How to use PGP Encryption with iscribe



Similar documents
4. Click Next and then fill in your Name and address. Click Next again.

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

INTRODUCTION TO CRYPTOGRAPHY

Overview Keys. Overview

Encryption. How do I send my encryption key?

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

GPG installation and configuration

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

BCTextEncoder Help File

LiteCommerce Advanced Security Module. Version 2.8

How to Setup Privacy Guard Encryption.

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Receiving Secure from Citi For External Customers and Business Partners

Please note that a username and password will be made available upon request. These are necessary to transfer files.

PDG Software. Encryption Guide

PDG Software. PDG Key Manager User Guide

PDG Software. Keyman Encryption Guide

MessageGuard 3.0 User Guide

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Published : License : None

SENDING S & MESSAGES TO GROUPS

MyNetFone Virtual Fax. Virtual Fax Installation

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Encrypting your Communications using PGP

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Using your Encrypted BlackBerry

NICCA User Guide for digitally signing Using Digital Signature Certificate (DSC) in Outlook Express

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

Why Johnny Can't Encrypt: A Usability Study of PGP

File and encryption with GPG4win & Enigmail

BCSD WebMail Documentation

Instructions For Opening UHA Encrypted

PGP Desktop Quick Start Guide version 9.6

SECURE USER GUIDE OUTLOOK 2000

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

How to install and use the File Sharing Outlook Plugin

1.2 Using the GPG Gen key Command

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

User Guide May Using Certificates in Outlook Express

Outlook XP Only

Encrypting and signing

Secure Part II Due Date: Sept 27 Points: 25 Points

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Yale Software Library. PGP 9.6 for Windows

CBH Provider EDI Browser Manual

Using Entrust certificates with Microsoft Office and Windows

Outlook 2013 Delegate Access Managing Someone Else's Calendar and Inbox

How to use encrypted in the WECI scheme.

THUNDERBIRD WORKBOOK

Steganos Secure Step by Step Instructions. Introduction STEP 1: INSTALLATION

How to Configure Windows 8.1 to run ereports on IE11

Internet Programming. Security

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014

Internet Encryption S/Mime Standard

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Microsoft Outlook 2010

Outlook . User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA

Citrix Client Install Instructions

User Guide. Version 3.0 April 2006

GREEN HOUSE DATA. Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

Installing your Digital Certificate & Using on MS Out Look 2007.

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

Configuring, Customizing, and Troubleshooting Outlook Express

Direct Mail Tutorial

gpg4o Manual Version 3.0

Page 1 of 5. How to unblock automatic picture downloads in messages you receive

How to use Certificate in Microsoft Outlook

User Guide Microsoft Exchange Remote Test Instructions

Using etoken for Securing s Using Outlook and Outlook Express

Outlook 2010 Setup Guide (POP3)

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

isecur User Guide for iphone

Jumble for Microsoft Outlook

User Guide Using Certificate in Microsoft Outlook Express

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE

Xythos on Demand Quick Start Guide For Xythos Drive

Welcome to ncrypted Cloud!

Module One: Getting Started Opening Outlook Setting Up Outlook for the First Time Understanding the Interface...

Migration User Guides: The Console Application Setup Guide

USER GUIDE. General Information The BeAnywhere Service BeAnywhere Server BeAnywhere DRIVE Security... 2

To open and/or save an attachment:

TABLE OF CONTENTS. Legend:

Masergy Fax Solutions Virtual Fax and Fax Line User Guide

Policy Based Encryption E. Administrator Guide

PaperClip. em4 Cloud Client. Setup Guide

Policy Based Encryption E. Administrator Guide

Using Outlook Web Access

U.S. Bank Secure Mail

Using the GroupWise Client

Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN

ITS ebilling. User s Training Manual

WINDOWS LIVE MAIL FEATURES

Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Select "Tools" and then "Accounts from the pull down menu.

How to use Certificate in Outlook Express

ecstudent-ts Terminal Server How to Use

About DropSend. Sending Files with DropSend

Comodo Disk Encryption

Transcription:

