Encrypting and signing
|
|
- Adrian Stephen Stevenson
- 8 years ago
- Views:
Transcription
1 Encrypting and signing V1.0 Developed by Gunnar Kreitz at CSC, KTH. V2.0 Developed by Pehr Söderman at ICT, KTH V3.0 Includes experiences from the 2009 course V3.1 Adaptation for DASAK, by Sonja Buchegger at CSC, KTH V3.2 Adaptation for CSC hosting, some clarifications, by Sonja Buchegger security is based on a set of cryptographic algorithms ensuring both that only the holder of a specific key can read a message (encryption) and prove the message has not been changed in transit (signing). The goal of this lab is to familiarize yourself with security using the well known tool GnuPGP ( also known as GPG. GPG is a free implementation of the OpenGPG ( standard, which is based on the commercial tool PGP ( Pretty Good Privacy. This lab can also be done completely remotely. All you need to do is to send 5 s, if you do everything correctly. If you need help with the lab, please come to the lab sessions. The lab shall be solved individually. You are not allowed to solve the lab for another student. Table of Contents Encrypting and signing Step 1: Getting GnuPG...3 Some common problems when solving this lab...4 GnuPG and usability...4 Step 2: Importing the course key...4 Step 3: Creating your keys...5 Step 4: Submit your key for signing...5 Step 5: Add an extra address to the key...6 Step 6: Signing of keys...6 Step 7: Submit your key (again)...6 Receiving Sending secure Step 8: Signed messages...7 Step 9: Encrypted messages...7 Step 10: Encrypted and signed messages...8 Step 11: The report...8 Common error messages and how to solve them...10 ERROR: Could not import user id's. Typically caused by UIDs created in the future (wrong system time)...10 ERROR: Did not find any keys to import/verifying signature failed/decrypting message failed/decryption and verification failed...11 Page 1/12
2 ERROR: Did not see any signatures not made by course key...11 ERROR: Found # User-ID:s in the file. The initial submission should be with one User-ID. Generate a new key and try again...11 ERROR: Found more than one key in your submission...11 ERROR: Incorrect. I read your answer as:...11 ERROR: Key cannot be used for encryption...11 ERROR: Secret key was imported, please generate a new keypair and be more careful next time.../the secret key for this key was already imported. Please generate a new keypair and be more careful next time...11 ERROR: Signature was invalid (status xxxxxxx)...12 ERROR: Submission was encrypted with # keys, should be encrypted to exactly two keys/submission was only encrypted with a single key, should be encrypted to two keys...12 ERROR: Subkey expires in more than 3 months/subkey never expires...12 ERROR: Submission was not signed...12 ERROR: The User-ID found is "Foo Bar <Foo@Bar.com>". It should have an address in domain...12 ERROR: Tried to import something but failed. This can be caused by broken data, revocation certificates or broken UIDs (such as UIDs created in the future)...12 ERROR: Validation of your result failed. Key correctly signed by course key? I read your answer as:...12 Page 2/12
3 Step 1: Getting GnuPG If you do the exercise on the CSC Linux computers, the command is gpg. If you use CSC Solaris computers, just "module add gnupg" - depending on the version, the command for gpg can be gpg2. For working on other platforms: You can download GPG from or use a package manager. Typically the command in linux is something like aptitude install gnupg, yum install gnupg, apt-get install gnupg or similar. If the package is not found in your package system you can always do an install from the tarball on the GnuPG homepage. Under windows you use the installer from the homepage. It is very helpful to add the directory where the GPG application is located to your path, so you do not need to look it up to use it from the console. It is also possible to install it under MinGW ( Under MacOS X you can install it using GnuPorts or from the homepage. GPG itself is a command line application and you can test if it works correctly by typing gpg --version at the command line. The format of the output should look something like this: netsec:/# gpg --version gpg (GnuPG) Copyright (C) 2008 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later < This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Home: ~/.gnupg Supported algorithms: Pubkey: RSA, ELG, DSA Cipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224 Compression: Uncompressed, ZIP, ZLIB, BZIP2 Used libraries: gcrypt(1.4.1) Many prefer to use front-ends such as EnigMail ( for Thunderbird, GPGMail ( for Mail.app or GPGpine for pine. You are welcome to try them, but they are not needed to solve the lab. If you decide to continue using GPG they are very helpful. While you are free to choose any software or front-end you wish, please note that you will need the commands for the report and that the lab has only been tested with the basic GnuPG tool, Thunderbird and KTH webmail. Many of the tools and front-ends found on the web are broken in various interesting ways, including giving you limited, conflicting, or even completely wrong output. We are aware of some front-ends not reporting all keys used in signing/encryption, automatically importing keys and other bad stuff. Many clients also mess up the formating of s, preventing correct decoding of the data. This will prevent you from successfully completing the lab. therefore the course administration will not help you with software issues you might encounter, except for usage of modern versions of GnuPG. Page 3/12
