Cryptography Definition – Tech Terms

Cryptography is the science of protecting information by transforming it into a secure format. This process, called encryption, has been used for centuries to prevent handwritten messages from being read by unintended recipients. Today, cryptography is used to protect digital data. It is a division of computer science that focuses on transforming data into formats that cannot be recognized by unauthorized users.

An example of basic cryptography is a encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed. For example, the translation grid below could be used to decode "1234125678906" as "techterms.com".

The above table is also called a cipher. Ciphers can be simple translation codes, such as the example above, or complex algorithms. While simple codes sufficed for encoding handwritten notes, computers can easily break, or figure out, these types of codes. Because computers can process billions of calculations per second, they can even break complex algorithms in a matter of seconds. Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break.

Updated: July 15, 2015

This page contains a technical definition of Cryptography. It explains in computing terminology what Cryptography means and is one of many technical terms in the TechTerms dictionary.

All definitions on the TechTerms website are written to be technically accurate but also easy to understand. If you find this Cryptography definition to be helpful, you can reference it using the citation links above. If you think a term should be updated or added to the TechTerms dictionary, please email TechTerms!

Go here to see the original:
Cryptography Definition - Tech Terms

Cryptanalysis – Wikipedia

Cryptanalysis (from the Greek krypts, "hidden", and analein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.[1] Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.

Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present. Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization.

Given some encrypted data ("ciphertext"), the goal of the cryptanalyst is to gain as much information as possible about the original, unencrypted data ("plaintext"). It is useful to consider two aspects of achieving this. The first is breaking the system that is discovering how the encipherment process works. The second is solving the key that is unique for a particular encrypted message or group of messages.

Attacks can be classified based on what type of information the attacker has available. As a basic starting point it is normally assumed that, for the purposes of analysis, the general algorithm is known; this is Shannon's Maxim "the enemy knows the system"[2] in its turn, equivalent to Kerckhoffs' principle.[3] This is a reasonable assumption in practice throughout history, there are countless examples of secret algorithms falling into wider knowledge, variously through espionage, betrayal and reverse engineering. (And on occasion, ciphers have been broken through pure deduction; for example, the German Lorenz cipher and the Japanese Purple code, and a variety of classical schemes):[4]

Attacks can also be characterised by the resources they require. Those resources include:[5]

It's sometimes difficult to predict these quantities precisely, especially when the attack isn't practical to actually implement for testing. But academic cryptanalysts tend to provide at least the estimated order of magnitude of their attacks' difficulty, saying, for example, "SHA-1 collisions now 252."[6]

Bruce Schneier notes that even computationally impractical attacks can be considered breaks: "Breaking a cipher simply means finding a weakness in the cipher that can be exploited with a complexity less than brute force. Never mind that brute-force might require 2128 encryptions; an attack requiring 2110 encryptions would be considered a break...simply put, a break can just be a certificational weakness: evidence that the cipher does not perform as advertised."[7]

The results of cryptanalysis can also vary in usefulness. For example, cryptographer Lars Knudsen (1998) classified various types of attack on block ciphers according to the amount and quality of secret information that was discovered:

Academic attacks are often against weakened versions of a cryptosystem, such as a block cipher or hash function with some rounds removed. Many, but not all, attacks become exponentially more difficult to execute as rounds are added to a cryptosystem,[8] so it's possible for the full cryptosystem to be strong even though reduced-round variants are weak. Nonetheless, partial breaks that come close to breaking the original cryptosystem may mean that a full break will follow; the successful attacks on DES, MD5, and SHA-1 were all preceded by attacks on weakened versions.

In academic cryptography, a weakness or a break in a scheme is usually defined quite conservatively: it might require impractical amounts of time, memory, or known plaintexts. It also might require the attacker be able to do things many real-world attackers can't: for example, the attacker may need to choose particular plaintexts to be encrypted or even to ask for plaintexts to be encrypted using several keys related to the secret key. Furthermore, it might only reveal a small amount of information, enough to prove the cryptosystem imperfect but too little to be useful to real-world attackers. Finally, an attack might only apply to a weakened version of cryptographic tools, like a reduced-round block cipher, as a step towards breaking of the full system.[7]