How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted e-mails and/or digitally sign your e-mails using the GnuPG encryption package. If you are familiar with PGP encryption, simply follow the steps below. If you are new to PGP encryption you might want to read the Basic PGP Information section before you begin. What you need 1. iscribe e-mail 2. A free copy of GNU Privacy Guard for Windows. 3. A personal computer running Win7, Vista, or WinXP operating system. Installing the software 1. Download GNU Privacy Guard for Windows from http://www.gnupt.de and Save the file to your computer. Then run the file. 2. The installation program will ask you numerous questions. Simply accept all the defaults until you reach the final screen and then click finish. 3. The installation script will then run the program. You should see a message box with the following. "Something seems to be wrong with your GPG keyrings". This message appears the very first time you run the program and occurs because you have no public or private keys. Select <Yes> to create your keys. 4. Next select "Have GnuPG generate a key pair" and hit <OK>. 5. Now enter your name (Luis Soltero in my case), your e-mail address (lsoltero@globalmarinenet.net in my case) and your private pass key (mine is, Honey I am home). Use the default key type and never have the key expire. Select <Start> to generate the keys. 6. After the key generation completes you will be asked if you want to save your keys. Answer <Yes> and store the files in a safe place. 7. You are now done with the GnuPG installation. You will see a "Key" shaped icon in the system tray. Double clicking on the icon will bring up GnuPG. Clicking on the X on the top right will minimize GnuPG to the system tray. We will discuss the usage of GnuPG a little later. 8. Now install iscribe if you haven't done so. XGate/OCENS.Mail users can do this by running the appropriate installation program. Follow the XGate/OCENS.Mail installation instructions to complete the installation. Test iscribe, XGate/OCENS.Mail to make sure all is working. 9. Next run iscribe and go to the File->Plugins. If you see GnuPG then select it and hit <remove>. Now click on Add and select the gnupg plugin. iscribe should tell you that it has been loaded correctly. 10. Finally click on the GnuPG plugin and select <configure>. You should see your name in User. Now when you startup iscribe you will see a new PGP menu and new Icons on the tool bar when creating a new e-mail or reading an existing one. These icons are used to manage PGP and are described below.

How to Encrypt/Decrypt and Sign e-mails... Note that most of the following is in the iscribe Help file under the Help menu. Menu->iScribe Guide. Click on Index and type PGP. This will get you to the PGP documentation. Step one Send your public key You must publish a public key before you can receive an encrypted message. 1. Run iscribe. 2. Compose an e-mail to joe@somewhere.com While in the compose window move the mouse down to the windows application tray and double click on the <key icon>. This should bring up the PGPkeys application. 3. Scroll down until you find your Name and e-mail address. Then right click on <your name> and select <copy>. 4. Now <exit> PGPkeys. 5. Back in the iscribe compose window, click the screen where you want to place your public key and then right mouse click and select paste. You should see some thing like this: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.2.3 (GNU/Linux) mqgibecr6dwrbad0/+7qtgimqitxr974yzw1yrzfvi+xvhsi8v5qvpcvg9ja50nw J/vDShbByv7ZQRY2CsODxVxomX3Xm+I58WTrVwAYWUIRuaFxBGRa6lMhklzdAcPV Am1VOrul99gr9TTBG51I8KsrvEhA7h2yizFCPJ7gOElAKjsrkDefzGLVewCgtwZh JVAMgH2NxuaUJFt1LMp3WvkEALbVTb3r8Ci2mTtuhLg+Pn2FKKMio3ijSRUgzBWD LgIxLkZ5pSH0Sk3nxOb6b7gXM3zjSZOeuHNZvcGW0kYaPgkvKUtZYDUA/G3HuIxC /TxT0TgolA29hNYhe3tjBeimmjeJf+VetkvatESVfkcVGw6Ns0WpO2IrAq0YRLco +/FSA/wOeD2rDj/5zusj3YF6OCrun9OpfFRDMDjoLNuIiAT88lKwSMzUEZwgP+ap AZUoZhj3T/lMP6+0Y7s1FP6Ux1hq/GmAlbGFfskYTY4meymNOe3FzpJgLUovwZ1+ I83nMdc6cqEFscuFwViUMDUL0Ar/Afam+8kjWplhGXj61iXkR7QrTHVpcyBTb2x0 ZXJvIDxsc29sdGVyb0BnbG9iYWxtYXJpbmVuZXQubmV0PoheBBMRAgAeBQJAkeg8 AhsDBgsJCAcDAgMVAgMDFgIBAh4BAheAAAoJEId/BV9J6V4zm8MAn38jevUyM2nh 7VKVIE/QpVSHVYahAJ9ilTiYSrNN4O8ABE1BPIKwuK57rbkBDQRAkeg/EAQA1p5d 6n+Je6GHZCBKAO1yTtAosrjf6c/m/wHi4A2vUGpBKPq8x/ZhG79/OwVw/MO3Uk28 xblpk/ticj7fokbbp/3usvfnmhmxfdg19xsaaayfoiedro6lmw0xrnnz7ky0bkvj c+fita1wk1ve+ddixmt8zmwt6evghjcjg0un76maawud/0bwfk1lukw8yx2i9z72 4e9HLrvbLR+z2zMzH4nOuwYpH4lMd2jf6l8IOn3P0wlCXR6tg1LQTLZHUkhsfA01 y8hrkryhnh1dfkhy+msbijp+iwcjv3rl/nbmjnfgaz/spxnzaumuh7hbxmwdriwk fypua3wxc6cafhu/hle8i0zuiekegbecaakfakcr6d8cgwwacgkqh38fx0npxjor 3gCdElVUftrEtkjcVfB57OPjuLVuiWsAnj23p6/Et3Rak75H9sOvpf77hApk =V7sh -----END PGP PUBLIC KEY BLOCK----- This sample above is a copy of my public key. In Step 2 you can save this key to your address book and send me encrypted messages in the future. 6. Now <Send> the email message. 7. You are done... Now we wait...

