Factbox: Data protection for beginners

Cryptoparties have sprung up around the globe to help internet users to protect their data. Here’s what you can you do to protect your digital privacy, writes Andy Park.

Screenshot-from-2012-09-29-17-06-08-article_319579965
Disclaimer: This information is provided as a guide only and mostly collated from Electronic Frontiers Australia's cryptography page and the Cryptoparty's peer-reviewed wiki. Please check with state and federal laws and your internet service provider regarding the application of these protocols.

Cryptography

is scrambling data so that only an authorised person can access it.

Computer ciphers have two chief components: a method (or algorithm) and a key. The two are used together to encrypt a message or file. The algorithm is public but the key is kept secret.

Ciphers

Come in several different types. The two main ones of interest are:

Secret key cryptography

This is also called symmetric cryptography because the same key is used for encryption and decryption. Common symmetric algorithms include DES, Triple-DES (3DES), IDEA, and the Advanced Encryption Standard (AES), Rijndael.

Public key cryptography

This is also called asymmetric cryptography because different keys are used for encryption and decryption. Public key systems usually rely on key pairs, one of which is the public key which can be given to anyone and the other being the private key which must be kept a secret by its owner. Asymmetric encryption algorithms include RSA, El-Gamal, and Eliptic Curve.

SSL

Secure Socket Layer is a multi-cypher protocol used to create an encrypted connection across the internet from your device to a destination server; it is widely used in commercial applications.

PGP / GPG

Pretty Good Privacy is a data encryption and decryption computer program. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories, and disk partitions to increase the security of e-mail communications.

• Multiple Operating Systems - GNU Privacy Guard
• Apple Macintosh - GPG Tools
• Microsoft Windows - GPG4Win
• Android - APG Android Privacy Guard
• iOS - oPenGP
• Enigmail plugin for Mozilla Thunderbird email - Enigmail

Disk Encryption

TrueCrypt is an on-the-fly disk encryption system. The software is freely available, runs on multiple operating systems, and is very easy to learn how to use. TrueCrypt also plays nicely with dual-boot systems (such as Windows and Linux).

TOR

Tor is a tool for anonymous browsing & anonymity, Tor is available for Mac, Linux, and Windows (and for Android devices under its Orbot distribution, and for iOS devices as the Onion browser: see entries below). In order to make your surfing via Onion Routing as safe as possible, you will need to change your habits a bit; fortunately the website and its blog are very informative about your options for enabling anonymity for yourself and/or providing it for the world at large.

Password protection

is one of the easier ways to provide a barrier from you disk drives, accounts and devices:

Check here to test the strength of you password here

Terminology (from EFA.org)

Asymmetric Algorithm

An algorithm in which the key used for encryption is different from that used for decryption. Also known as public key cryptography.

Block Cipher

An algorithm that encrypts data in blocks, commonly of 64 bits each.

CAST

A 64-bit block cipher, developed in Canada by Carlisle Adams and Stafford Tavares.

Cipher

A cryptographic algorithm, i.e. a mathematical function used for encryption and decryption.

Clipper

Originally the name for a tamper-resistant encryption chip designed by the U.S. National Security Agency for voice encryption. The chip has built-in key escrow features to facilitate wire-tapping. The term has subsequently been applied to further attempts by the US government to introduce key escrow provisions, the latest variation being the key recovery plan of October 1996, dubbed Clipper 4.

DES

Digital Encryption Standard. A symmetric block cipher using a 56-bit key which was originally developed by the US National Institute of Standards and Technology (NIST) in 1977 as a standard encryption algorithm. In 1999, the Electronic Frontier Foundation (USA) developed a machine to demonstrate that DES could be broken in a few hours with a brute-force attack. Encryption using single DES is generally no longer considered to be secure. (See Triple DES)

Diffie-Hellman

A public-key algorithm, invented in 1976.

DH/DSS

A type of key used in PGP since version 5.0. Contains a Diffie-Hellman key of between 1024 and 4096 bits for encryption and a 1024-bit DSS key for digital signatures.

DSS

Digital Signature Standard. A proposed standard for digital signatures using Digital Signature Algorithm.

Digital Signature

An encrypted message digest which is appended to a plaintext or encrypted message to verify the identity of the sender. The signature is encrypted with the user's private key and can only be decrypted with the corresponding public key. The same key pairs may be used for signature and encryption purposes but separate key pairs for each purpose are usually recommended.

IDEA

International Data Encryption Algorithm. It was introduced in 1992 as a potential alternative to DES and is regarded as very secure. It is a block cipher using a symmetric algorithm based on a 128 bit key. IDEA is the data encryption algorithm used in PGP.

Key

A value that is used to encrypt or decrypt a message.


Key Escrow

A concept that originated with the Clipper Chip program, by which a secret or private key is split and the two parts held by escrow agencies against the possibility that the key may be required for law enforcement surveillance or national security purposes.

Key Recovery

A key escrow system which relies on a trusted party to recover a user's confidential keys for use by law enforcement or national security agencies acting under "proper authority". The trusted recovery party might in some cases be internal to the user's organization, but in all cases notice to surveillance targets that their key information had been released would be prohibited. Key recovery is central to the US government's new encryption policy announced in October 1996.

PGP

A complete public-key cryptosystem for electronic messaging that has been released to the public domain. It was originally designed by Phil Zimmerman. It uses IDEA, CAST or Triple DES for actual data encryption and RSA (with up to 2048-bit key) or DH/DSS (with 1024-bit signature key and 4096-bit encryption key) for key management and digital signatures. The RSA or DH public key is used to encrypt the IDEA secret key as part of the message.

PKAF

Public Key Authentication Framework. A system for authenticating digital signatures based on a hierarchy of trusted signatures.

RSA

The best known public key algorithm, named after its inventors: Rivest, Shamir and Adleman. RSA uses public and private keys that are functions of a pair of large prime numbers. The algorithm is best known for its application in PGP. It is patented in the USA only.

Steganography

A method of hiding a secret message in another message, e.g. within a graphic image.

Symmetric Algorithm

An encryption algorithm where the encryption key is the same as the decryption key, or where one key is easily calculated from the other. The sender and receiver have to agree on a key before they can communicate securely.

Triple DES

A method of vastly increasing the security of DES by encrypting 3 times with different keys.




Share

7 min read

Published

Updated

By Andy Park

Source: SBS


Share this with family and friends


Get SBS News daily and direct to your Inbox

Sign up now for the latest news from Australia and around the world direct to your inbox.

By subscribing, you agree to SBS’s terms of service and privacy policy including receiving email updates from SBS.

Download our apps
SBS News
SBS Audio
SBS On Demand

Listen to our podcasts
An overview of the day's top stories from SBS News
Interviews and feature reports from SBS News
Your daily ten minute finance and business news wrap with SBS Finance Editor Ricardo Gonçalves.
A daily five minute news wrap for English learners and people with disability
Get the latest with our News podcasts on your favourite podcast apps.

Watch on SBS
SBS World News

SBS World News

Take a global view with Australia's most comprehensive world news service
Watch the latest news videos from Australia and across the world