Subject: MJRB-XTRA: MC_O7  >>Security and Encryption - Part 1<<

This lesson and the next are authored by Noel Bell 
 and are his contribution to the course. I 
wish to thank Noel for his excellent articles.

-- Prof --

MJRB-XTRA: MC_O7  >>Security and Encryption - Part 1<<

-----BEGIN PGP SIGNED MESSAGE-----

*****************************************************************
OVERVIEW
*****************************************************************
Part 1.
        Introduction.
        Public Key Encryption.
        PGP.
        Which version to use?.
        Where to get it from?.
Part 2.
        How to set up PGP.
        Prove that your copy is genuine.
        Install PGPn123.
        Sign a message.
        Encrypt and Decrypt a message.
        Publishing your key - the key servers.
        Further information.
        The Legal Bit.

*****************************************************************
INTRODUCTION
*****************************************************************

As we use e-mail and electronic communication more and more to
talk to other people and to pass business and financial
information, the need to protect our privacy becomes more
important. We would not consider sending our credit card details
on the back of a postcard when making an order, so why should we
send an e-mail with the same details, which is accessible to any
relatively unsophisticated hacker. How many of you have clicked
the wrong button on your mail client and sent a message to the
wrong person ? (or worse still, to a complete mailing list!) In
the same way that we would enclose a snail-mail order with our 
financial details in a sealed envelope, we should also enclose 
our e-mail order in some form of sealed envelope which cannot be 
opened or read by others apart from the intended recipient. It is
easy to scan electronic mail for keywords, and intercept those of
interest. International telegraphic messages are believed to be 
already scanned in such a manner by various government 
intelligence services. It has also been seen recently that 
hackers seem to have no problems plundering web-sites and 
electronic mailboxes, making it a simple matter to steal orders 
with credit card details. 

Over the years, many governments, including the USA, have made
great attempts to ban the use of strong crytography by private
citizens, as it restricts the ability of intelligence services 
to monitor mail (electronic or otherwise). 

There was a time when encryption was only available to
governments and the military because of the technology required.
Research over the last few years, including the development 
of Public Key Cryptography, have now made strong encryption 
available to anyone with a computer, be it a mainframe, PC, 
Macintosh, or any one of several other popular home computers 
with various operating systems.

There is also at times a need to be able to authenticate an
e-mail message with a signature, as we do at present in
snail-mail, by signing a letter. For example, This lesson is 
electronically signed by me, and can be proven to have come only
from me, and the body of the lesson between the line which says:
"-----BEGIN PGP SIGNED MESSAGE-----" and the line which says:
"-----BEGIN PGP SIGNATURE-----" can be shown to be unaltered. The
good news is that by the end of this lesson, you will be able to
check that yourself.

*****************************************************************
PUBLIC KEY ENCRYPTION
*****************************************************************

I don't wish to get involved in the mathematics of cryptography,
which is an extremely complex subject. I don't intend either,
apart from the most general of descriptions, to try and explain
the internal workings of any encryption programme. I consider
that best left to the experts, so I'll restrict this to what we
need to know to use crypto safely. My mathematical ability is
pathetic anyway. :-) A good description of the internal workings
of PGP is given in Appendix II of the PGP FAQs. (See below)

There are several forms of conventional (or symmetrical) 
encryption available at present, most of which require the use of
a password (or pass phrase) to encrypt and then to decrypt a 
message. These suffer from one fundamental weakness. As the same
password is required both to encrypt the message and to decrypt 
it, the sender needs a secure method of sending the password to 
the recipient, so the sender might as well just send the 
recipient a message by the same secure route. How, for example, 
would you send me an conventionally encrypted e-mail, as you 
have probably never met me?

Public Key Encryption (asymmetric encryption) requires two 
mathematically linked keys (linked by the two prime factors of a
VERY large number). Public Key Encryption is, therefore, the 
process of encrypting (or mixing) a message with one key (the 
PUBLIC key) which can only be decrypted by it's corresponding 
other key (the SECRET key). As the public key cannot decrypt 
anything, it can therefore be published anywhere, and can be made
publicly available. (More about this later). One of the things 
the user has to do at the early stages of installing a public key
encryption programme is to create his or her own "key pair".

