Download - Encryption for Everyone

Transcript
Page 1: Encryption for Everyone

Encryption for Everyone:What We Do Is Secret

Dru Streicher

Page 2: Encryption for Everyone

Dru Streicher

•Systems Administrator ()

•Hardware Hacker

•Open Source Punk Rocker

•Collector of Arcane Technology & Vinyl Records

About Me

Page 3: Encryption for Everyone

Encryption Basics

Page 4: Encryption for Everyone

Encryption: What Is It for?

Page 5: Encryption for Everyone

Why Is Encryption Important?

Page 6: Encryption for Everyone

What Does It Look Like?

Page 7: Encryption for Everyone

Encryption is Hard!

Page 8: Encryption for Everyone

One Way Functions

Page 9: Encryption for Everyone

•Phonebook encryption

•Plaintext: S-E-C-R-E-T

•S = Jenny Smith 867-5309

•Cypher text then becomes 6 phone numbers

•To decrypt you would have to find each phone number in the phone book

•Easy to make & Hard to solve

One Way Functions

Page 10: Encryption for Everyone

HTTP vs HTTPS

Page 11: Encryption for Everyone

HTTP vs. HTTPS

Page 12: Encryption for Everyone

HTTP vs. HTTPS

Page 13: Encryption for Everyone

HTTPS

Page 14: Encryption for Everyone

Meet Alice & Bob

Page 15: Encryption for Everyone

Alice wants to share a secret message with Bob

Page 16: Encryption for Everyone

They don't want Eve to be able to get their secret message

Page 17: Encryption for Everyone

They Use Symmetrical Encryption:

Page 18: Encryption for Everyone

Alice encrypts the message with a password and sends it to Bob

Page 19: Encryption for Everyone

Even if Eve intercepts the message, without the password it can't be decrypted

Page 20: Encryption for Everyone

Bob knows the password so he can decrypt the message

Page 21: Encryption for Everyone

Real world use for symmetric encryption:Disk Encryption

Page 22: Encryption for Everyone

Disk Encryption• There are ways to access your drive and get around all that logging in stuff

• Encryption makes it private

Page 23: Encryption for Everyone

Tools for disk encryption In linux

Page 24: Encryption for Everyone

Asymmetrical Encryption

Page 25: Encryption for Everyone

Alice and Bob have never met:

They use Asymmetrical Encryption

Page 26: Encryption for Everyone

Public vs. Private Keys

Page 27: Encryption for Everyone

Alice and Bob trade public keys

Page 28: Encryption for Everyone

Alice encrypts her secret message using Bob's public key

Page 29: Encryption for Everyone

Bob can then use his private key to decrypt the message

Page 30: Encryption for Everyone

Key Servers

Page 31: Encryption for Everyone

Creating Keys Using the Command Line

Page 32: Encryption for Everyone
Page 33: Encryption for Everyone
Page 34: Encryption for Everyone
Page 35: Encryption for Everyone
Page 36: Encryption for Everyone
Page 37: Encryption for Everyone

If you lose your private key's password or your private key becomes compromised you can revoke the key.

Revocation Certificate

Page 38: Encryption for Everyone

Creating a Revocation Certificate

Page 39: Encryption for Everyone
Page 40: Encryption for Everyone
Page 41: Encryption for Everyone

Thunderbird & Enigmail:Your one stop for PGP & Email

Page 42: Encryption for Everyone

• Walk you through creating a gpg key in wizard mode.

• Manage all your keys

• Encrypt and Decrypt mail Automagically

• Sign outgoing email with your public key

Page 43: Encryption for Everyone

Web Based EmailGmail and Yahoo and other web based email providers don't support encryption and decryption natively.

