SlideShare a Scribd company logo
Bitmessage:An
Analysis
Vikram Reddy Pareddy
CSc 8222
Department of Computer Science, Georgia State University
Email
• SMTP – 1981
• Simple Protocol - designed mainly for academic
and government use.
• No data protection strategies included
SMTP
Improvements on SMTP
• Sender Policy Framework(SPF) – It is an email
validation system that tries to prevent spam by
detecting spoofing, by verifying sender’s IP
address. The domain administrators are expected
to designate hosts in that domain that are
legitimate hosts.
• Domain Keys Identified Mail(DKIM) – It is a
method of associating a domain name to the
email message to make someone responsible for
the email. This responsibility is set by using digital
signatures.
Secure Email
• PGP – 1991 – Phil Zimmerman
• It uses signing, encryption, certificates etc. to
create secure environments – for email or for
encrypted file systems etc.
• Public key authentication – decentralized
• Web of Trust
Web of Trust
Assumptions in Web of Trust
• In order to verify the key, the assumption made is
that everyone signs the key of others
• Also everyone submits these signatures to the key
servers.
Idea of PGP
Off the record messaging
• Cryptographic protocol used to provide strong
encryption for instant messaging and email
• It uses a combination of AES symmetric key
encryption, Diffie-Hellman key exchange, and
SHA-1 hash function.
Advantages of OTR systems
• Encryption
• Authentication
• Deniable Encryption

• Perfect Forward Secrecy
Invisible Internet Project
• Provides a layer that serves secure
communication/data transfer mechanism
• Introduced in 2003 as a beta software
• Not reviewed yet
• No anonymity guaranteed
Issues with protocols based
on SMTP
Bitcoin
• Open source decentralized Peer to Peer currency
• No central authority
• Not designed for anonymity

• Proof of work
• Mining
Bitmessage
• Based on Bitcoin, although it is designed to
handle a different application
• It differs from the protocols based on SMTP as it is
based on the concept of EGE or “Everyone Gets
Everything”
• Using this concept, Bitmessage can not only mask
the message body but also the metadata
associated with the message i.e. the sender and
receiver
EGE
• No end points to a message
• Encrypt the message and drop it into the block
chain of messages
• All the active users try to decrypt the message.
• Only the intended recipient will be able to decrypt
the message.
Other services of Bitmessage
Broadcasting
• Since Bitmessage is based on the concept of
EGE, broadcasting a message comes naturally
• The users have to get the password of the
channel from some forum or word of mouth – and
then they will be able to decrypt the messages
using the password
Chans
• Chans or channels are anonymous chat rooms
• Users can simply encrypt using the public key of
the chat room and post it
• Completely anonymous
Perfect Forward Secrecy
• An intruder can store all the encrypted
conversations and later when he eventually
breaks or somehow gets the private key, all the
previously encrypted information is lost
• This is a concern in almost all the PKI systems
• In Bitmessage this concern is even more
pronounced as anyone can store the block chains
easily
• Bitmessage doesn’t provide PFS
• However, this can be supported in Bitmessage
using and implementation of key rotation
• Every message that is sent has to be sent using a
new key. These are called ephemeral keys
Message Retention
• In Bitmessage, the messages are retained for two
days before they are deleted
• The sender expects an acknowledgement from
the receiver which confirms the delivery of the
message
• If the receiver doesn’t check his mailbox in two
days that the message was sent, the messae is
lost and the sender has to send it again

This concept is being improved using the Time-tolive concept
Streams
• According to Prof. Tom Rodden of Univ of
Nottingham, 2.8 million mails are being sent per
second across the world.
• If Bitmessage is expected to store all these
messages, it has to implement some concept
compared to the normal block chain used by
bitcoin
• For this, Bitmessage uses Streams.

• Streams are a way to self-segregate the
messages when the volume of the messages is
too high
• When the volume of messages become too high,
the client can divide the block chain into child
streams
• Problem: Inter stream messaging is not possible
in Bitmessage.
• If the receiver of the message is in a different
stream, the sender has to create an address in
that other stream in order to send the message.
Conclusion
• Bitmessage completely redesigns the email
system
• It is completely anonymous
• There are a few issues that still exist such as
Perfect Forward Secrecy and the question of
scalability
Future Work
• An MIT graduate has developed a new protocol
based on Bitmessage
• This message is called Bitmask or Bitmessage
2.0. This protocol uses bandwidth based metrics
instead of proof of work
• A protocol called LibertyMail is being developed
which is again based on Bitmessage system
Idea
• Currently, Bitmessage, like bitcoin in the beginning
has only one client, Bitmessage-Qt
• This is a standalone client in the system which is
used independent of any mail client

