Sie sind auf Seite 1von 13

Protecting

Your Sensitive
Information with
Encryption

an Security eBook
Contents…
Protecting Your Sensitive Information with Encryption

This content was adapted from Internet.com’s Enterprise IT Planet and Enterprise
Networking Planet Web sites. Contributors: Drew Robb and Paul Rubens.

2
2 E-Mail Encryption: Lots of Choices, Plenty of Tradeoffs

4 Public Key Crypto for Enterprise Users

4 6
7 Understanding Public Key Infrastructure

9 PGP’s Universal Server Provides Unobtrusive Encryption

8 10
11 Encrypt Your E-Mail with GPG and Thunderbird

1 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

E-Mail Encryption: Lots of


Choices, Plenty of Tradeoffs
By Drew Robb

C
orporate espionage is big business these days. on the endpoint that integrates with the client e-mail reader
So it makes sense to deploy some kind of encryp- software.
tion system to ensure that prying eyes can’t deci-
pher anything garnered from intercepted messag- Gateway-to-Endpoint is one way to simplify things. It pro-
es or from stolen computers. Whether it is customer data, vides full encryption from a gateway system within the
employee data, intellectual property, or confidential financial sender’s network to the recipient’s endpoint. In this scenario,
information, losing anything can be seriously detrimental. the message leaves the sender’s desktop in plaintext and is
encrypted by a gateway located within relative proximity to
“Lost or stolen data can cripple a the e-mail server. This mode elimi-
business’s reputation and financial nates the need for any encryption
standing,” says Than Tran, product software or user interaction on the
marketing manager at PGP Corp. sender’s side.
of Palo Alto, Calif. “A business
must ensure e-mails containing “Another variation on this is
sensitive information are kept Gateway-to-Gateway,” says Tran.
secure and that they comply with “It is like Gateway-to-Endpoint, but
privacy laws to assure safe trans- adds an encryption gateway on the
actions for their customers and the recipient’s side, thus eliminating
privacy of their employees.” desktop software and administra-
tive costs on that end as well.”
Encryption Systems
Tran explains that there are several Finally, there is Gateway-to-Web,
different methods of e-mail en- which provides access to sensitive
cryption. Endpoint-to-Endpoint data via a Web server, possibly
represents full encryption from the co-located on the gateway itself.
originating device to the recipient The data is typically protected via
device. This method provides the transport layer encryption, such as
highest level of security by allow- Secure Sockets Layer (SSL). This
ing no intervening points at which plaintext data can be read allows secure communication to occur with any recipient,
by anyone but the intended parties. The drawback is that regardless of its architecture or level of sophistication.
this mode also creates the greatest amount of complexity
from an implementation, administration, and management “In this scenario, a standard message is sent to the recipi-
perspective. This complexity mainly results from the fact ent, advising that a secure message is waiting at the gate-
that encryption software must be installed and maintained way,” says Tran. “The recipient retrieves this message via a

Whether it is customer data, employee data,

“ intellectual property, or confidential financial information,


losing anything can be seriously detrimental. ”
2 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

secure connection, which may also require authentication then upgrade to PGP Universal Series, a robust and scal-
with credentials delivered by an out-of-band mechanism.” able e-mail encryption platform.”

PGP Encryption A perpetual license for PGP Desktop Email costs $164.
PGP offers several solutions to ensure


secure and simple e-mail encryp- Choose Wisely
tion. PGP Universal Server enables Tran offers some advice for business-
organizations to control deployment, es with regard to e-mail encryption.
automate user and key manage- The challenge for
ment, enforce policy, and centralize
reporting for one or more encryption
e-mail encryption is to “The challenge for e-mail encryption
is to select a solution that will sup-
applications. The company can start select a solution that port the growth and changes within
with a single encryption applica- the business’s e-mail architecture
tion, growing a deployment across will support the growth and will also be leveraged by non-e-
the enterprise and out to customers
and partners. The application scales
and changes within mail applications requiring encryption
services,” he says. “It is absolutely
well as new systems are added the business’s e-mail vital for a company to encrypt not
and integrates easily with the exist- just e-mails but also files that contain
ing infrastructure. PGP Universal architecture and will sensitive information with the highest
Server automates the creation of
user accounts, management of user
also be leveraged by level of protection. It can be a costly
and devastating set back to a busi-
keys, delivery of policy updates to non-e-mail applications ness, if sensitive data is exposed to
applications, installation of software unintended personnel.”
updates, and also does logging and requiring encryption
monitoring. services Reason? According to Gartner, 84
percent of high-cost security inci-