*****************************************************************
PGP
*****************************************************************

PGP stands for "Pretty Good Privacy", an encryption program
written by Philip Zimmermann in the USA, with the intention of
providing Public Key Encryption for the Masses. PGP has over a
period of years challenged mathematicians and cryptographers
around the world, who have so far been unable to crack PGP when
used with a lengthy key (more about keys later), and has become
the generally accepted international encryption standard. PGP was
originally published as "freeware" source code. The author's 
philosophy was, that expert cryptographers and mathematicians 
could then challenge, and attempt to attack any apparent flaws in 
the encryption algorithms. One or two flaws were found in early 
versions. The other benefit was that others people then "ported" 
the software to many different operating systems. As a result, 
PGP is currently available for the following platforms:

DOS (with DOS and Windows shells).
Windows 32bit (Windows NT and Windows 95) Text Mode.
OS/2.
Apple Macintosh.
Amiga.
Atari.
Archimedes.
Source code for other platforms, or just for you to examine.

PGP is described by its author as follows:
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software,
is a high security cryptographic software application for MSDOS,
Unix, VAX/VMS, and other computers.  PGP allows people to
exchange files or messages with privacy, authentication, and
convenience. Privacy means that only those intended to receive a
message can read it. Authentication means that messages that
appear to be from a particular person can only have originated
from that person. Convenience means that privacy and
authentication are provided without the hassles of managing keys
associated with conventional cryptographic software.  No secure
channels are needed to exchange keys between users, which makes
PGP much easier to use.  This is because PGP is based on a
powerful new technology called "public key" cryptography.

*****************************************************************
WHICH VERSION TO USE ?
*****************************************************************

This lesson covers only the freeware versions of PGP, which are
licenced for non-commercial use. IMHO, learning to use PGP is
non-commercial, whereas using it to send business messages is
not. Again, as in the rest of the course, it is assumed that you
are running DOS (with or without Windows) on an IBM compatible
PC. Where applicable, I will try and point out (or direct you to
other references), where there are differences between DOS and
other platforms.

Firstly, the choice must be MS-DOS, Macintosh, etc. That is self-
evident. With PGP, there is another important choice. Because of
patents and US export restrictions, there are two basic types of
PGP, the US version (for use only in the USA) and the
International version (for use elsewhere in the World).

    Important Note to residents of the USA.
   ---------------------------------------
   The US Government has made it illegal in most cases to export
   good cryptographic technology, and that may include PGP. They
   regard this kind of software just like they regard munitions.
   PGP and RSAREF (contained in the US version of PGP) may be 
   subject to the export laws of the USA as implemented by the US
   Department of State Office of Defense Trade Controls, in 
   particular, ITAR (International Traffic in Arms Regulations).
   Read very carefully the two files, RSALICEN.TXT and 
   MITLICEN.TXT which come with your copy of PGP. You must NOT 
   export, or make available for export from the United States,
   ANY version of PGP.

To look at the realistic side of things, all non-commercial
versions of PGP are available worldwide. I didn't export them,
nor do I know anyone who has. The US government spent years
investigating PGP's author, and in the end, convinced themselves
that he didn't either. It simply cost Phil Zimmerman a small
fortune in legal fees. The cat is now out of the bag, and
available to all. In most of the world it is completely legal to
use PGP.

In a few countries, the use and/or possesion of PGP is either
illegal or frowned upon. I believe these to include Russia, the
People's Republic of China, Iraq, Iran, and France. Get the file:
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm 
In the same vein, do not send un-solicited encrypted e-mail to
your friend in a country which has banned PGP, or regards its
users with suspicion. You could lose a friend - to a firing
squad!

The current versions are listed below. There are minor "bugs"
in earlier versions. Some of the early versions are no longer
legal to use in the USA, because of disputes about patents. There
are incompatabilities between some early versions and recent 
versions.

I urge you to use the correct version. To do otherwise may be 
breaking the law.

         USA                    Elsewhere
         ---                    ---------

      PGP 2.6.2                PGP 2.6.3i

*****************************************************************
WHERE TO GET IT FROM?
*****************************************************************

U.S. Versions.

The official U.S. PGP distribution site is:
ftp://net-dist.mit.edu/pub/pgp
Get the file README and ** READ ** it. The instructions will then
tell you to telnet to net-dist.mit.edu and log in to the "getpgp"
account, where you will have to answer some questions to ensure
that you are a permanent US resident. Then you will be given an 
ftp path to retrieve your copy of the US version of PGP. The ftp
paths change half-hourly (on the hour and half-hour). Tip - Make 
sure you telnet to mit.edu at 1 or 31 mins past the hour!   PGP 
is now available on the web.  Just surf to: 
http://web.mit.edu/network/pgp.html 
where you can carry out the 
whole procedure without telnetting and all that nausea!