4 For the final report include: How to install GPG on your system How to install the front-ends (if any) you used Some common problems when solving this lab Note that every single mail you send MUST come from your No other source addresses will be accepted by the system. All s must have the answers in the body of the mail as plain text. Word, openoffice, rtf, ps, dvi, pdf, html or other formats will fail. It is very common for program to send HTML or RTF by default. You will have to turn this functionality off. The system doesn't decode attachments. The system currently doesn't handle attachments, PGP/MIME, SMIME or similar, so if you use a front-end make sure it can do traditional in-lining instead. If you don't see something like ----BEGING GPG <TYPE>----- in the start of the body you should verify how you send encrypted mails. A common problem is to not ask GnuPG for all information and few front-ends prints all the information you need. The -vv (very verbose) switch is very helpful, as it prints extended information about what gpg is doing. The deadline for the lab can be found on the course website. Please note that the deadline is both for the upload of the final report and the work against the corrector system. Do not save the lab to the last day. GnuPG and usability GnuPG is not the easiest tool to use and combined with the complexity of the cryptography involved it can take some time to get used to. The documentation for gpg can be found at and is a good start. Obviously you can use google and man-pages to get additional help. Part of the task in this lab is to create your own manual for GPG. This will be in the form of a report, covering what you have done in the lab and how to use GPG correctly. For the final report, include: References Any other student that helped you with the lab Step 2: Importing the course key To verify signatures you will need the course key from the course website. Once you have imported and verified the key, give it an appropriate trust level. Page 4/12
5 For the final report The commands used to import keys The commands used to verify you get keys with the correct fingerprints The commands used to verify the signatures on keys The commands used to set trust levels for keys The interpretation of the output Step 3: Creating your keys To use public key cryptography you need to generate your keys. GnuPG lets you tune the cryptographic security of the keys, depending on how slow you want key generation (and encryption, decryption, signing and verification...) to be. is one place that offers concrete recommendations for which keylengths are suitable depending on the security required. Key generation can take a few minutes, if you get the message to generate more randomness, type, click around, or open other terminals and run commands like ping kth.se, or du -h / Password protect your key when you generate it. This password prevents somebody with access to your computer from easily stealing your keys. When you generate the key make sure the name of the key matches your name, the is and you state the course code DD2395 in the comment field. Make it valid for at most 3 months. For the final report: Command used to generate the keys How much time it took to generate the keys Motivation for the security settings The identity you created for the key The fingerprint for the key Step 4: Submit your key for signing Now you get your key signed by the correction system. While a multitude of key formats exists, it is usually a good idea to use ascii-armor. This is an encoding that avoids characters known to cause problems with systems. So, export the (public) key you generated and it to <gpgkey@dasakh10.csc.kth.se>. Make sure you send it from address. There should only be a single identity in the key, with address. Once you have submitted your key you will, if the submission looks correct, get it in return, now signed by the course key. Due to the grey-listing used at kth.se it can take up to an hour before you receive the response. For the final report: Page 5/12
