Encryption for Everyone

60
ncryption for Everyone What We Do Is Secret Dru Streicher

description

Encryption protects your privacy and is essential for communication. However encryption is sometimes complicated and hard to use. I want to discuss what encryption is, how it is used, and make it easy for everyone to use. I will show what tools are available under linux for protecting communications, hard drives, and web browsing.

Transcript of Encryption for Everyone

Page 1: Encryption for Everyone

Encryption for Everyone:What We Do Is Secret

Dru Streicher

Page 2: Encryption for Everyone

Dru Streicher

•Systems Administrator ()

•Hardware Hacker

•Open Source Punk Rocker

•Collector of Arcane Technology & Vinyl Records

About Me

Page 3: Encryption for Everyone

Encryption Basics

Page 4: Encryption for Everyone

Encryption: What Is It for?

Page 5: Encryption for Everyone

Why Is Encryption Important?

Page 6: Encryption for Everyone

What Does It Look Like?

Page 7: Encryption for Everyone

Encryption is Hard!

Page 8: Encryption for Everyone

One Way Functions

Page 9: Encryption for Everyone

•Phonebook encryption

•Plaintext: S-E-C-R-E-T

•S = Jenny Smith 867-5309

•Cypher text then becomes 6 phone numbers

•To decrypt you would have to find each phone number in the phone book

•Easy to make & Hard to solve

One Way Functions

Page 10: Encryption for Everyone

HTTP vs HTTPS

Page 11: Encryption for Everyone

HTTP vs. HTTPS

Page 12: Encryption for Everyone

HTTP vs. HTTPS

Page 13: Encryption for Everyone

HTTPS

Page 14: Encryption for Everyone

Meet Alice & Bob

Page 15: Encryption for Everyone

Alice wants to share a secret message with Bob

Page 16: Encryption for Everyone

They don't want Eve to be able to get their secret message

Page 17: Encryption for Everyone

They Use Symmetrical Encryption:

Page 18: Encryption for Everyone

Alice encrypts the message with a password and sends it to Bob

Page 19: Encryption for Everyone

Even if Eve intercepts the message, without the password it can't be decrypted

Page 20: Encryption for Everyone

Bob knows the password so he can decrypt the message

Page 21: Encryption for Everyone

Real world use for symmetric encryption:Disk Encryption

Page 22: Encryption for Everyone

Disk Encryption• There are ways to access your drive and get around all that logging in stuff

• Encryption makes it private

Page 23: Encryption for Everyone

Tools for disk encryption In linux

Page 24: Encryption for Everyone

Asymmetrical Encryption

Page 25: Encryption for Everyone

Alice and Bob have never met:

They use Asymmetrical Encryption

Page 26: Encryption for Everyone

Public vs. Private Keys

Page 27: Encryption for Everyone

Alice and Bob trade public keys

Page 28: Encryption for Everyone

Alice encrypts her secret message using Bob's public key

Page 29: Encryption for Everyone

Bob can then use his private key to decrypt the message

Page 30: Encryption for Everyone

Key Servers

Page 31: Encryption for Everyone

Creating Keys Using the Command Line

Page 32: Encryption for Everyone
Page 33: Encryption for Everyone
Page 34: Encryption for Everyone
Page 35: Encryption for Everyone
Page 36: Encryption for Everyone
Page 37: Encryption for Everyone

If you lose your private key's password or your private key becomes compromised you can revoke the key.

Revocation Certificate

Page 38: Encryption for Everyone

Creating a Revocation Certificate

Page 39: Encryption for Everyone
Page 40: Encryption for Everyone
Page 41: Encryption for Everyone

Thunderbird & Enigmail:Your one stop for PGP & Email

Page 42: Encryption for Everyone

• Walk you through creating a gpg key in wizard mode.

• Manage all your keys

• Encrypt and Decrypt mail Automagically

• Sign outgoing email with your public key

Page 43: Encryption for Everyone

Web Based EmailGmail and Yahoo and other web based email providers don't support encryption and decryption natively.

