Summary of Encryption
What is encryption In encryption, we use a key or key to control an algorithim with changes a plain text file to a cypertext file that, hopefully can only be decrypted by the intended recipient. We do this to gain Privacy – our message is only read by the intended recepient Authenticity – the recepient knows who sent the message
Types of keys Symetrical Keys The same key decrypts and encrypts the message Gives us Privacy Authenticity The problem is how to get the key to the recipient. This problem is as large as sending the encrypted message
Types of Keys Public Key In public key cryptography there are two keys. A public key, used to encrypt the message. This is publicly available A private key, used to decrypt the message. This is know only to the intended recipient. There is no key exchange problem. The public key is publicly available. (how we will discuss)
Public Key Cryptography With public key cryptography we get Privacy We do not get authenticity. The recipient can not prove who the message is from To regain this, we use digital signatures as described in the last lecture. Public Key Cryptography is the only form used in most internet and email communication.
Practical Cryptography In practice, we need to obtain public keys in a manner we can trust to avoid a, Man in the Middle, attack. In a man in the middle attack, a malicious individual places him/herself in between two parties trying to communicate, and impersonates both.
Practical Cryptography To avoid this, we incorporate public keys into digital certificates issued by Certificate Authorities To use Cryptography, we generally need to obtain a digital certificate, from an authority. To do this, we first need a certificate, for the Certificate Authority. Lets look at those.
Certificate Authorities Versign – Major player Web site for email certificates www.verisign.com/authentication/individualauthentication/ digital_id.index.html Thawte – a “Trust” Network Originally independent Absorbed by Verisign in 2000 www.thawte.com
Using the certificate Note: Certificate allows you to receive encrypted email To send encrypted email to someone, they must have a digital certificate. To begin you must send your certificate to them, and they must send their certificate to you.
Outlook tutorial Tutorial Website support.gateway.com/s/tutorials/Tu_842008.shtml Gives the basics for setting up encrypted email
Mac OS X tutorial Long tutorial, including obtaining the key on http://www.macdevcenter.com/pub/a/mac/2003/01/20 /mail.html In short, once the key is obtained, it needs to be installed in keychain. From that point on, encryption is transparent. You click on an icon to encrypt outgoing mail. The Certificates are attached to entries in your address book. Certificates are automatically captured when attached to incoming mail.
Onion Routing A way to mask your surfing from your ip Website www.torproject.org
TorPark Secure browsing from public locations www.xerobank.com Originally called Torpark Released by our old friends, the Cult of the Dead Cow Hacktivismo branch Now commercial. (sigh) ;-( Featured, I am told on the series, “Smallville”