• The problem with this kind of client is that it
downloads all the block chain into the individual
system
• While this is a hindrance only when downloading
the client for the first time, it is still a hindrance
• Bitcoin overcomes this hindrance by using a thin
client based architecture
• Electrum is an example
• Electrum has its multiple servers located across
the world.
• A person who wants to use a bitcoin client can
generate the keys on his local machine and send
it to the electrum server which posts it onto the
block chain
• Electrum uses passphrase based electrum client
that creates deterministic addresses based on the
seed value.
• The idea of my project is to use a similar
architecture in Bitmessage.
• Using this architecture, we can still mask the
metadata

More Related Content

PPT
Bitmessage
PPT
Email Security : PGP & SMIME
PDF
امراض الأمة وبصيرة النبوة لسماحة الشيخ فوزي محمد أبوزيد
PDF
شهر رجب والإسراء والمعراج الخطب الإلهامية
PDF
كتاب شرف شهر شعبان
PPTX
Blogomanija 2013 - Sta smo naučili ? (Quotes)
PPSX
Part I. Plate Tectonics Theory
PPTX
Lecture 6-cs345-2014
Bitmessage
Email Security : PGP & SMIME
امراض الأمة وبصيرة النبوة لسماحة الشيخ فوزي محمد أبوزيد
شهر رجب والإسراء والمعراج الخطب الإلهامية
كتاب شرف شهر شعبان
Blogomanija 2013 - Sta smo naučili ? (Quotes)
Part I. Plate Tectonics Theory
Lecture 6-cs345-2014

Viewers also liked (18)

PDF
PPT
Ebook design presentation
PPT
Can we dance
PDF
3 engg overall result2012
PDF
PDF
be quran walking among people
PPTX
music video deconstruction
PPSX
North American Precambrian Craton Part A
PPT
PDF
أسرار العبد الصالح وموسى عليه السلام
PDF
W1 bharrison wearabletechnology
PPTX
Digi-pack deconstruction
DOC
1. email template (doc version)
PDF
Micai 13 contextualized practical speech
PPTX
Lecture 20-cs648
PDF
ANAF - impozit profit 2016
Ebook design presentation
Can we dance
3 engg overall result2012
be quran walking among people
music video deconstruction
North American Precambrian Craton Part A
أسرار العبد الصالح وموسى عليه السلام
W1 bharrison wearabletechnology
Digi-pack deconstruction
1. email template (doc version)
Micai 13 contextualized practical speech
Lecture 20-cs648
ANAF - impozit profit 2016
Ad

Similar to Bitmessage (20)

PDF
Digital Certified Mail
PPT
chap15 cryptography and network security.ppt
PPT
Proposal presentation
PDF
Using PGP for securing the e-mail
PPT
S-MIMEemail-security.ppt
PPT
computer netwok security Pretty Good Privacy PGP.ppt
PDF
BAIT1103 Chapter 5
PDF
Electronic mail security
PPT
Pgp smime
PDF
Design of a secure "Token Passing" protocol
PPT
Celebrity Cricket League 2016 - http://ccl5.com/
PPT
chapter 15-Network and Security-By-MIT.ppt
PPT
ch15.ppt
PPT
ch15.ppt
PPT
ch15 (1).ppt
PPTX
Email sec11
PDF
PBU-Intro_to_PGP
PPT
PGP.ppt
PPT
electronic mail security for authent.ppt
PDF
M.FLORENCE DAYANA/electronic mail security.pdf
Digital Certified Mail
chap15 cryptography and network security.ppt
Proposal presentation
Using PGP for securing the e-mail
S-MIMEemail-security.ppt
computer netwok security Pretty Good Privacy PGP.ppt
BAIT1103 Chapter 5
Electronic mail security
Pgp smime
Design of a secure "Token Passing" protocol
Celebrity Cricket League 2016 - http://ccl5.com/
chapter 15-Network and Security-By-MIT.ppt
ch15.ppt
ch15.ppt
ch15 (1).ppt
Email sec11
PBU-Intro_to_PGP
PGP.ppt
electronic mail security for authent.ppt
M.FLORENCE DAYANA/electronic mail security.pdf
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Artificial Intelligence
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Chapter 5: Probability Theory and Statistics
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Zenith AI: Advanced Artificial Intelligence
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
1. Introduction to Computer Programming.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
A comparative analysis of optical character recognition models for extracting...
Building Integrated photovoltaic BIPV_UPV.pdf
Hybrid model detection and classification of lung cancer
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
NewMind AI Weekly Chronicles - August'25-Week II
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
cloud_computing_Infrastucture_as_cloud_p
Chapter 5: Probability Theory and Statistics
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
MIND Revenue Release Quarter 2 2025 Press Release