Page 44: Encryption for Everyone
Page 45: Encryption for Everyone

• The Onion Router

• “Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.” -Wikipedia

Page 46: Encryption for Everyone

How Tor Works

Page 47: Encryption for Everyone

How Tor Works

Page 48: Encryption for Everyone

How Tor Works

Page 49: Encryption for Everyone

Tor Software

Page 50: Encryption for Everyone

• Exit nodes can be monitored

• Can be hard to configure

• Speed

Problems With Tor

Page 51: Encryption for Everyone

• Virtual Private Network

• Creates an encrypted point-to-point network

• Allows you to remotely access your local network resources such as printers, servers, computers

VPN

Page 52: Encryption for Everyone

VPN

Page 53: Encryption for Everyone

Software VPN Options

Page 54: Encryption for Everyone

Hardware VPN Options

• Lifehacker.com: How To

• Raspberry Pi

• Your Home Router:

• DD-WRT

• Tomato Router

Page 55: Encryption for Everyone

• IM – Off The Record (OTR) plugin for Pidgin

• Android – K9

• SMS Encryption – TextSecure for Android

Other Encryption Tools

Page 56: Encryption for Everyone

Encryption is About Privacy

Page 57: Encryption for Everyone

More Info

Web

Beginners Guide

- Steven Levy

The Codebreakers - Dav

Page 58: Encryption for Everyone

Questions?

Page 59: Encryption for Everyone

Thanks• Ohio Linux Fest

• Ian Gillespie for the great slides

Page 60: Encryption for Everyone

Contact Me

Technical Questions & Lolcat [email protected] PGP PUBLIC KEY BLOCK-----

Version: SKS 1.1.0

mQINBFDCGlABEAC0U5yz3gQ4QIPgdLzxp0Itf6y/vJwfuivOvuh0EDcS5U1rH0BMJpDJPUwq

8i6AVe40NF7d2z0ub/VJHIm8prR6eOUVUEHasA/hFcaar9UDl+jlY72/qc7G+TXnWzTwlyGt

mzFcZn/ctHkyB4JtNX3oe1hdYqXws9WIBzdgs8PY4rstPNBznXaQElXpChUGp2LWys9x1rLv

01br8WmJfL3vDb2PevSnZw/fQ7xMeics4LT6VMb2D7gtr4QDkFPjL/v7K0YJFH4PC2l1TQSe

/+vmbSPAXusa70ehbxvzBry/92HSL46yA+S7v7aCYT67mVVTvIgIBOwlgC1ektlCHmBJiCxi

n9BsjE1cNRMp2USjb+sIH1Qt2Ix9EnCTR9hsKuvCe9u5teh/kleOYr2Cz0eogqVephMvC5bf

EK/b1pEUhx6Z+T/pAd3E8dh1nF0Kvo2IgB+Lb5qLFlqZxVT/oLOnGT7kpChwhP/J9/71c7KY

emXF0hjnsKeE8CNUNBsEvASmFcOdEHJ8Iyu0kHRsWp2HqjphmbN8ozg4ykvtjIvu6dGOskO+

qs30LxNqpRXb2xUf1j8IXQulh6Di6IGRmKo20dw1PSBKOSrsUgretUThFJ2x/iIDbc3Boemi

82IHCh0Jhjr5S6u4FmpeRHZMwMIpON0p8OcWTL5iabUih0EWQwARAQABtDZEcnUgU3RyZWlj

aGVyIChIdXJyaWNhbmUgTGFicykgPGRydUBodXJyaWNhbmVsYWJzLmNvbT6JAjgEEwECACIF

AlDCGlACGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEMtLKJM5q6CK29gQAKI3J3XE