Cryptanalysis has coevolved together with cryptography, and the contest can be traced through the history of cryptographynew ciphers being designed to replace old broken designs, and new cryptanalytic techniques invented to crack the improved schemes. In practice, they are viewed as two sides of the same coin: secure cryptography requires design against possible cryptanalysis.[citation needed]

Although the actual word "cryptanalysis" is relatively recent (it was coined by William Friedman in 1920), methods for breaking codes and ciphers are much older. David Kahn notes in The Codebreakers that Arab scholars were the first people to systematically document cryptanalytic methods.[9]

The first known recorded explanation of cryptanalysis was given by Al-Kindi (c. 801873, also known as "Alkindus" in Europe), a 9th-century Arab polymath,[10][11] in Risalah fi Istikhraj al-Mu'amma (A Manuscript on Deciphering Cryptographic Messages). This treatise contains the first description of the method of frequency analysis.[12] Al-Kindi is thus regarded as the first codebreaker in history.[13] His breakthrough work was influenced by Al-Khalil (717786), who wrote the Book of Cryptographic Messages, which contains the first use of permutations and combinations to list all possible Arabic words with and without vowels.[14]

Frequency analysis is the basic tool for breaking most classical ciphers. In natural languages, certain letters of the alphabet appear more often than others; in English, "E" is likely to be the most common letter in any sample of plaintext. Similarly, the digraph "TH" is the most likely pair of letters in English, and so on. Frequency analysis relies on a cipher failing to hide these statistics. For example, in a simple substitution cipher (where each letter is simply replaced with another), the most frequent letter in the ciphertext would be a likely candidate for "E". Frequency analysis of such a cipher is therefore relatively easy, provided that the ciphertext is long enough to give a reasonably representative count of the letters of the alphabet that it contains.[15]

Al-Kindi's invention of the frequency analysis technique for breaking monoalphabetic substitution ciphers[16][17] was the most significant cryptanalytic advance until World War II. Al-Kindi's Risalah fi Istikhraj al-Mu'amma described the first cryptanalytic techniques, including some for polyalphabetic ciphers, cipher classification, Arabic phonetics and syntax, and most importantly, gave the first descriptions on frequency analysis.[18] He also covered methods of encipherments, cryptanalysis of certain encipherments, and statistical analysis of letters and letter combinations in Arabic.[19][12] An important contribution of Ibn Adlan (11871268) was on sample size for use of frequency analysis.[14]

In Europe, Italian scholar Giambattista della Porta (1535-1615) was the author of a seminal work on cryptanalysis, De Furtivis Literarum Notis.[20]

Successful cryptanalysis has undoubtedly influenced history; the ability to read the presumed-secret thoughts and plans of others can be a decisive advantage. For example, in England in 1587, Mary, Queen of Scots was tried and executed for treason as a result of her involvement in three plots to assassinate Elizabeth I of England. The plans came to light after her coded correspondence with fellow conspirators was deciphered by Thomas Phelippes.

In Europe during the 15th and 16th centuries, the idea of a polyalphabetic substitution cipher was developed, among others by the French diplomat Blaise de Vigenre (152396).[21] For some three centuries, the Vigenre cipher, which uses a repeating key to select different encryption alphabets in rotation, was considered to be completely secure (le chiffre indchiffrable"the indecipherable cipher"). Nevertheless, Charles Babbage (17911871) and later, independently, Friedrich Kasiski (180581) succeeded in breaking this cipher.[22] During World War I, inventors in several countries developed rotor cipher machines such as Arthur Scherbius' Enigma, in an attempt to minimise the repetition that had been exploited to break the Vigenre system.[23]

In World War I, the breaking of the Zimmermann Telegram was instrumental in bringing the United States into the war. In World War II, the Allies benefitted enormously from their joint success cryptanalysis of the German ciphers including the Enigma machine and the Lorenz cipher and Japanese ciphers, particularly 'Purple' and JN-25. 'Ultra' intelligence has been credited with everything between shortening the end of the European war by up to two years, to determining the eventual result. The war in the Pacific was similarly helped by 'Magic' intelligence.[24]

Cryptanalysis of enemy messages played a significant part in the Allied victory in World War II. F. W. Winterbotham, quoted the western Supreme Allied Commander, Dwight D. Eisenhower, at the war's end as describing Ultra intelligence as having been "decisive" to Allied victory. Sir Harry Hinsley, official historian of British Intelligence in World War II, made a similar assessment about Ultra, saying that it shortened the war "by not less than two years and probably by four years"; moreover, he said that in the absence of Ultra, it is uncertain how the war would have ended.

