Encrypting your Email Communications using PGP



Similar documents
File and encryption with GPG4win & Enigmail

GPG installation and configuration

GPG - GNU Privacy Guard

GPG4win / Kleopatra Documentation. Secure file and encryption by using GnuPG for Windows

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

How to install and use the File Sharing Outlook Plugin

Internet Encryption S/Mime Standard

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

4. Click Next and then fill in your Name and address. Click Next again.

Yale Software Library. PGP 9.6 for Windows

Secure Part II Due Date: Sept 27 Points: 25 Points

Signing and Encryption with GnuPG

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

How to use PGP Encryption with iscribe

Remember, this is not specific to your address alone... the METHOD you retrieve your is equally important.

Getting started with IMAP for Aggi What is IMAP?

Receiving Secure from Citi For External Customers and Business Partners

LiteCommerce Advanced Security Module. Version 2.8

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Djigzo S/MIME setup guide

Secure transaction guidelines for external users with Commission personnel.

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin Using the Legal Vault

Secure User Guide. Guidance for Recipients of Secure Messages from Lloyds Banking Group

Pretty Good Privacy with GnuPG

IBM Aspera Add-in for Microsoft Outlook 1.3.2

Using Entrust certificates with Microsoft Office and Windows

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

Installing Logos SSL Certificates on Mobile Devices

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

Open-Xchange Guard Major Release v Feature Overview V1.4

Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v ONWARDS)

How to Setup Privacy Guard Encryption.

JPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0

User Guide. Version 3.0 April 2006

isecur User Guide for iphone

USER MANUAL. v Windows Client January

Office of Information Technology Connecting to Microsoft Exchange User Guide

Encryption Recipient Guidelines

Using your Encrypted BlackBerry

How To Access Your Cpa.Com From Your Computer Or A Mobile Phone Or Ipad (For A Free Download) Without Having To Use A Webmail Account

ENCRYPTION ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR S FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD A BLACK PAPER

The Joys of Importing & Using an S/MIME Certificate CCIT Publication

CBH Provider EDI Browser Manual

1. Scope of Service. 1.1 About Boxcryptor Classic

Symantec Encryption Solutions for , Powered by PGP Technology

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FTP-Stream Module: InstantShare End User Guide

Mac Client Installation Notes

Signing and Encryption with GnuPG

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

Q. I use a MAC How do I change my password so I can send and receive my ?

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014

THUNDERBIRD WORKBOOK

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Personal Secure Certificate

LSGMI REMOTE DESKTOP SERVICES.

INTRODUCTION TO CRYPTOGRAPHY

BOTTOM UP THINKING SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Secure User Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Secure Client Guide

Directory and Messaging Services Enterprise Secure Mail Services

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

Guide Installing Digital Certificates in Outlook 2000

STEP 01 Nortel Contivity VPN Client Installation

How to get Office 365 through your Student

How to Password Protect Files & Folders in Mac OS X with Disk Images

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

Mac OS X User Manual Version 2.0

SECURE USER GUIDE OUTLOOK 2000

Backing up Microsoft Outlook For the PC Using MS Outlook 2000 Keith Roberts

Outlook Web Access 2003 Remote User Guide

Lotus Notes 8.5 to Office 365 for business

Outlook XP Only

Setting up secure communication with Ericsson. Guideline for Ericsson partners

User guide. Business

PDG Software. Encryption Guide

Secure Recipient Guide

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Active Directory Self-Service FAQ

Encrypt USB Drive to Protect Data

Training module 2 Installing VMware View

Using etoken for Securing s Using Outlook and Outlook Express

USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP)

VPN Web Portal Usage Guide

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

TABLE OF CONTENTS. Legend:

Transcription:

Encrypting your Email Communications using PGP

If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following URLs: www.gpgtools.org (Mac) www.gpg4win.org (Windows) www.gpg4o.de (Outlook 2010 plug-in)

How do I protect Financial Assets?? Safe Tax Strategy Stable Institutions Strong PIN Gold Off Shore Due Diligence Trust Diversification Entities Insurance

How do I protect Physical Assets?? Guard Dog Safe Neighborhood Firearms Alarm System Situational Awareness Medical Checkup Eat Well Martial Arts Exercise Lifestyle

How do I protect Digital Assets?? One Time Password Linux PGP Tor Anti-Virus Firewall Mac Versus PC Safe Email Provider Technical Expertise Off The Record Chat Jitsi HTTPS Proxy Service Secure Cloud Storage Strong Password TrueCrypt

Answer Any and all of the above There are many technologies, techniques and tools. Each is intended to address a different problem.

Today We will address the challenge of communicating privately via email using Public Key Encryption. If you grasp the concept of how Public Key Encryption works, developing additional security practices become much simpler. Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. - Edward Snowden

Agenda VERY BRIEF primer on encryption as it applies to email Configure your laptop and email software to send and receive encrypted email Windows Mac Outlook (2010) Apple Mail

Three Data Security Objectives Confidentiality Preventing unwanted disclosure of information Integrity Ensuring that content as well as identity can be trusted. Availability Ensuring that data and systems are available when expected.

