Encryption for Everyone

1,765 views
1,587 views

Published on

Encryption protects your privacy and is essential for communication. However encryption is sometimes complicated and hard to use. I want to discuss what encryption is, how it is used, and make it easy for everyone to use. I will show what tools are available under linux for protecting communications, hard drives, and web browsing.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,765
On SlideShare
0
From Embeds
0
Number of Embeds
586
Actions
Shares
0
Downloads
33
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Encryption for Everyone

  1. 1. Encryption for Everyone: What We Do Is Secret Dru Streicher
  2. 2. Dru Streicher •Systems Administrator () •Hardware Hacker •Open Source Punk Rocker •Collector of Arcane Technology & Vinyl Records About Me
  3. 3. Encryption Basics
  4. 4. Encryption: What Is It for?
  5. 5. Why Is Encryption Important?
  6. 6. What Does It Look Like?
  7. 7. Encryption is Hard!
  8. 8. One Way Functions
  9. 9. • Phonebook encryption • Plaintext: S-E-C-R-E-T • S = Jenny Smith 867-5309 • Cypher text then becomes 6 phone numbers • To decrypt you would have to find each phone number in the phone book • Easy to make & Hard to solve One Way Functions
  10. 10. HTTP vs HTTPS
  11. 11. HTTP vs. HTTPS
  12. 12. HTTP vs. HTTPS
  13. 13. HTTPS
  14. 14. Meet Alice & Bob
  15. 15. Alice wants to share a secret message with Bob
  16. 16. They don't want Eve to be able to get their secret message
  17. 17. They Use Symmetrical Encryption:
  18. 18. Alice encrypts the message with a password and sends it to Bob
  19. 19. Even if Eve intercepts the message, without the password it can't be decrypted
  20. 20. Bob knows the password so he can decrypt the message
  21. 21. Real world use for symmetric encryption: Disk Encryption
  22. 22. Disk Encryption • There are ways to access your drive and get around all that logging in stuff • Encryption makes it private
  23. 23. Tools for disk encryption In linux
  24. 24. Asymmetrical Encryption
  25. 25. Alice and Bob have never met: They use Asymmetrical Encryption
  26. 26. Public vs. Private Keys
  27. 27. Alice and Bob trade public keys
  28. 28. Alice encrypts her secret message using Bob's public key
  29. 29. Bob can then use his private key to decrypt the message
  30. 30. Key Servers
  31. 31. Creating Keys Using the Command Line
  32. 32. If you lose your private key's password or your private key becomes compromised you can revoke the key. Revocation Certificate
  33. 33. Creating a Revocation Certificate
  34. 34. Thunderbird & Enigmail: Your one stop for PGP & Email
  35. 35. • Walk you through creating a gpg key in wizard mode. • Manage all your keys • Encrypt and Decrypt mail Automagically • Sign outgoing email with your public key