It is supplemented at the desktop dents occur when insiders send con-
level by PGP Desktop Email, which is fidential data outside the company
managed by PGP Universal, to secure without properly securing the data.
e-mail, data stored on disk, and AIM traffic. It also provides
digital signature capability. “Different companies have different needs and should as-
sess its own risk before deciding to implement a security
“PGP Whole Disk Encryption technology is used for full solution,” says Tran. “Furthermore, it is critical that a busi-
disk encryption, securing all date including often overlooked ness conducts frequent audit of its security procedures,
temporary, swap, and hibernation files that include copies of processes and technologies in order to comply with ever
sensitive data, files and e-mails,” says Tran. “As a business changing regulations.”. n
grows and requires more bandwidth/security it is best to

3 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

Public Key Crypto


for Enterprise Users
By Paul Rubens

P
ublic key cryptography is one of the fundamental doesn’t rely on the cipher itself being secret. The only thing
technologies used for exchanging information on that needs to be kept secret is the key. (In fact you could
the Internet securely. It’s used by Web browsers argue that the more widely known and understood a cipher
to create secure connections to Web sites, and by is, the more you can trust it to be effective—proprietary algo-
e-mail security gateways and applications to encrypt mes- rithms that aren’t open to public inspection by independent
sages. Its strength lies in the fact that it can be used to ex- experts could have secret “backdoors” built in that allow
change encrypted information between two parties that have anyone in the know to decrypt messages without the key.)
never communicated together before and have therefore
never agreed on a secure way of exchanging messages. One problem with symmetric systems is that to send some-
one a message securely you
To understand how public key have to be able to give them the
cryptography works, let’s con- secret key first without anyone
sider secure communications in else seeing it. Why is that a
general. One way to send a confi- problem? Imagine a situation in
dential message to someone is to which you were traveling abroad
agree on an obfuscation system and had to e-mail some valuable
in advance—like substituting each corporate information back to a
letter in the message with the colleague without the authorities
next one in the alphabet. in the country you are in getting
their hands on it. If you hadn’t
A more sophisticated method already agreed on a key before
would be to use encryption soft- you went traveling then you’d
ware, which uses an encryption be stuck: you couldn’t send an
algorithm known as a cipher. The encrypted message without
message (known as plaintext) first supplying a key, and you’d
is entered and passed to the have no way of e-mailing a key
algorithm along with a key—a string of characters that you securely. Of course you could make a phone call to tell your
supply—comes out in encrypted form (known as ciphertext). colleague the key you intend to use, but what if the conversa-
This unintelligible jumble of characters can only be con- tion is overheard or the phone line is tapped?
verted back to the original plaintext by passing the message
through the same cipher and supplying the same key. This is How Public Key Cryptography Works
known as a symmetric encryption system. The solution is to use an ingenious cryptographic system
called public key cryptography (PKC). The fundamental part
An interesting thing about this system is that its security of PKC is that the encryption key is split into two separate

One problem with symmetric systems is that to send

“ someone a message securely you have to be able to give


them the secret key first without anyone else seeing it. ”
4 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

keys—let’s call them key A and key B. If you encrypt some key, so it must have been written by John.
plaintext with key A, you can’t decrypt the resulting cipher-
text with key A to get back to your original plaintext. To de- Using double encryption, it’s possible to send an encrypted,
crypt ciphertext produced using key A, you need to use key digitally signed message to anyone who has made their pub-
B. In fact—and this turns out to be very useful—the reverse is lic key available. Here’s how:
also true: if you encrypt some plaintext with key B, you can’t
decrypt it again with that key. You can only decrypt it with Imagine you want to send a message to your colleague Bob
key A. If you encrypt a message with one key in the key pair, at head office. First you write your message (the plaintext)
you can only decrypt it with the other one. and encrypt it with your private key to produce the cipher-
text—a message that is effectively digitally signed as coming
If you want to be able to receive encrypted messages from from you and no one else. You then encrypt this ciphertext
anyone who wants to contact you, you first need to generate a second time using Bob’s public key. Finally, you e-mail the
a key pair (using suitable PKC software.) One of these you resulting gobbledegook to Bob.