What is encryption? Encryption is the process of encoding information so that only authorized parties can read it.

Two Kinds of Encryption Shared Secret / Symmetric Key Both the sender and the receiver use the same encryption key. Works very well, but it requires the sender and receiver to be able securely share the key ahead of time. That is a problem in the world of email. Public Key / Private Key A different key is used to decode than to encode a message. (Wait... I ll explain). This is what is used to encrypt email. The enabling technology is commonly known as PGP or GPG

Public Key Encryption During setup, two keys are generated, a public key and a private key. The keys are mathematically related, but one cannot be used to derive the other. What is encrypted with one key can be decrypted with the other. What is encrypted with one key CANNOT be decrypted by itself. The public key is distributed far and wide to any and all. The private key is a closely guarded secret. Public Keys are used to encrypt. Private Keys are used to decrypt So here is how it works...

How to encrypt email Make sure your recipient has PGP / GPG... and knows how to use it! Make sure you have the recipient s public key. Type your message in your mail program and click encrypt. Select the recipients Public Key to use for encryption and click Send

What is Signing? Signing is the act of digitally certifying that an email you have sent did in fact come from you. It is comparable to the use of a signet and a seal. Assume you have my pubic key and that you know it belongs to me Assume that you know with a high degree of confidence that I have closely guarded my private key I can fingerprint my message with my private key. Using my public key in your possession, you can verify the fingerprint. Since the fingerprint is unique to my private key, you know the message came from me

Installation and Configuration

Install GPG Mac Run GPG Suite from directory Accept all default settings and install Close to finish installation In Spotlight type and run GPG Keychain Access PC Run gpg4win on thumb drive Under Choose Components, check all except GpgOL Claws-Mail Complete Installation (May require reboot) Under Programs, confirm new folder Ggp4Win and launch program Kleopatra Next - Create Keys...

Create Encryption Keys Mac Launch GPG Keychain Access Click New Enter name and email address. Open Advanced Options in the Comment field, enter private or work Set Expiration if desired. Leave other default settings. Click Generate Key Enter passphrase and repeat. DO NOT FORGET. (I recommend a sentence). Click Finish PC In Kleopatra click File New Certificate Select Create a personal OpenPGP key pair Enter name and email address. Under Comment, enter private or work Click Advanced Settings. Review and change as necessary (expiration date). Click Next and Create Key. Enter passphrase and repeat. DO NOT FORGET. (I recommend a sentence). Click Finish Next - Configure Email...

Configure Email Outlook Install Outlook GPG Plug-in - gpg40_setup.exe Accept default settings (Note This is trial software) Thunderbird Install Thunderbird plug-in nameed Enigmail by clicking Tools Add-ons and search for add-in Enigmail Apple Mail No configuration necessary Next - Distribute Public Keys

Distribute Public Keys Mac Open GPG Keychain Access Right-click your key and hit Export CLEAR THE BOX THAT SAYS Allow Secret Key Export (IMPORTANT) PC Open Kleopatra Select your certificate and click Export Certificates Save the file to your desktop and email as an attachment to: caseyconference.2013@gmail.com Save the file to your desktop and email as an attachment to: caseyconference.2013@gmail.com You will receive an automatic response from caseyconference.2013@gmail.com with our Public Key attached. Save that file to your desktop immediately.

Import Public Keys Remember: You need my public key to send me an encrypted email. My public key (that you received from my automatic response) is my lock that I send you. I have the key to unlock it. You need to put my public key in your keychain Mac Open GPG Keychain Access Click Import and select the file saved on your desktop named caseyconfpublickey Click Open PC Open Kleopatra Click Import Certificates and select the file saved on your desktop named caseyconfpublickey Click Open

Finally - Time to Encrypt Stuff Mac Apple Mail Launch Apple Mail Click Compose New Message compose a test email to caseyconference. 2013@gmail.com Click the lock icon to make sure it is locked. Make sure there is a checkmark in the seal icon. Click Send. Enter your PGP pass phrase from earlier. PC Outlook Launch Outlook. If asked for gpg4o settings, accept default. compose a test email to caseyconference. 2013@gmail.com Ensure there is a checkbox in both Encrypt and Sign. Click Send. Enter your PGP pass phrase from earlier We will respond with an encrypted and signed email from caseyconference.2013@gmail.com

Review and Notes You encrypt a message with another party s public key You decrypt a message with your own private key You sign a message with your own private key You verify a signature with another party s public key Does the whole email get encrypted? NO What if I want to encrypt to many recipients? How about GMail via a browser? What if I lose my key or my computer crashes? ipad / iphone: opengp and ipgmail