  36. 36. Web Based Email Gmail and Yahoo and other web based email providers don't support encryption and decryption natively.
  37. 37. • The Onion Router • “Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.” -Wikipedia
  38. 38. How Tor Works
  39. 39. How Tor Works
  40. 40. How Tor Works
  41. 41. Tor Software
  42. 42. • Exit nodes can be monitored • Can be hard to configure • Speed Problems With Tor
  43. 43. • Virtual Private Network • Creates an encrypted point-to-point network • Allows you to remotely access your local network resources such as printers, servers, computers VPN
  44. 44. VPN
  45. 45. Software VPN Options
  46. 46. Hardware VPN Options • Lifehacker.com: How To • Raspberry Pi • Your Home Router: • DD-WRT • Tomato Router
  47. 47. • IM – Off The Record (OTR) plugin for Pidgin • Android – K9 • SMS Encryption – TextSecure for Android Other Encryption Tools
  48. 48. Encryption is About Privacy
  49. 49. More Info Web Beginners Guide - Steven Levy The Codebreakers - Dav
  50. 50. Questions?
  51. 51. Thanks • Ohio Linux Fest • Ian Gillespie for the great slides
  52. 52. Contact Me /+vmbSPAXusa70ehbxvzBry/92HSL46yA+S7v7aCYT67mVVTvIgIBOwlgC1ektlCHmBJiCxi n9BsjE1cNRMp2USjb+sIH1Qt2Ix9EnCTR9hsKuvCe9u5teh/kleOYr2Cz0eogqVephMvC5bf EK/b1pEUhx6Z+T/pAd3E8dh1nF0Kvo2IgB+Lb5qLFlqZxVT/oLOnGT7kpChwhP/J9/71c7KY emXF0hjnsKeE8CNUNBsEvASmFcOdEHJ8Iyu0kHRsWp2HqjphmbN8ozg4ykvtjIvu6dGOskO+ qs30LxNqpRXb2xUf1j8IXQulh6Di6IGRmKo20dw1PSBKOSrsUgretUThFJ2x/iIDbc3Boemi 82IHCh0Jhjr5S6u4FmpeRHZMwMIpON0p8OcWTL5iabUih0EWQwARAQABtDZEcnUgU3RyZWlj aGVyIChIdXJyaWNhbmUgTGFicykgPGRydUBodXJyaWNhbmVsYWJzLmNvbT6JAjgEEwECACIF AlDCGlACGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEMtLKJM5q6CK29gQAKI3J3XE t7eauBegHnc7iTZBjQAWym4B+QzAv1qipVU49nEip4qPlPkCOg8gCE2xCaq3yfRYJm/MTuxp u2GTjfGtkUgqw3eAJs42pRK7eDJKNUZVZ799yy+nYtv8pBMqQqFS2YyTSczee7sx7vmFp6J+ zKp+e7ePF/a+V3ZVXrnAGwSyn0iuXUP/asOl89n979dp+fYmV26GzBlyz7qfCbWwNy5028Mj tHdahzUhZ3Utr3RuQ8MIcdbZsJSoEGE6aOrg2/YH8LzDTxpoUjvL+lE2dM183VAh03Hm41Ab ma6z1Bt96xcQ4bmINAL/Z/NqrjXwpOk+JAY6GlgKP+KT0vE9DZbfXYGZZNehwV4gVKSHOuZY FB/MvmExc6JgXl8oUir92IyX1Ol+FIjZGJnq9YVDAFyw88XNwdofuw52SbBkeD8bJWkAbiSh IpERgclY23y48bPI0b/RQnH9DFjY0QIDaNtVUOIgSd8GEAdMWs9a2xAV2PVfZfvtgNh2D7Lf L9tmF9HYSXMfypy4NyQfsKhMgXr/vxWDpPNWWmJZW5JpXBZDvEifXlBeeOG72LXpr/9i4R3i Gmqs34cJwYjmf1eaw8kcFmLyqJgIsk7e7zn1YctFSCQfbXYgtua9LBrObsejZ6XGrLHLUVs4 krPRG/XFsR0rbUrLVeTme3mTVRlKuQINBFDCGlABEADXta7G0ydqI5hBcaLJ6YxfB3EcE2Jv yFx9TLn1FFQIfJniKpSiiQLVZoaV7XOEhYfqx9b2mHSlpovStM99gXMFeSzYKcsc87XpiVSh SBdevTJcRqqZ56zZjyMDz6Mo3mQrGnGL/pptV9BxZ6hZJRgiD0s9Oy7rK+s2r2b6zlu6RQWf Rt9hNqIWU3qDdSaEi2lbzd6HcWa7VS8JKebC3lnMGJM3Mfubpl/WR9UcuRTnXygL9yhzOyMH F7+3SulaLf8ATgEOLyXKf/NFe7IBHJEmUGr18CkyTw2NTfP802LXk7SuUk3hn2lnwL0HFNkK EwKMH3fsmYsoSnjCtIA1sFfdsdGiAXfyazTYdoUGOdn0blE+rDuwFF2Y0FAjXAljWt6WkT5u +6jFR5fDSVCm6ug/ZHeHUobWR55/2vHyAmCaf0v9XIJBo+PCEDyuPYbSRu3z3SOSN6+y2PK1

×