designate your private key, which you
keep secret. But here’s the clever bit: When Bob receives this message
the other key you designate as your he decrypts it using his private key
public key, and this doesn’t have to be
kept secret. In fact the reverse is true:
If you want to be to get the ciphertext message that
you encrypted with your private
it should be distributed as widely as able to receive key. Bob then decrypts this using
possible so that anyone who wants it
can easily get it.
encrypted messages your public key. If he gets a mes-
sage (rather than gobbledegook) he

To send that message to a colleague


from anyone who knows that the message definitely
came from you (because otherwise
now, all you need is their public key. wants to contact you, he couldn’t have decrypted it with
There are a number of ways that you
might get might get hold it, which we
you first need to your public key) and he knows that
no one else could have read the
will look at later. The important thing
is that this public key doesn’t have to
generate a key pair message, because no one else has
his private key.
be kept secret, so even if you called (using suitable PKC
your colleague and the phone line
was being tapped it wouldn’t matter.
software.) PKE Has Its Limits
Are there any limitations to the PKE


Anyone overhearing the conversa- approach? The answer to this ques-
tion and writing down the public key tion is yes.
couldn’t use it to decrypt the message
that you encrypt with it. First, any encrypted message is only as strong as the cipher
that is used to encrypt it. If a weakness is discovered in the
Now remember how we mentioned earlier that your pri- cipher such that you no longer need a key to decrypt the
vate key can also be used to encrypt a message that can message or it becomes possible to work out the key (directly
only be decrypted using your public key. You may well ask or indirectly) from the contents of the ciphertext then clearly
what would be the point of encrypting a message if the key the system is not secure.
needed to decrypt it is publicly available.
Another caveat is that any key-based encryption system is
The answer is quite surprising. Let’s imagine you receive susceptible to a brute force attack—methodically trying every
a message from your colleague, and you believe that it is possible key until the correct one is found. Modern encryp-
encrypted with his private key. If you use their public key to tion techniques rely on the fact that if there is a sufficiently
decrypt the message successfully then that means that the large keyspace (meaning there are a sufficiently large num-
message must indeed have been encrypted using your col- ber of possible keys) it is likely to take hundreds of millions
league’s private key (which only your colleague has access of years to find a key by brute force using the computers that
to). No other key could have been used to encrypt the mes- are currently available. But as computers become more pow-
sage. So encrypting a message with a private key acts as a erful, the length of the keys typically used may need to be
digital signature: If you can decrypt a message with John’s increased to ensure that the chances of successfully brute
public key, it must have been encrypted using John’s private forcing a key remain tiny.

5 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

It’s important to remember that any encrypted message is able to read it. More worryingly, if Carol manages to get
never completely safe from a brute force attack: someone her hands on the message she will be able to read it, even
might guess the correct key with their very first guess. It’s though you intended it for Bob’s eyes only.
just that with a strong cipher and a long key the probability of
that happening—or that they hit upon the correct key within a Despite these potential problems, it’s fair to say that PKE
thousand years—is vanishingly small. has revolutionized the way that secure communications are
carried out. In the next piece, we’ll be looking at key manage-
The final problem that’s worth mentioning is the problem of ment and how PKE is used in the real world to provide com-
key management: how do you get hold of someone’s public mercial and open-source secure e-mail systems. n
keys, and how can you be sure that it is the public key be-
longing to the person you think it belongs to? If you send a
message to Bob using the public key that you think belongs
to Bob but actually belongs to Carol, then Bob won’t be

