-0

Getting here

© Technische Universität Braunschweig
Imprint Privacy Accessibility