The procedure is obviously not foolproof, as you can get the U.S.
Versions and a lot more from ftp.pgp.net (see the next paragraph)
anyway. Lots of add-ons and extras are available from the 
ftp.pgp.net site.

International Versions.

The official International site in Norway is becoming very busy
due to the popularity of PGP, so a new site "ftp.pgp.net" has 
been set up. This is a conglomeration of several European sites 
where the information is mirrored identically. Just go to:
ftp://ftp.pgp.net/pub/pgp and get the file README.html which is 
an ascii file (Watch the capitalisation). This will give you all
the information you need to find the directory for your 
particular operating system. Alternatively surf to:
http://www.pgp.net/pgpnet/ 
which has links to the various 
different versions, and the various DOS or Windows and OS/2 
shells. There are also add-ons available at the same site for the
more popular e-mail clients. Most of them can be found from:
ftp://ftp.pgp.net/pub/pgp/utils/README.html

Comparisons between Versions.

Both the International and the U.S. versions are equally secure. 
The difference is purely based on U.S. patent legislation.

Non-English speakers.

Standard PGP comes with English (US), German, Spanish and French
language support. PGP can speak other languages as well! Get the
file:  ftp.pgp.net/pub/pgp/language/README.html . Documentation 
is also available in some other languages. Get the file:
ftp.pgp.net/pub/pgp/doc/README.html for full details.

All Users.

You will also need the PGP-FAQ file which does not come in the
distribution. This FAQ is regularly updated and posted monthly to
all comp.security.pgp newsgroups, The latest version is always 
available from the following locations:
   
   http://www.pgp.net/pgpnet/pgp-faq/
          Hypertext version, in tree form for easy browsing.
          
   http://www.pgp.net/pgpnet/pgp-faq/faq.html
          Hypertext version, one document for offline reading.
          
   http://www.pgp.net/pgpnet/pgp-faq/pgpfaq.txt
          Text version, one document.

*****************************************************************
NEXT LESSON
*****************************************************************

In the next lesson, we will discuss how to install PGP, which 
requires a little bit (not a lot) of DOS ability, and then how to
install a Windows "shell" or "front end". My favourite Windows
shell for PGP is "PGPn123" ($15 Shareware), which is published in
the file: pn123e17.zip . It would be worthwhile finding and 
obtaining this before you start the next lesson.

By the end of the next lesson, you will be up and running with 
PGP, easily sending and receiving encrypted and signed messages
to each other.

In the mean-time, read Sections 3.8 to 3.12 of the PGP-FAQ, and
try and make up a good "pass-phrase".


+--------------------------------------------------------------+
|  Noel Bell                         Email: EJNBell@pobox.com  |
|            Home Page: http://pobox.com/~ejnbell/             |
|  Finger EJNBell@pobox.com for PGP public key , or ftp from:  |
| ftp://users.aol.com/EJNBell/EJNBell.asc KeyID: 1024/20015B9D |
| Fingerprint: 9E A7 36 69 3A 66 49 CB 74 FA 6C 5F 28 37 9A 76 |
+--------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1

iQCVAgUBMqD22rZiCXUgAVudAQG0HgQAtrrsEKB6lhoNc6v/ZQ7NomuSfSyOsy1/
6HEYslcZ2Qol0v6veX/xW32NL2hN9KHjs64o9l65Lmh81uhhrf2YlBXWY7PFOmlO
5C1VVRRaWNZVJoO1iCk/q9/JLfiDcTFdMUFHPDPa5ixYPMrVS7uafSwUFcYSBWga
WTbAhdrsYzM=
=19fr
-----END PGP SIGNATURE-----






   
      Robert R. Behrens         
      MJ & RB Computing         
      5 Lakeshore Drive                               
      Bellingham, Ma. 02019                            
      (508) 883-2652                                  

      rbehrens@kersur.net    
      rbehrens@world.std.com
      http://www.kersur.net/~rbehrens
      

 =============================================================================
 Reference.COM has begun archiving MJRB-TRAINING as of: Jan. 30, 1997
 Searchable archives for the list is available at:
 http://www.reference.com/cgi-bin/pn/listarch?list=MJRB-TRAINING@world.std.com
 =============================================================================
 To unsubscribe from this list, send E-mail to majordomo@world.std.com
 with the message UNSUBSCRIBE MJRB-TRAINING

 Contact owner-mjrb-list@world.std.com or rbehrens@kersur.net
 if you have problems.
 =============================================================================
 WEB PAGE: http://www.kersur.net/~rbehrens
 =============================================================================