6 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

Understanding Public
Key Infrastructure
By Paul Rubens

I
n the last piece we took a look at how public key encryp- Of course you would realize something was up when you
tion systems work, and how anyone can send you an en- discovered that using your private key you couldn’t decrypt
crypted message—which only you can read—if they have and read the messages you received (because they have
access to your public key. It turns out that the process been encrypted with Mallory’s public key, not your public
of getting your public key to people who need to use it is a key). But if Mallory were smart he would re-encrypt the mes-
complex task that involves a combination of trust, third par- sages intended for you after he had read them with your real
ties, and various other factors which together are known as public key and send them on. In that case you wouldn’t know
public key infrastructure. that anything was amiss. Mallory would have carried out a
“man in the middle” attack.
On the face of it, giving people
access to your public key So how can this problem
shouldn’t be much of a prob- be overcome? How can you
lem. You could make it available distribute your public key to
for download on your Web someone in such a way that
site, you could distribute it on anyone who receives it can be
a memory stick, or you could sure that it really is your key,
simply e-mail it to people. and not, for example, Mal-
lory’s? And how can you be
But in practice there is a big sure that any public keys you
problem with that: if someone get hold of really do belong to
wants to send a message that the people that you think that
only you can read, they need to they do? The answer is to get
use your public key to encrypt any public key vouched for by
their message. But if they use a trusted third party, and that’s
a key that they think belongs to where PKI comes in.
you but actually belongs to someone else (call them Mallory)
then you won’t be able to read the message, and Mallory will. Imagine that there’s someone in the community—call him
So if Mallory wants to read confidential messages intended Solomon—that everyone trusts as an upstanding and trust-
for you, all he has to do is replace your public key with his on worthy citizen. You take your public key in person to Solo-
your Web site, or on a memory stick you’ve distributed, or in mon, who checks who you say you are (perhaps by checking
e-mails that he sends out purporting to come from you, and if your drivers’ license or passport). He then signs a certificate
he can then intercept any messages bound for your encrypt- that he attaches to the key that says that he, Solomon, can
ed with this bogus key he will be able to read them. personally vouch for the fact that the attached key belongs
to you.

It turns out that the process of getting your public key to people who need

“ to use it is a complex task that involves a combination of trust, third parties, and
various other factors which together are known as public key infrastructure. ”
7 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

In the digital world Solomon would effectively encrypt your trust beyond the fact that they sound vaguely official—which
public key along with a certificate saying “I certify that this is a tenuous reason to trust any organization). Ultimately it’s
public key belongs to X” using his private key. Anyone receiv- up to you which software makers and CAs you chose to trust
ing this could only decrypt it using Solomon’s public key, and and which you don’t.
what they would find is your key, plus the message saying
that it is indeed your key. Since only Solomon could have There’s another way that you can get reassurance that a
created the message, and since the message and the key public key you get hold of is genuine without having to place
could not have been altered in any way (because they were your trust in certificate authorities and root certificates, and


both encrypted and thus tamper- that’s known as a web of trust. In this
proof) then the they could be sure model, you meet face to face with
that the key was indeed your key people you know, and get them to
– as long as they trusted Solomon
to tell the truth, and as long as they
If the root certificate sign your public key with their private
key confirming that your public key
could be sure that the key that they was included with a is really yours. The more people you
believe to be Solomon’s public
key is in fact his. (In practice the software package, can get to sign your key the better,
so this is often done at a “signing
procedure is slightly different in that
it uses something called a hashing
then you have to party” where a number of people
meet face to face.
function, but the principal is exactly decide whether you
the same.)
trust the maker of the The principle then is this: imagine
that you get a public key that you
But surely this just pushes the prob-
lem back one stage? The person
software to have think belongs to Carol, but you can’t
be sure because you didn’t get it di-
receiving your key can be sure that included a genuine rectly from her. When you get it, you
it is genuinely yours only if they can
be sure that the copy of Solomon’s root certificate or not. might see that it has been signed as
genuine by Bill. If you know Bill and