t7eauBegHnc7iTZBjQAWym4B+QzAv1qipVU49nEip4qPlPkCOg8gCE2xCaq3yfRYJm/MTuxp

u2GTjfGtkUgqw3eAJs42pRK7eDJKNUZVZ799yy+nYtv8pBMqQqFS2YyTSczee7sx7vmFp6J+

zKp+e7ePF/a+V3ZVXrnAGwSyn0iuXUP/asOl89n979dp+fYmV26GzBlyz7qfCbWwNy5028Mj

tHdahzUhZ3Utr3RuQ8MIcdbZsJSoEGE6aOrg2/YH8LzDTxpoUjvL+lE2dM183VAh03Hm41Ab

ma6z1Bt96xcQ4bmINAL/Z/NqrjXwpOk+JAY6GlgKP+KT0vE9DZbfXYGZZNehwV4gVKSHOuZY

FB/MvmExc6JgXl8oUir92IyX1Ol+FIjZGJnq9YVDAFyw88XNwdofuw52SbBkeD8bJWkAbiSh

IpERgclY23y48bPI0b/RQnH9DFjY0QIDaNtVUOIgSd8GEAdMWs9a2xAV2PVfZfvtgNh2D7Lf

L9tmF9HYSXMfypy4NyQfsKhMgXr/vxWDpPNWWmJZW5JpXBZDvEifXlBeeOG72LXpr/9i4R3i

Gmqs34cJwYjmf1eaw8kcFmLyqJgIsk7e7zn1YctFSCQfbXYgtua9LBrObsejZ6XGrLHLUVs4

krPRG/XFsR0rbUrLVeTme3mTVRlKuQINBFDCGlABEADXta7G0ydqI5hBcaLJ6YxfB3EcE2Jv

yFx9TLn1FFQIfJniKpSiiQLVZoaV7XOEhYfqx9b2mHSlpovStM99gXMFeSzYKcsc87XpiVSh

SBdevTJcRqqZ56zZjyMDz6Mo3mQrGnGL/pptV9BxZ6hZJRgiD0s9Oy7rK+s2r2b6zlu6RQWf

Rt9hNqIWU3qDdSaEi2lbzd6HcWa7VS8JKebC3lnMGJM3Mfubpl/WR9UcuRTnXygL9yhzOyMH

F7+3SulaLf8ATgEOLyXKf/NFe7IBHJEmUGr18CkyTw2NTfP802LXk7SuUk3hn2lnwL0HFNkK

EwKMH3fsmYsoSnjCtIA1sFfdsdGiAXfyazTYdoUGOdn0blE+rDuwFF2Y0FAjXAljWt6WkT5u

+6jFR5fDSVCm6ug/ZHeHUobWR55/2vHyAmCaf0v9XIJBo+PCEDyuPYbSRu3z3SOSN6+y2PK1

krF83vBF3FW722PWKjxn1cVbiWAkd7oIcEEmq3RbkHREM4nJtyce+jsGPuS2CMQFbroHs73w

3LOYnEAEFF8haGXcmRi/haLa0/R+Ys/tdQ5GaESZxKYLLgbapYSldPQDv2xJanGw6jNDeZSq

Inoc+bTBxEh7Rtu97M/G6fGiV80yBzFPK5TQ3nvAW7D4s/qnSzgsWed4re4sT9qQf6g0pFb1

yGlTMQARAQABiQIfBBgBAgAJBQJQwhpQAhsMAAoJEMtLKJM5q6CKpHoP/2H71SJDiWmoZVVU

8LVaije5Bcy9P4FaXC3PHoKWPjwBNNwVhWUtfyo0iP0Ren2g8cXHGNLmOz7dIF02JEhmOUm4

YO4ntUuNSuJsQs7w/3aKcXoD3GYkMiYyLa0a2x4M48qFkhbBjyDLdIe6RzGkkZfKEnvFUi2y

SVGlQ7SZSMPTX0DZDPt0Z1H+fXlojRYZ5/dH/5CSjwRQvN9ARO5owlDCbcIxGAIMs5aDAttp

O9Zm1VUbfD/jLicRrxptIMcfjt9/mKOOqBoseG2EUi7MoQn/QmpN3Ev49KwqREDensjs81kD

E+O7by5M/4NYe6JgVuxxzQfxXOSHywE9RrCtDhZRPJ2EhYGDxe5GTbDVs+04m7IBD15D/DPP

D/h0pcwM3L5BNg7zueO6IthftPgIAHWGbHEtb86suHrk9Q9nGRfVTAPwv7/leHLgd1AfgWrO

mD7Othd5jUZfGSw8cARjDTil+sbbAShhLemWuerBmiYI8j9zfs0h+GvlzqT29Hbpwy9RHjWd

1cWM6mAX9yuQIxp/qAAU7v4VFInNyJx0/Slpc1NXqvT3cEruPsxNMGXNIo+rnclPjrlwaz/h

+u3/wo9tsJ2YNlFVW5/kjSu7rxH9l4k5f9tWn0Dk9ioR755g72R/Fhp+oq9a3+YlMLl+igbe

7BsYZlbHm854fnbvE5/Z

=GaKq

-----END PGP PUBLIC KEY BLOCK-----