Page 44: Encryption for Everyone
Page 45: Encryption for Everyone

• The Onion Router

• “Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.” -Wikipedia

Page 46: Encryption for Everyone

How Tor Works

Page 47: Encryption for Everyone

How Tor Works

Page 48: Encryption for Everyone

How Tor Works

Page 49: Encryption for Everyone

Tor Software

Page 50: Encryption for Everyone

• Exit nodes can be monitored

• Can be hard to configure

• Speed

Problems With Tor

Page 51: Encryption for Everyone

• Virtual Private Network

• Creates an encrypted point-to-point network

• Allows you to remotely access your local network resources such as printers, servers, computers

VPN

Page 52: Encryption for Everyone

VPN

Page 53: Encryption for Everyone

Software VPN Options

Page 54: Encryption for Everyone

Hardware VPN Options

• Lifehacker.com: How To

• Raspberry Pi

• Your Home Router:

• DD-WRT

• Tomato Router

Page 55: Encryption for Everyone

• IM – Off The Record (OTR) plugin for Pidgin

• Android – K9

• SMS Encryption – TextSecure for Android

Other Encryption Tools

Page 56: Encryption for Everyone

Encryption is About Privacy

Page 57: Encryption for Everyone

More Info

Web

Beginners Guide

- Steven Levy

The Codebreakers - Dav

Page 58: Encryption for Everyone

Questions?

Page 59: Encryption for Everyone

Thanks• Ohio Linux Fest

• Ian Gillespie for the great slides

Page 60: Encryption for Everyone

Contact Me

Technical Questions & Lolcat [email protected] PGP PUBLIC KEY BLOCK-----

Version: SKS 1.1.0

mQINBFDCGlABEAC0U5yz3gQ4QIPgdLzxp0Itf6y/vJwfuivOvuh0EDcS5U1rH0BMJpDJPUwq

8i6AVe40NF7d2z0ub/VJHIm8prR6eOUVUEHasA/hFcaar9UDl+jlY72/qc7G+TXnWzTwlyGt

mzFcZn/ctHkyB4JtNX3oe1hdYqXws9WIBzdgs8PY4rstPNBznXaQElXpChUGp2LWys9x1rLv

01br8WmJfL3vDb2PevSnZw/fQ7xMeics4LT6VMb2D7gtr4QDkFPjL/v7K0YJFH4PC2l1TQSe

/+vmbSPAXusa70ehbxvzBry/92HSL46yA+S7v7aCYT67mVVTvIgIBOwlgC1ektlCHmBJiCxi

n9BsjE1cNRMp2USjb+sIH1Qt2Ix9EnCTR9hsKuvCe9u5teh/kleOYr2Cz0eogqVephMvC5bf

EK/b1pEUhx6Z+T/pAd3E8dh1nF0Kvo2IgB+Lb5qLFlqZxVT/oLOnGT7kpChwhP/J9/71c7KY

emXF0hjnsKeE8CNUNBsEvASmFcOdEHJ8Iyu0kHRsWp2HqjphmbN8ozg4ykvtjIvu6dGOskO+

qs30LxNqpRXb2xUf1j8IXQulh6Di6IGRmKo20dw1PSBKOSrsUgretUThFJ2x/iIDbc3Boemi

82IHCh0Jhjr5S6u4FmpeRHZMwMIpON0p8OcWTL5iabUih0EWQwARAQABtDZEcnUgU3RyZWlj

aGVyIChIdXJyaWNhbmUgTGFicykgPGRydUBodXJyaWNhbmVsYWJzLmNvbT6JAjgEEwECACIF

AlDCGlACGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEMtLKJM5q6CK29gQAKI3J3XE