public key that they have is genuine. have a copy of his public key that you
But how can they know that it is? got from him when you met him face
to face, you can easily decide that the
One answer in the real world is to have a limited number of key does belong to Carol, because Bill says so and you trust
trusted third parties (or Solomons), known as certification him. Of course the filament of trust could be longer: Carol’s
authorities or “CAs,” who issue certificates, and for the pub- key could have been signed by Ben, who you don’t know,
lic keys for these CAs, known as root certificates, to be pre- but Ben’s key could have been confirmed by Bill, who you do
installed in software packages (such as Microsoft’s Internet know. The more people you trust who confirm that the key
Explorer.) This means that as long as a public key that you is genuine, either directly or indirectly, the better. Webs of
receive is signed by a CA that you have a root certificate for, trust are good for small networks of people who mostly know
then you can be sure that the public key belongs to the per- each other, but aren’t suitable for very large groups with a
son it says that it does—if you are sure that the pre-installed high proportion of people you don’t know.
root certificate you have is genuine and you deem the CA to
be trustworthy. The important point to remember in the end is that although
public key ciphers are extremely secure —as far as we know—
If the root certificate was included with a software package, public key infrastructure relies on an element of trust: You
then you have to decide whether you trust the maker of the can only use a public key belonging to someone you don’t
software to have included a genuine root certificate or not. know if you can trust that it belongs to the person that you
Likewise, you can look at the details of any CA and decide think it does. This means thinking carefully about the CAs or
whether you trust them. Microsoft includes root certificates web of trust members that you deal with, and seeking n
for CAs as diverse as commercial U.S. entities such as
Visa and RSA (which you may well know and trust), as well
as more obscure overseas ones such as the Uruguayan
Administracion National de Correos and the Government of
Slovenia’s General Certification Authority (which you may
well know nothing about and therefore have no reason to

8 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

PGP’s Universal Server Provides


Unobtrusive Encryption
By Paul Rubens

A
t this point, we’ve looked at the theory behind pub- server called PGP Universal Server that oversees them all.
lic key encryption and public key infrastructure. But
how is all of this pulled together into a product that PGP’s Universal Gateway E-Mail
enables you to send or receive encrypted e-mail PGP’s Universal Gateway Email is the company’s gateway
messages? encryption (and decryption) application. To build a transpar-
ent secure e-mail system an organiza-
If you need encryption in an enterprise tion runs a virtual appliance made up
environment then the ideal solution is as of PGP Universal Server and Universal
transparent to those using it as possible. Gateway Email. This can run on a hard-
That’s because any specific steps that ened version of Linux on one of several
users have to take to encrypt their mes- specific server hardware configurations
sages are likely to be forgotten, ignored, from vendors including Dell, HP, and
or carried our incorrectly. IBM, or it can take the form of a virtual
machine running on VMware ESX.
For that reason, many organizations
choose to install an encryption gate- The appliance is connected between
way appliance that encrypts messages the corporate mail server and the
after they have been sent by users from corporate firewall, and when it receives
standard e-mail clients like Microsoft outgoing e-mail messages from the
Outlook, and which decrypts incoming mail server it kicks into action. The first
messages before passing them on to things the encryption application has to
their destinations. do is decide which messages to encrypt
and find the public keys belonging to the
One of the earliest public key encryp- recipients of those messages that need
tion applications was called Pretty Good to be encrypted. This information is
Privacy (PGP), written in 1991 by Phil provided by the PGP Universal Server.
Zimmermann. PGP, Inc. was bought by Its role is to manage and apply rules and
Network Associates in 1997, but fol- policies for encryption, based on factors
lowing a management buyout in 2002 PGP morphed into including the destination, the sender, or even the contents
PGP Corp., which today is one of the best known vendors of of the message. Account creation, group management, and
corporate encryption solutions. The company’s offerings are policy enforcement can be automated by integrating Active
based around a set of encryption applications—for e-mail and Directory, Lotus Notes/Domino directories, or other LDAP
other targets such as mobile devices or storage disks –– directories with the Universal Server.
that use a common encryption platform, plus a management

If you need encryption in an enterprise

“ environment then the ideal solution is as transparent


to those using it as possible. ”
9 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

Let’s imagine that you want to send an e-mail to someone at


another organization, and the Universal Server determines, When Does Gateway Encryption Fail?
by looking at the rules and policies that it has to apply, that A gateway encryption product may make e-mail encryp-
your message should be encrypted—perhaps because you tion totally transparent to users, but there are a number of
are working in a confidential new product group. To encrypt reasons why it may not be suitable in all cases. For example,
the message the encryption software first needs the intend- an e-mail must be digitally signed (using a private key) at
ed recipient’s public key. So how does it get that? the point it was created to provide non-repudiation for some
legal purposes—otherwise the sender could disown the
Universal Server Key Management message on the grounds that it could have been tampered
Key management is a key role (if you’ll pardon the pun) that with after it left their computer but before it was encrypted
the Universal Server carries out for the encryption software. at a gateway, or even that they did not originate it in the first
One place it can look for a key is PGP’s Global Directory. place. A gateway encryption product may also not be practi-
(Whenever PGP products generate keys anywhere in the cal when mobile users need to send e-mail from outside the
word, the public keys are sent automatically to this Global corporate network.