6 The signature added to your key Step 5: Add an extra address to the key It is very common to have multiple identities and addresses. These can all be bound to the same key, so your friends don't need to keep track of multiple keys to communicate with you. So add an additional identity to the key with a second address (for example your main address if it's For the final report: Description of the second identity Commands to manage identities Step 6: Signing of keys While it's nice to get a signature for free, the correction system has not done very careful checking of your key (and that you are you). Therefore you will have to prove you are not an impostor by getting an additional signature for your key. Find another student and get them to sign your key, setting an appropriate trust-level. For the final report How to sign keys using GPG Description of the signature and the trust-level the other student gave you. The commands and interpretation of the output to Manage trust levels Signing keys Step 7: Submit your key (again) Now export your public key, using ascii-armor and submit it to <gpg-key@dasakh10.csc.kth.se>. The mail must come from address. At this point your key should be signed with the course key, another student key and have several identities included. Note: You can examine what you have exported using gpg -v <filename> Receiving If you have successfully sent in your key you will get 4 mail in return. One status mail, one mail with signed data, one mail with encrypted data and one mail with both signed and encrypted data. Do not lose these s! If you lose them you will have to resend your public key to get a new set. The mails you receive contains a few cryptographic checksums (in the form of long strings). They are unique by address and you will have to return them to prove you have correctly Page 6/12
7 decrypted and verified the signatures. Each mail contains several sections that can be encrypted or signed. They are separated by ============= separator ============= This is not a part of the text, but only there to simplify for you. You should never send this separator back or use it as a part of the lab. Sending secure Now it's time to send secure back to the correction system. You shall send three s, each mail containing the parts of the you received that were properly secured. The correction is very thorough. While we will accept some extra whitespace (outside strings) any extra data or missing data will get your submission rejected. You will have to prove you understand which parts of the messages you received are secure and which parts are not. While we will send you multiple blocks of data you shall only return a single block, properly secured. This is how you normally use PGP. The reason for including several blocks in the message you get is simply to save you from getting 30 s in your inbox. So, the message you return shall look something like this: 52df87027fb5c969b86a70cbb75dff5694a351c0 b1fd51f50b438ae8a13d15a16a8cfbe60fc940e4 c d4063de3abc7615a4acb41b100b0b 1f24d c6502e f82d d0be34c127d864a835f821c45963dd288149b10 (Before encryption and signing) Step 8: Signed messages You received one message from <gpg-sign@dasakh10.csc.kth.se> with signed data. Respond to this with all the parts of the mail that were properly signed using the course key in a single block. The block you send also has to be signed (using clear sign makes it easier to see what you are doing). Again, only send ascii text. For the final report: The commands used to verify signed messages Interpretation of the output from the commands A table with your analysis of each part of the original message where you motivate why it's correctly signed (or not) Which key do you use to sign the reply? Example output from GnuPG illustrating your analysis Page 7/12
8 Step 9: Encrypted messages You received one message from with encrypted data. Respond to this with the parts of the mail that were properly encrypted and confidential. Note that it is very common to add yourself to the recipient list along with the real recipient. This lets you read your own after the encryption. For the correction to work correctly you will have to do this. Also note that only you and at most the course administration should be able to read the , nobody else. For the final report: The commands used to verify encrypted messages Interpretation of the output from the commands A table with your analysis of each part of the original message Motivate why it's correctly encrypted (or not) Which key do you use to secure the reply? Example output from GnuPG illustrating your analysis Step 10: Encrypted and signed messages You received one message from <gpg-both@dasakh10.csc.kth.se> with encrypted and signed data. This is a common usage of GPG, providing both confidentiality and integrity protection. Respond to this with the parts of the mail that were properly encrypted and signed. Make sure nobody else can read the messages you receive. Once again you will have to use both keys for the encryption. For the final report: The commands used to verify signed and encrypted messages Interpretation of the output from the commands A table with your analysis of each part of the original message Motivate why it's correctly encrypted (or not) Which key do you use to secure the reply? Example output from GnuPG illustrating your analysis Step 11: The report Once you have gotten s showing you have correctly completed each of the previous tasks, you will have to submit the report. The final report shall have the following structure: 1) Your full name Page 8/12
9 Your personnummer Your Table of Contents 2) Installing GnuPG How to install GPG on your system How to install the front-ends you used (if any). 3) Importing and trusting keys The commands and interpretation of the output when Importing keys Verifying correct fingerprints Verifying key signatures Setting trust levels for keys Interpretation of the signature added to your key 4) Creating keys The commands and interpretation of the output when generating keys How much time it took to generate the keys Motivation for the security settings. The identity you created for the key The fingerprint for the key 5) Signing keys How to sign keys using GPG Description of the signature and the trust-level the other student gave you. The commands and interpretation of the output when: Manage trust levels Signing keys 6) Managing Identities How to generate a new identity for a key Description of the second identity 7) Signed The commands used to verify signed messages Interpretation of the output from the commands A table with your analysis of each part of the original message Page 9/12
10 Motivate why it's correctly signed (or not) Which key do you use to secure the reply? 8) Signed examples Example output from GnuPG illustrating your analysis 9) Encrypted The commands used to verify encrypted messages Interpretation of the output from the commands A table with your analysis of each part of the original message Motivate why it's correctly encrypted (or not) Which key do you use to secure the reply? 10) Encrypted examples Example output from GnuPG illustrating your analysis 11) Signed-Encrypted The commands used to verify signed and encrypted messages Interpretation of the output from the commands A table with your analysis of each part of the original message Motivate why it's correctly signed and encrypted (or not) Which key do you use to secure the reply? 12) Signed-Encrypted examples Example output from GnuPG illustrating your analysis 13) References Any other homepage or resource you used to solve the lab Any other student that helped you with the lab Throughout the lab there have been instructions of parts that should be in your report. Make sure to include all these points. The report shall be mailed to buc@kth.se, subject DD2395. The document shall be correctly signed (with your key) and encrypted (remember to make sure you can decrypt it yourself!) using the course key and the key for buc. We will verify the report and that you have correctly completed the lab. You have to hand in the report and succeed in the outlined steps to pass this lab exercise. Common error messages and how to solve them This is a list of the common error messages you might get from the system and how to solve the problems related to these errors. Page 10/12
11 ERROR: Could not import user id's. Typically caused by UIDs created in the future (wrong system time) The system parsed your key correctly but failed to import your UIDs. This is most likely due to the creation date of the UID being in the future or too far into the past. Check your system time and generate a new key. ERROR: Did not find any keys to import/verifying signature failed/decrypting message failed/decryption and verification failed The system tried to verify or decrypt the message, but GPG returned a non-zero return code and no data. This is commonly caused by formatting errors, such as HTML mail, the key in attachment, multiple GPG blocks and similar. Make sure you only include a single, properly armored, block and it is in the body . ERROR: Did not see any signatures not made by course key Did you really get another student to sign your key? Did you import that signature? And then export the key again? ERROR: Found # User-ID:s in the file. The initial submission should be with one User-ID. Generate a new key and try again. Your initial submission should not contain multiple UIDs. Follow the lab instruction and submit a key with a single UID first. ERROR: Found more than one key in your submission Typically caused by exporting multiple keys before sending the mail to the lab system. By specifying which key you want to export you avoid this error. You can also try importing the key you have exported to make sure it contains what you think it contains (gpg --import -nvv). ERROR: Incorrect. I read your answer as: This means the lab system correctly verified/decrypted the gpg block in your submission and failed when it verified your submission against the expected answers. The lab system is doing a string matching of the rows. Make sure there is no extra data in the output (compared to what you encrypted/signed). Then make sure you have chosen the correct set of blocks as your answer. ERROR: Key cannot be used for encryption You have generated a sign-only key. This key can not be used for the lab and you will have to generate a key allowing both signing and encryption. Page 11/12
