
4.4 Technological measures 73
decryption. To verify the cryptographic signature of a message, the originally
signed message body is used, and the hash of that is compared to the hash
of the decrypted digital signature. Approaches can also differ in the kind of
identity that is verified: some are user- or address-based (signing is usually
done by the MUA) while others work by verifying the domain or the ESP
(signing is done by the MTA) respectively.
Public key cryptography proposals include S/MIME [139], PGP [19],
META Signatures [96], IIM [55], DomainKeys [40], Microsoft Postmarks [106]
and others. The IETF has set up the working group “ Message Authentica-
tion Signature Standards (MASS)” to discuss such approaches submitted for
standardization. With some proposals, the public key is not included in the
signature and it is made available in some special record or server associated
with sender identity (this is the approach taken by DomainKeys, which puts
the public key in a DNS record and is the approach used by PGP with its
keyserver system). Others prefer to include the public key as part of the signa-
ture itself (META, IIM, S/MIME and most other digital signature schemes),
which is more advantageous as it allows the receiver to decrypt and verify the
signature without any external lookup (and it can be done offline). However,
such verification does not guarantee that the signature will indeed be autho-
rized by the sender, so the final step would still involve either checking with
the sender’s authorized source to make sure that the public key used in sig-
nature is associated with the sender’s public key, or by having the public key
itself signed by a third party (the third party could be a certificate authority),
whose key is known and trusted to be correct by the recipient [95].
Table 4.4 summarizes some of the most important cryptographic authenti-
cation proposals with the identity being verified, the data which are signed, the
signature location and format, and some more information about the cryptog-
raphy and the signature type. Recently, DomainKeys Identified Mail (DKIM)
[4] has been proposed. This combines Yahoo’s DomainKeys and Cisco’s Iden-
tified Internet Mail. Advocates of cryptographic solutions argue that spam
could be effectively addressed by these. Tompkins and Handley [179], for ex-
ample, sketch an e-mail environment based on public key cryptography, where
A accepts a message from B only if B’s public key is in A’s database, either
because A and B know each other or because they share a common contact C,
who has introduced B to A. Public e-mail communication has to be initiated
via a form on a publicly accessible web page. However, some major limitations
and drawbacks of cryptographic authentication in fighting spam emerge here:
They primarily address e-mail spoofing and thus have no effect if spam e-
mails do not contain spoofed data or data cannot be categorized as spoofed.
This may happen when a user’s private key is not sufficiently protected
against unauthorized access – then the SO cannot distinguish between
genuine and forged e-mails – or when spammers can readily obtain keys
for a domain intended, and then used, solely for the temporary purpose of
spamming.