Directory. Key owners are e-mailed
every six months to confirm that the To cater to these and other circum-
keys should remain in the directory,
which may not be the case if, for A gateway stances PGP also offers its Desktop
e-mail application. This runs as a local
example, the matching private key has
been lost or compromised.) It can
encryption product desktop mail proxy service that works
with all e-mail clients (not as a plug-
also search for a key by looking for may make e-mail in for specific e-mail applications.)
a corporate keyserver at the mes-
sage’s destination domain, or it could encryption totally Key and policy management can be
carried out by the application, or by
have already received it “out of band”
– perhaps manually delivered on a
transparent to users, the corporate Universal Server. The
machine’s private key can be stored
memory stick. but there are a on the machine itself – protected by

What happens if policy dictates that a number of reasons a passphrase and, optionally, some
second factor authentication system
message you want to send should be
encrypted, but no public key for the
why it may not be such as a GemPlus, Alladin, or Axalto
(Schlumberger) smart card. It can
recipient can be found, perhaps be- suitable in all cases. also be stored within the Trusted
cause the intended recipient or their Platform Module (TPM) of suitably


organization doesn’t use encryption equipped laptops – or on a Universal
software and therefore has no key? Server, or synchronized between the
two. When the software is managed by a Universal Server
In this situation you can’t use public key encryption, but you separate policies can be enforced on the computer when
can use a compromise. Universal Gateway Email provides the Universal Server is unreachable.
two alternatives: PGP Universal Web Messenger and PDF
Messenger. The first of these sends an unencrypted e-mail For smaller organizations or individuals, a full blown encryp-
to your intended recipient informing them that they have tion platform such as this may seem like overkill, and in many
been sent a message, and that they can view it by visiting ways it probably is. In the next piece I’ll be taking a look at
a secure Web site and entering a password that could be low-cost or free open source encryption solutions that use
delivered separately—perhaps by SMS. The second encrypts the same public key encryption technology. n
the message as a PDF, which is sent to the recipient, who
can then decrypt and view it using standard Adobe Acrobat
Reader software once they have the password.

10 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

Encrypt Your E-Mail with


GPG and Thunderbird
By Paul Rubens

P
ublic key encryption isn’t just the preserve of large features, but GPG offers solid public key encryption and key
organizations. That’s because there are open management features as an alternative to a system such as
source PKE solutions that enable smaller compa- that offered by PGP Corp., on a number of platforms includ-
nies and individuals to use the technology at no ing Windows, Linux, UNIX, and OS X.
cost—most commonly to encrypt and digitally sign e-mail
messages. To illustrate GPG’s use I’ll concentrate on the Windows plat-
form for the simple reason that 90 percent of all desktops
Earlier we looked at PGP and laptops run Windows — if
Corp.’s public key encryption you use another platform then
platform, and what’s interesting the general information will still
about this commercial plat- apply even of the details are
form is that it adheres to the slightly different.
OpenPGP standard – an e-mail
encryption standard defined by GPG is actually a command
the OpenPGP Working Group line tool, but thanks to some
of the Internet Engineering handy plug-ins to popular e-
Task Force (IETF) Proposed mail clients you shouldn’t ever
Standard RFC 4880. Open- have to learn any of the com-
PGP was actually derived from mands. (But like most com-
PGP, the pioneering public key mand line tools, if you do take
encryption program created by the time to master the com-
Phil Zimmerman back in 1991, mands you’ll find GPG much
which is the basis for PGP easier to control directly than
Corp.’s platform. through a front end.)