Step 2 Receive and record a public key While we wait for joe@somewhere.com to reply to us with an encrypted message someone else, doe@somewhereelse.com sends us an e-mail with his public key. doe wants us to send him encrypted messages from now on. To record his public key we do the following: 1. Open the message as you normally would in iscribe. 2. Push the <Add Key> button. It's the one on the very right of the tool bar. iscribe should tell you that it found one or more keys and that the key has been added to your keyring. 3. Now double click on the <Key Icon> in the system tray to bring up WinPT and find doe@somewhereelse.com in the list. *** This is very Important *** Right click on doe@somewhereelse.com and select <sign>. By signing Doe's public key you are confirming to the software that the key does indeed belong to Doe. You might actually call Doe on the phone or contact him via some other means to confirm that he indeed sent you his public key. iscribe will not encrypt a message unless the key that is being used has been signed. Please see the section of the "Web of trust" in the Basic PGP Information below for more info. 4. Back in iscribe, create or edit the contact information for Doe and make sure that the email address and name appears in the contact information exactly like it does in the GnuPG entry. Note that iscribe will report an empty key ring error when ecrypting an email if the UserName and E-Mail address in the key does not exactly match the entry in the contacts list. You can now send me or doe@somewhereelse.com encrypted messages. Step 3 Sending an encrypted email 1. In iscribe, compose a message to doe@somewhereelse.com. 2. Before you send it click on the <Encrypt> button on the tool bar. 3. If you want to digitally sign this email as well, click on the <Sign> button. You can sign a message without encrypting it. 4. <Send> the message. Step 4 Decoding encrypted email You have finally received an encrypted message from joe@somewhere.com. When you try to read it, it looks something like this: -----B_EGIN P_GP MESSAGE----- Version: GnuPG v 1.2.3 (Gnu/Linux) qanqr1dbwu4dzqz+jdg31ecqb/9awvmqhsngcvumyk4cye0rntsgxix6uaahk3ul 7mFzDOlE5Dc8qfswwedf9urZx1F+rUZ6//XRDR9bqPrh/5S2D0gdYZGpx3my5X0U kr39vc1drit780vvh+k5d9hwidpe5xz6medbknwyzd1bk4unkffdxbelaxtnlmla +7j8R/wWzeKoMnhejE2CFq14jR5azdT7JbFbiOzPgoXxvVBVbRBGEEc8x6H/LpJ0 01nJrvaTQXhVRIKV0UMS3DVzadfQFQgbV1kf6mbj0fCD2rZUfnHJayY5kpOd6REi c7rqqqzlkfhe6euqh84ek+u6npn+p7nvllp5dx0dafdx+rv6b/95gcebvivpbh/6 uoawz9pxakb7bozbepuyqbzyatzev6b9mtmyovp+a0e81xrfbn20bnkmcseb/z5o rloopkbfnqyxqveuonomw+ddb1p+5nry4pnkghwzx4hplt/yjjo5d4axwbcsyof2 rbkmflxk+453ugsoykiichr2gpbegh5dxwlgqlxkrroqfeepvrt8ywxkl8sh43tj

