Skip to main content

Risk Assessment of “Ostrich ZIP”

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12788))

Included in the following conference series:

  • 1692 Accesses

Abstract

When sending highly confidential information by e-mail, there is a method of attaching a ZIP file encrypted with a password to the e-mail, and then sending the password for decryption separately by e-mail, which is the same channel. We named this method “Ostrich ZIP”. While Ostrich ZIP method is used to protect information through encryption and to prevent misdirection, its meaning is sometimes questioned. However, it is difficult to say that these discussions have been organized. In this paper, the advantages, disadvantages, and threats of Ostrich ZIP are summarized based on these discussions, and the current situation is clarified by surveying the environment related to Ostrich ZIP. In addition, we construct an information leakage event model for file sharing when sending and receiving e-mails, and evaluate and discuss the information leakage risk of ostrich ZIP and alternative measures based on the model. Finally, the background of the use of the ostrich ZIP is discussed from institutional and other perspectives, adding another perspective along with the information leakage risk results. This paper will be provided as a comprehensive risk assessment of the ostrich ZIP.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://ci.nii.ac.jp/.

  2. 2.

    The PrivacyMark is a reputable privacy-centric certification in Japan. https://privacymark.org/.

References

  1. KImura, T.: Thinking about secure file sending and receiving between organizations - what is the purpose of encrypted ZIP? Internet Week 2016. https://www.nic.ad.jp/ja/materials/iw/2016/proceedings/t17/t17-kimura.pdf (2016). (Japanese)

  2. Nomura, Y.: Do you really need encryption on that email? Okayama Information and Communication Technology Study Group. https://www.slideshare.net/nomlab/ss-85329306 (2017). (Japanese)

  3. Sawatari, A.: Work Game - Is that “natural" necessary nowadays? Gijutsu-Hyohron (2019). (Japanese)

    Google Scholar 

  4. Uehara, T.: Why do we attach zip files with passwords to emails? Column No. 595, Institute of Digital Forensics (2019). https://digitalforensic.jp/2019/12/23/column595/ (Japanese)

  5. @hashcat (2019). https://twitter.com/hashcat/status/1129441728761610242

  6. JIPDEC PrivacyMark Promotion Center: Guidelines for the implementation of personal information protection management systems based on JIS Q 15001:2006. JSA Press (2010). (Japanese)

    Google Scholar 

  7. Uchikawa, K.: Guidebook for Implementing and Implementing a Personal Information Protection Management System for JIS Q 15001:2017. JSA Press (2018). (Japanese)

    Google Scholar 

  8. Ogawa, D.: I’ll send you the password after that. Why it’s not used at all in the U.S. and Europe, ITmedia Enterprise (2015). https://www.itmedia.co.jp/enterprise/articles/1509/18/news016.html

  9. @matthew\_d\_green. https://twitter.com/matthew_d_green/status/1141430884459044864

  10. Wyden, R.: https://www.wyden.senate.gov/imo/media/doc/061919%20Wyden%20Sensitive%20Data%20Transmission%20Best%20Practices%20Letter%20to%20NIST.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akira Kanaoka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nakayama, M., Kanaoka, A. (2021). Risk Assessment of “Ostrich ZIP”. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science(), vol 12788. Springer, Cham. https://doi.org/10.1007/978-3-030-77392-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-77392-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-77391-5

  • Online ISBN: 978-3-030-77392-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics