180 likes | 277 Views
Tools and Techniques of Encryption. Jeremy Malcolm A presentation to WASCAL on 29 May 1996. Introduction. Encryption ensures security of computer-based information Security includes privacy and authentication Trade-off between security and convenience
E N D
Tools and Techniques of Encryption Jeremy Malcolm A presentation to WASCAL on 29 May 1996
Introduction • Encryption ensures security of computer-based information • Security includes privacy and authentication • Trade-off between security and convenience • If tools are used incorrectly, security may be lost
Agenda • Importance of encryption • Applications for encryption • Principles and protocols • Secret key versus public key encryption • PGP • Other encryption standards • Using encryption tools
Importance of encryption • Lawyers have a duty to keep clients’ information confidential • Email messages are more like postcards than sealed letters • Using encryption for all your email avoids drawing attention to confidential email • Cost-benefit analysis
Applications for encryption • Email • Secure electronic transactions • World Wide Web (Secure Sockets Layer)eg. Netscape and Internet Explorer v.2 • Proprietary systems eg. home banking, MSN • Office equipment • DES telephones, faxes, digital mobile phones • Confidential documents in the office
Encryption in the office • Built-in encryption gives poor security • $US185 package cracks encryption schemes of WordPerfect, Lotus 1-2-3, Symphony, Quattro Pro, Paradox, Excel and MS Word 2.0 • Lotus Notes • Secret key encryption for Notes documents • Key can be made distributable or non-distributable • Public key encryption for Notes mail • Microsoft Exchange fax encryption
Principles and protocols • Public key encryption • Secret key (symmetric, conventional, password, single key) encryption • USA export controls • Some encryption software unavailable here • International Netscape substantially less secure • Phil Zimmerman prosecution
What is public key encryption? Sender Recipient Distribute public key Distribute public key public key public key Decrypt message with private key Encrypt with recipient’s public key/s Verify signature with sender’s public key Sign with private key
Authentication without encryption • Create a hash (checksum) for the plaintext • Encrypt the hash with your private key • This “signature” can be authenticated only with your public key From alt.security.pgp: “I am a practicing attorney in Colorado with clients in other states and in Canada, and I use e-mail to communicate with many of them. Having a verified PGP signature on e-mail from me tells the clients that the message really comes from me and that any advice or instructions contained in the e-mail is advice or instructions that I want them to follow. Hopefully, they trust me enough to do so. :-)”
Public Keys -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQBtAzDmHn0AAAEDAMzvMfAQYj2AGd6dV/ctqtKj2grlDrWW8R9B2vSe8w2lZDqb r+/msS/UvSci79vxHmppkOvKVFhCdcI9yRcsFL5BNrJf5zLTKUVZVcUhIWQXF4Db //2HwEe/5gZYw9iQAQAFEbQxSmVyZW15IE0uIE1hbGNvbG0gPHRlcm1pbnVzQG9k eXNzZXkuYXBhbmEub3JnLmF1Pg== =liEN -----END PGP PUBLIC KEY BLOCK----- • Obtained through: • Email, finger, WWW • Key servers • Automatic for WWW browsers
PGP - Pretty Good Privacy • De facto Internet standard • Offers public key and secret key encryption • Not an email program • Variants • Freeware • Commercial: “Viacrypt” • Restricted export • International
Other encryption standards • PEM - Privacy Enhanced Mail • De jure standard (RFCs 1421-1424) • Easier to integrate into third party products • Relies on hierarchy of Certifying Authorities • RIPEM - Riordan’s Internet Privacy Enhanced Mail • Less widely used than PGP • Illegal to export outside USA • TIS/PEM - Trusted Information System PEM
Other encryption standards • DES (Data Encryption Standard) • Conventional encryption (secret key only) • Fast • Available for office equipment • Built in to application software • No longer considered sufficiently secure • Triple DES
Using encryption tools • Secret key encryption requires a secure channel • “Add-ins” • Microsoft Exchange PGP add-in • Eudora, Pegasus Mail add-ins available • Stand-alone products • Power PGP (freeware) • Numerous others available
Dangers and limitations • Compromised passphrase and secret key • Remember the passphrase • Keep the key on a floppy disk • Exposure on multi-user systems • Don’t keep your secret key on such a system • Obvious passwords • Physical security breaches • Don’t save or print out plaintext
Dangers and limitations • Public key tampering • Certification by PGP signature • Bogus timestamps • Timestamping service or PGP signature • "Not quite deleted" files • Ensure software wipes plaintext files • Viruses and Trojan Horses • Anti-viral software
Summary • Security for electronic information • “Armoured van” for communications • “Safety deposit box” for documents • Less convenient to work with than plaintext, but effective if proper safeguards are taken • Email Encryption for Lawyershttp://www.tpgi.com.au/lawsoc/encrypt.htm • Question time