The good news is that there’s The first step to running GPG
a completely free, open- is to run the Windows installer,
source implementation of the which you can download from
OpenPGP standard called GNU Privacy Guard (or, more GPG’s Web site (www.gnupg.org).
commonly, “GPG”). Since any OpenPGP compliant soft-
ware (should) work with any other, this means that GPG is GPG for Thunderbird
compatible with PGP. Like any open-source alternative to The next step is to find a GPG plug-in for the e-mail client
a commercial product there are differences between PGP you intend to use. In this article we’ll use the open-source
Corp.’s platform and GPG in terms of support and additional Thunderbird 2 e-mail client, although plug-ins of varying

GPG is actually a command line tool, but thanks to some

“ handy plug-ins to popular e-mail clients you shouldn’t ever


have to learn any of the commands. ”
11 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com
Protecting Your Sensitive Information with Encryption

quality are available for many more clients including Eudora try and find it. Assuming you find the key you need, select
and Outlook Express on Windows, Thunderbird, KMail and it and download it to your key store, and send the message
Evolution on Linux, and Thunderbird and Mail.app on OS X. again.

The GPG plug-in for Thunderbird is called Enigmail, which As you’ll recall, you can sign an e-mail with your private key
you can download from and then install into the e-mail client. to prove that the e-mail really came from you. To do this, sim-
(Don’t skip the download stage and try to install it directly ply choose the “Sign Message” option instead of “Encrypt
if you are running Firefox or your browser will try to install Message.”
Enigmail into itself instead of Thunderbird.)
If you want to make it easy for others to find your public key
Once Thunderbird has been restarted you’ll see an “Open- (especially if you don’t want to submit your key to a keyserv-


PGP” menu item, and clicking this er—perhaps to avoid the risk of spam)
will bring you to the OpenPGP Key you can also send them an e-mail
Management window. It’s from here
that—by clicking the “Generate” One handy thing after selecting the “Attach My Public
Key” option in this menu. (Of course
option—you can create your own
public and private keys. These can
about installing they should be aware that although
the e-mail might appear to come from
be associated with a particular e-mail GPG is that it is you, it might have come from some-
address, or you can choose to use
this key pair with two or more e-mail available to any one else.)

addresses you might use. You’ll also


be asked for an optional passphrase
application that One handy thing about installing
GPG is that it is available to any
to protect your key. ( It’s a good idea needs encryption application that needs encryption ca-
to use this feature—otherwise anyone
with access to your computer will be capabilities if a pabilities if a suitable plug-in for that
application has been written. That
able to sign messages in your name
and decrypt confidential incoming
suitable plug-in for means that as well as using GPG
through your e-mail client, you can
messages.) There’s also a comment that application has also use it through a Web browser.
box, where you can add a description
of yourself (such as “Managing Direc- been written. After installing the FireGPG Add-on
into Firefox you can use Gmail to


tor of Rubens Inc.”), which makes it send and receive encrypted or signed
much easier for anyone searching a e-mails using the extra buttons that
key server for your public key to identify appear on the Gmail Web interface.
you correctly. (You can also encrypt, decrypt, sign, or verify the signature
of text in any Web page by right clicking in Firefox or select-
Once you click “Generate Key” a key pair is created, after ing FireGPG from the Tools menu.) The FirePGP Add-on is
which you’ll be asked if you want to create and save a revo- far from perfect—looking up keys from a key server doesn’t
cation certificate that you can use to invalidate your key pair seem to work properly, for example—but it’s certainly useful
at some future time if it becomes compromised. The final and will likely improve in future versions.
step—if you want your public key to be widely available—is
to upload it to a key server by choosing the “Upload Public Compared to commercially available solutions GPG does
Keys option.” have drawbacks. Unlike gateway solutions offered by the
likes of PGP Corp. GPG’s functionality isn’t transparent to
Sending Encrypted Messages users, and can’t be relied to encrypt all messages as encryp-
So how do you go about sending an encrypted message? tion can easily be switched off by the user. Key management
Simply write an e-mail message using the e-mail client in is also much more rudimentary, and if a user forgets their
the normal way, and then click on “Encrypt Message” in the private key passphrase then the key pair becomes unusable
message’s OpenPGP menu. When you send the message, as there is no way to retrieve it. But overall GPG is a useful
the OpenPGP Key Selection window will pop up, allowing (and—let’s not forget—free) implementation of OpenPGP, and
you to select the recipient’s public key from your store of it can be a very effective solution for individuals and small
keys. If you don’t have the recipient’s key you can click on businesses. n
“Download missing keys” to carry out a keyserver search to

12 Protecting Your Sensitive Information with Encryption, an Internet.com Security eBook. © 2009, Internet.com

Das könnte Ihnen auch gefallen