12 ERROR: Secret key was imported, please generate a new key pair and be more careful next time.../the secret key for this key was already imported. Please generate a new key pair and be more careful next time You sent your secret key to the lab system. As it is no longer secure you will have to generate a new key pair and start over. ERROR: Signature was invalid (status xxxxxxx) Your signature was parsed correctly but was found invalid. Make sure you don't modify the data in transport. ERROR: Submission was encrypted with # keys, should be encrypted to exactly two keys/submission was only encrypted with a single key, should be encrypted to two keys You have to make sure you use exactly two keys to encrypt the submission. That is your own key and the course key. Nobody else may read your submission. ERROR: Subkey expires in more than 3 months/subkey never expires Make sure you set a correct expiry date on the key when you generate it. It's in the lab instructions. ERROR: Submission was not signed You did not sign the submission correctly before sending it to the lab system. ERROR: The User-ID found is "Foo Bar <Foo@Bar.com>". It should have an address in domain Make sure your primary UID is in domain. This is important as the lab system will only speak addresses. ERROR: Tried to import something but failed. This can be caused by broken data, revocation certificates or broken UIDs (such as UIDs created in the future) Catch all for parsing errors when importing keys. If you get this the key has been parsed but GPG failed to import your keys. ERROR: Validation of your result failed. Key correctly signed by course key? I read your answer as: Catch all for validating submissions.. If you get this GPG returned something, but also had an error. The answer part is what gpg returned. Typically caused by sending data to the gpg-sign/crypt/both before you have your key correctly signed by the course key. Page 12/12
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to
More informationWiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
More information1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
More informationSigning and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation
More informationEncrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
More informationGPG - GNU Privacy Guard
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
More informationSigning and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22 What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for
More informationHow to use PGP Encryption with iscribe
How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted
More informationPGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
More informationIntroduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
More informationINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
More informationFile and email encryption with GPG4win & Enigmail
Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the
More informationUbuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014
Ubuntu Open PGP IMPLEMENTATION Dr. ENİS KARAARSLAN 2014 Enter your personal information, select your key encryption type, key strength, and when you want your key to expire. Your name and email address
More informationSubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
More informationGPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
More informationAn Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
More informationHow To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
More informationThe KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer
Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................
More informationOpen-Xchange Guard Major Release v2.0.0. Feature Overview V1.4
Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in
More informationTutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
More informationPublished : 2013-12-02 License : None
K9 1 2 Published : 2013-12-02 License : None INTRODUCTION K-9 Mail is an email application (app) for Android phones or tablets. K-9 supports multiple mailboxes, each independently configurable. T his ability
More informationChapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
More informationElectronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
More informationCiphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
More informationSharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
More informationUSER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4
USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationSecurity in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
More informationOn-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America
On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America Website: http://www.on-core.com Technical Support: support@on-core.com Information: info@on-core.com Phone: (732)
More informationThe Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.
openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook
More informationSymmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
More informationGPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009
GPG Tutorial Andreas Hirt July 12, 2009 1 Introduction The purpose of this document is to give a brief introduction on how to set up and use GPG, the GNU implementation of PGP. The reader must rst generate
More informationHow To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationto hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many
In the world of secure email, there are many options from which to choose from to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many cryptographical concepts to achieve a supposedly
More informationBiography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your email communication. Topic
Topic Name of the Trainer/Speaker Professional Position and Name of Organization Email TLS/SSL : Securing your website PGP : Secure your email communication Mohammad Fakrul Alam CTO bdhub Limited fakrul@bdhub.com
More informationOverview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
More informationSecure Client Applications
Secure Client Applications Networking Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 26 June 2014 Common/Reports/secure-client-apps.tex, r900 1/26 Acronyms
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
More informationHow to Create and Maintain an Anonymous Identity Online
How to Create and Maintain an Anonymous Identity Online By Anonymous33 Email: anoncitizen@ymail.com Revision 1 Date: 23/03/2011 WARNING: The information contained in this guide is for educational and protection
More informationLiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
More informationCiphermail Gateway Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide September 23, 2014, Rev: 9112 Copyright 2008-2014, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationCryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
More informationCLIENT DATABASE SECURITY
CLIENT DATABASE SECURITY 1502 RXR Plaza 15th Floor, West Tower Uniondale, NY 11556 Telephone: (516) 227-6600 Facsimile: (516) 227-1799 Website: http://www.openlink.com Revision History Document Name Date
More informationUnifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private
More informationSECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
More informationNetwork Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationCiphermail Gateway Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide October 10, 2015, Rev: 10214 Copyright 2008-2015, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationAS DNB banka. DNB Link specification (B2B functional description)
AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...
More informationHow to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
More informationAccellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 Tel +1 650 739-0095 Fax +1 650 739-0561. info@accellion.com
Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 Tel +1 650 739-0095 Fax +1 650 739-0561 info@accellion.com TABLE OF CONTENTS QUICK START... 4 Create an Account... 4 Send a file... 4
More informationWS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
More informationInternet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
More informationElectronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
More informationCIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
More informationGPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows
GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,
More informationIs your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
More informationInstalling your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
More informationCryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
More informationFile Transfer. User Guide For Clients and Vendors. Last Revised: October 21 2014
File Transfer User Guide For Clients and Vendors Table of Contents File Transfer User Guide for Clients & Vendors... 3 Section 1: Overview... 3 Confidentiality... 3 Contact Information & Technical Support...
More information1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
More information[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
More informationHMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
More informationEncrypting your Email Communications using PGP
Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following
More informationUsing Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
More informationireadsmime User Guide For iphone, ipad, and ipod Touch
ireadsmime User Guide For iphone, ipad, and ipod Touch Page 1 CONTENTS Chapter 1: Welcome... 3 Chapter 2: Getting Started... 3 Compatability... 3 Preliminary Steps... 3 Setting up a POP3 / IMAP4 Email
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationUser Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationWebApp S/MIME Manual. Release 7.2.1. Zarafa BV
WebApp S/MIME Manual Release 7.2.1 Zarafa BV January 06, 2016 Contents 1 Introduction 2 2 Installation 3 2.1 RPM based distributions............................................. 3 2.2 DEB based distributions.............................................
More informationNetwork Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
More informationDjigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationBCTextEncoder Help File
BCTextEncoder Help File Introduction Introduction Main Features BCTextEncoder Requirements BCTextEncoder Specifications 2 Introduction BCTextEncoder is a line in BestCrypt family of encryption software
More informationProject #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
More informationSecure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationGNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
More informationMolina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012
Molina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012 Contents Introduction... 2 Enrollment... 2 System Regions... 3 Files Sent to Molina... 3 Files Sent From Molina... 4 First Time Logging
More informationExam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationElements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
More informationSecurity. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
More informationKey Management and Distribution
Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationisecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
More informationPENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.
Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationSBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
More informationFL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationOptions for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
More informationSecure E-mail FAQs 1
Secure E-mail FAQs 1 P age Table of Contents Secure E-Mail Overview... 3 Options for viewing secure e-mail... 3 Delivery Option Decision Tree... 4 Before you start using Secure E-mail... 4 To use a PGP
More informationWS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 1 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
More informationOpen Source Tools for email Security with Mail.app in Mac OS X
Open Source Tools for email Security with Mail.app in Mac OS X NebraskaCERT, Omaha August 11, 2005 Mat Caughron, CISSP PHP Consulting Public Service Announcement Please silence all pagers and cell phones
More information