t7eauBegHnc7iTZBjQAWym4B+QzAv1qipVU49nEip4qPlPkCOg8gCE2xCaq3yfRYJm/MTuxp

u2GTjfGtkUgqw3eAJs42pRK7eDJKNUZVZ799yy+nYtv8pBMqQqFS2YyTSczee7sx7vmFp6J+

zKp+e7ePF/a+V3ZVXrnAGwSyn0iuXUP/asOl89n979dp+fYmV26GzBlyz7qfCbWwNy5028Mj

tHdahzUhZ3Utr3RuQ8MIcdbZsJSoEGE6aOrg2/YH8LzDTxpoUjvL+lE2dM183VAh03Hm41Ab

ma6z1Bt96xcQ4bmINAL/Z/NqrjXwpOk+JAY6GlgKP+KT0vE9DZbfXYGZZNehwV4gVKSHOuZY

FB/MvmExc6JgXl8oUir92IyX1Ol+FIjZGJnq9YVDAFyw88XNwdofuw52SbBkeD8bJWkAbiSh

IpERgclY23y48bPI0b/RQnH9DFjY0QIDaNtVUOIgSd8GEAdMWs9a2xAV2PVfZfvtgNh2D7Lf

L9tmF9HYSXMfypy4NyQfsKhMgXr/vxWDpPNWWmJZW5JpXBZDvEifXlBeeOG72LXpr/9i4R3i

Gmqs34cJwYjmf1eaw8kcFmLyqJgIsk7e7zn1YctFSCQfbXYgtua9LBrObsejZ6XGrLHLUVs4

krPRG/XFsR0rbUrLVeTme3mTVRlKuQINBFDCGlABEADXta7G0ydqI5hBcaLJ6YxfB3EcE2Jv

yFx9TLn1FFQIfJniKpSiiQLVZoaV7XOEhYfqx9b2mHSlpovStM99gXMFeSzYKcsc87XpiVSh

SBdevTJcRqqZ56zZjyMDz6Mo3mQrGnGL/pptV9BxZ6hZJRgiD0s9Oy7rK+s2r2b6zlu6RQWf

Rt9hNqIWU3qDdSaEi2lbzd6HcWa7VS8JKebC3lnMGJM3Mfubpl/WR9UcuRTnXygL9yhzOyMH

F7+3SulaLf8ATgEOLyXKf/NFe7IBHJEmUGr18CkyTw2NTfP802LXk7SuUk3hn2lnwL0HFNkK

EwKMH3fsmYsoSnjCtIA1sFfdsdGiAXfyazTYdoUGOdn0blE+rDuwFF2Y0FAjXAljWt6WkT5u

+6jFR5fDSVCm6ug/ZHeHUobWR55/2vHyAmCaf0v9XIJBo+PCEDyuPYbSRu3z3SOSN6+y2PK1

krF83vBF3FW722PWKjxn1cVbiWAkd7oIcEEmq3RbkHREM4nJtyce+jsGPuS2CMQFbroHs73w

3LOYnEAEFF8haGXcmRi/haLa0/R+Ys/tdQ5GaESZxKYLLgbapYSldPQDv2xJanGw6jNDeZSq

Inoc+bTBxEh7Rtu97M/G6fGiV80yBzFPK5TQ3nvAW7D4s/qnSzgsWed4re4sT9qQf6g0pFb1

yGlTMQARAQABiQIfBBgBAgAJBQJQwhpQAhsMAAoJEMtLKJM5q6CKpHoP/2H71SJDiWmoZVVU

8LVaije5Bcy9P4FaXC3PHoKWPjwBNNwVhWUtfyo0iP0Ren2g8cXHGNLmOz7dIF02JEhmOUm4

YO4ntUuNSuJsQs7w/3aKcXoD3GYkMiYyLa0a2x4M48qFkhbBjyDLdIe6RzGkkZfKEnvFUi2y

SVGlQ7SZSMPTX0DZDPt0Z1H+fXlojRYZ5/dH/5CSjwRQvN9ARO5owlDCbcIxGAIMs5aDAttp

O9Zm1VUbfD/jLicRrxptIMcfjt9/mKOOqBoseG2EUi7MoQn/QmpN3Ev49KwqREDensjs81kD

E+O7by5M/4NYe6JgVuxxzQfxXOSHywE9RrCtDhZRPJ2EhYGDxe5GTbDVs+04m7IBD15D/DPP

D/h0pcwM3L5BNg7zueO6IthftPgIAHWGbHEtb86suHrk9Q9nGRfVTAPwv7/leHLgd1AfgWrO

mD7Othd5jUZfGSw8cARjDTil+sbbAShhLemWuerBmiYI8j9zfs0h+GvlzqT29Hbpwy9RHjWd

1cWM6mAX9yuQIxp/qAAU7v4VFInNyJx0/Slpc1NXqvT3cEruPsxNMGXNIo+rnclPjrlwaz/h

+u3/wo9tsJ2YNlFVW5/kjSu7rxH9l4k5f9tWn0Dk9ioR755g72R/Fhp+oq9a3+YlMLl+igbe

7BsYZlbHm854fnbvE5/Z

=GaKq

-----END PGP PUBLIC KEY BLOCK-----