iivvztroyew7ai6bmplljusnhlhvihtgcbszqrw4mvztvrxfs6pfywl/rqtp6dvm NLaMyy/xQ0mbJOaWREMcr1VWyHtMfSin/cJEi1AFGjSN65bMDcsGlULDMgKBRrtk ibqxajxsybfvt892nacnlxngqsoe2cznekezwu6ssez5mtbvkd0h9kpjqel3gcny FQkCymNLDCLKzQz9ZGzNtCNYRGE5mmwX7pjBYAijpy0vel0zgU9GU6nZFjWmudoa WaVqDJ8UpPLbQq+BmlDeeYO5H2jA5yhmVNLt4GfRi+g4KSqmV6BvKCT/YZaS4cBP ONJ6fij0Kk355mFecqMhNqPN3YJTUGUfHkJGBGGZuLFNQaMzgFzPrCU= =T7Ge -----END PGP MESSAGE----- 1. Click on the <Decrypt> button on the tool bar 2. A window pops up requesting your "Pass Key". Enter the pass key. 3. The clear text message replaces the encrypted message. That s all there is to it. If you are unfamiliar with PGP Encryption you may find the following information helpful. BASIC PGP INFORMATION What is PGP encryption? PGP stands for Pretty Good Protection. It's an encryption standard developed to facilitate the sending and receiving of digital documents securely. Classic methods for encryption use only one key for encryption. The sender encrypts the message with this key. The receiver of the message must have the very same key. This key must be passed to the receiver in such a way that others do not have access to it. If somebody else does have the key, then this method of encryption is useless. Using private keys with public keys strengthens security. The public key can be shared with others and can be distributed via email or the internet. The private key, however, is kept secret and should never be shared by any method. When implemented correctly, the private key cannot be decoded from the public key. With this two-key method the sender will encrypt the message with the public key that belongs to the receiver. The receiver will decrypt the message with his/her private key. It is a very good standard and you are pretty much assured that if you send a message to Joe and it is encrypted with Joe's "public key" only Joe will be able to read the message. iscribe makes it easy to send and receive PGP encrypted messages. With a click of a button you can encrypt a message. When you receive an encrypted message simply pressing a button causes iscribe to prompt for your "private key" and, if you enter it correctly, decrypt the message that was addressed to you. What are digital signatures? Digital signatures are a way of encoding documents so that the recipient knows that the document was created by you and has not been modified by anyone else. A digitally signed document or e-mail does not have to be encrypted. If, for example, you have a favorite recipe that

you want to mail to an Internet news group (i.e. the island packet news group) but you want to make sure no one modifies the recipe and then passes it on to friends as their creation; you would simply digitally sign the plain text (or clear text) e-mail. People receiving your message could then verify that the recipe you signed came from you and has not been modified. NOTE: The recipient of your encrypted email and/or digital signatures does not need to be running iscribe to view the messages. As long as they have some PGP standard email program (there are many) they can read and verify your messages. Similarly, anyone sending you encrypted emails do not need to be using iscribe. Any PGP encoding program will do. What is a key pair? A key pair is what is required to encrypt/decrypt a document. When you install the PGP software on your computer you will be prompted to create a key pair. The installation software will prompt you for a "Pass Key" and generate two keys from it, the "Public Key", and the "Private Key". These keys are big long horrible sequences of letters and numbers that are used to encode your message. Fortunately, iscribe manages these keys for you in a simple way so that you don't actually need to know what they are. They only really important thing to keep secure and not forget is your "Pass Key". This is a simple string of text that you will need to decode messages addressed to you. If you forget your "Pass Key" you will not be able to open messages sent to you. The "Pass Key" can be any free text you want as long as it is longer than 8 characters. "Honey I am home" is a perfectly good pass key. The pass key is case sensitive so keep this in mind when you commit it to memory. How it works... Let's say you want to receive encrypted messages from Joe@somewhere.net. Before Joe can send you an encrypted email he needs to know your "public key". So in a plain email you mail him your public key. Anyone in the world can see the key, but it doesn't matter. The public key can only be used to encrypt a message to you. It cannot be used to read a message addressed to you. Only you can do that. Once Joe receives your public key he can use PGP software to generate an encrypted message to you. If he is using iscribe the process is simple. When you receive the encrypted email from Joe and try to read it with iscribe, iscribe will prompt you for your "pass key" (The Honey I am home thing...). iscribe will then generate the "private key" from the pass key and decrypt and display the message for you. For you to send an encrypted message to Joe, you need to have his public key. So, Joe first sends you an email with his public key. Once you receive Joe s public key with iscribe, you push a button and Joe's public key is automatically added to an address book. To send an encrypted message to Joe you create the messages as usual, push a button and send the encrypted message to Joe. Very, Very simple and secure... If there is a weak point in this method, it is in the spreading of the public keys. Please use caution when distributing your public key and when accepting the public key of others. You may consider a public key as trustworthy when you trust the sender of the key. Thank you! Global Marine Networks, LLC www.globalmarinenet.com email: support@globalmarinenet.com