Bitmessage

  • 1. Bitmessage:An Analysis Vikram Reddy Pareddy CSc 8222 Department of Computer Science, Georgia State University
  • 2. Email • SMTP – 1981 • Simple Protocol - designed mainly for academic and government use. • No data protection strategies included
  • 4. Improvements on SMTP • Sender Policy Framework(SPF) – It is an email validation system that tries to prevent spam by detecting spoofing, by verifying sender’s IP address. The domain administrators are expected to designate hosts in that domain that are legitimate hosts. • Domain Keys Identified Mail(DKIM) – It is a method of associating a domain name to the email message to make someone responsible for the email. This responsibility is set by using digital signatures.
  • 5. Secure Email • PGP – 1991 – Phil Zimmerman • It uses signing, encryption, certificates etc. to create secure environments – for email or for encrypted file systems etc. • Public key authentication – decentralized • Web of Trust
  • 7. Assumptions in Web of Trust • In order to verify the key, the assumption made is that everyone signs the key of others • Also everyone submits these signatures to the key servers.
  • 9. Off the record messaging • Cryptographic protocol used to provide strong encryption for instant messaging and email • It uses a combination of AES symmetric key encryption, Diffie-Hellman key exchange, and SHA-1 hash function.
  • 10. Advantages of OTR systems • Encryption • Authentication • Deniable Encryption • Perfect Forward Secrecy
  • 11. Invisible Internet Project • Provides a layer that serves secure communication/data transfer mechanism • Introduced in 2003 as a beta software • Not reviewed yet • No anonymity guaranteed
  • 12. Issues with protocols based on SMTP
  • 13. Bitcoin • Open source decentralized Peer to Peer currency • No central authority • Not designed for anonymity • Proof of work • Mining
  • 14. Bitmessage • Based on Bitcoin, although it is designed to handle a different application • It differs from the protocols based on SMTP as it is based on the concept of EGE or “Everyone Gets Everything” • Using this concept, Bitmessage can not only mask the message body but also the metadata associated with the message i.e. the sender and receiver
  • 15. EGE • No end points to a message • Encrypt the message and drop it into the block chain of messages • All the active users try to decrypt the message. • Only the intended recipient will be able to decrypt the message.
  • 16. Other services of Bitmessage Broadcasting • Since Bitmessage is based on the concept of EGE, broadcasting a message comes naturally • The users have to get the password of the channel from some forum or word of mouth – and then they will be able to decrypt the messages using the password
  • 17. Chans • Chans or channels are anonymous chat rooms • Users can simply encrypt using the public key of the chat room and post it • Completely anonymous
  • 18. Perfect Forward Secrecy • An intruder can store all the encrypted conversations and later when he eventually breaks or somehow gets the private key, all the previously encrypted information is lost • This is a concern in almost all the PKI systems • In Bitmessage this concern is even more pronounced as anyone can store the block chains easily
  • 19. • Bitmessage doesn’t provide PFS • However, this can be supported in Bitmessage using and implementation of key rotation • Every message that is sent has to be sent using a new key. These are called ephemeral keys
  • 20. Message Retention • In Bitmessage, the messages are retained for two days before they are deleted • The sender expects an acknowledgement from the receiver which confirms the delivery of the message • If the receiver doesn’t check his mailbox in two days that the message was sent, the messae is lost and the sender has to send it again This concept is being improved using the Time-tolive concept
  • 21. Streams • According to Prof. Tom Rodden of Univ of Nottingham, 2.8 million mails are being sent per second across the world. • If Bitmessage is expected to store all these messages, it has to implement some concept compared to the normal block chain used by bitcoin • For this, Bitmessage uses Streams. • Streams are a way to self-segregate the messages when the volume of the messages is too high
  • 22. • When the volume of messages become too high, the client can divide the block chain into child streams • Problem: Inter stream messaging is not possible in Bitmessage. • If the receiver of the message is in a different stream, the sender has to create an address in that other stream in order to send the message.
  • 23. Conclusion • Bitmessage completely redesigns the email system • It is completely anonymous • There are a few issues that still exist such as Perfect Forward Secrecy and the question of scalability
  • 24. Future Work • An MIT graduate has developed a new protocol based on Bitmessage • This message is called Bitmask or Bitmessage 2.0. This protocol uses bandwidth based metrics instead of proof of work • A protocol called LibertyMail is being developed which is again based on Bitmessage system
  • 25. Idea • Currently, Bitmessage, like bitcoin in the beginning has only one client, Bitmessage-Qt • This is a standalone client in the system which is used independent of any mail client • The problem with this kind of client is that it downloads all the block chain into the individual system • While this is a hindrance only when downloading the client for the first time, it is still a hindrance
  • 26. • Bitcoin overcomes this hindrance by using a thin client based architecture • Electrum is an example • Electrum has its multiple servers located across the world. • A person who wants to use a bitcoin client can generate the keys on his local machine and send it to the electrum server which posts it onto the block chain
  • 27. • Electrum uses passphrase based electrum client that creates deterministic addresses based on the seed value. • The idea of my project is to use a similar architecture in Bitmessage. • Using this architecture, we can still mask the metadata