In practice, frequency analysis relies as much on linguistic knowledge as it does on statistics, but as ciphers became more complex, mathematics became more important in cryptanalysis. This change was particularly evident before and during World War II, where efforts to crack Axis ciphers required new levels of mathematical sophistication. Moreover, automation was first applied to cryptanalysis in that era with the Polish Bomba device, the British Bombe, the use of punched card equipment, and in the Colossus computers the first electronic digital computers to be controlled by a program.[27][28]

With reciprocal machine ciphers such as the Lorenz cipher and the Enigma machine used by Nazi Germany during World War II, each message had its own key. Usually, the transmitting operator informed the receiving operator of this message key by transmitting some plaintext and/or ciphertext before the enciphered message. This is termed the indicator, as it indicates to the receiving operator how to set his machine to decipher the message.[29]

Poorly designed and implemented indicator systems allowed first Polish cryptographers[30] and then the British cryptographers at Bletchley Park[31] to break the Enigma cipher system. Similar poor indicator systems allowed the British to identify depths that led to the diagnosis of the Lorenz SZ40/42 cipher system, and the comprehensive breaking of its messages without the cryptanalysts seeing the cipher machine.[32]

Sending two or more messages with the same key is an insecure process. To a cryptanalyst the messages are then said to be "in depth."[33] This may be detected by the messages having the same indicator by which the sending operator informs the receiving operator about the key generator initial settings for the message.[34]

Generally, the cryptanalyst may benefit from lining up identical enciphering operations among a set of messages. For example, the Vernam cipher enciphers by bit-for-bit combining plaintext with a long key using the "exclusive or" operator, which is also known as "modulo-2 addition" (symbolized by ):

Deciphering combines the same key bits with the ciphertext to reconstruct the plaintext:

(In modulo-2 arithmetic, addition is the same as subtraction.) When two such ciphertexts are aligned in depth, combining them eliminates the common key, leaving just a combination of the two plaintexts:

The individual plaintexts can then be worked out linguistically by trying probable words (or phrases), also known as "cribs," at various locations; a correct guess, when combined with the merged plaintext stream, produces intelligible text from the other plaintext component:

The recovered fragment of the second plaintext can often be extended in one or both directions, and the extra characters can be combined with the merged plaintext stream to extend the first plaintext. Working back and forth between the two plaintexts, using the intelligibility criterion to check guesses, the analyst may recover much or all of the original plaintexts. (With only two plaintexts in depth, the analyst may not know which one corresponds to which ciphertext, but in practice this is not a large problem.) When a recovered plaintext is then combined with its ciphertext, the key is revealed:

Knowledge of a key of course allows the analyst to read other messages encrypted with the same key, and knowledge of a set of related keys may allow cryptanalysts to diagnose the system used for constructing them.[32]

Governments have long recognized the potential benefits of cryptanalysis for intelligence, both military and diplomatic, and established dedicated organizations devoted to breaking the codes and ciphers of other nations, for example, GCHQ and the NSA, organizations which are still very active today.

Even though computation was used to great effect in the cryptanalysis of the Lorenz cipher and other systems during World War II, it also made possible new methods of cryptography orders of magnitude more complex than ever before. Taken as a whole, modern cryptography has become much more impervious to cryptanalysis than the pen-and-paper systems of the past, and now seems to have the upper hand against pure cryptanalysis.[citation needed] The historian David Kahn notes:

Many are the cryptosystems offered by the hundreds of commercial vendors today that cannot be broken by any known methods of cryptanalysis. Indeed, in such systems even a chosen plaintext attack, in which a selected plaintext is matched against its ciphertext, cannot yield the key that unlock[s] other messages. In a sense, then, cryptanalysis is dead. But that is not the end of the story. Cryptanalysis may be dead, but there is - to mix my metaphors - more than one way to skin a cat.

Kahn goes on to mention increased opportunities for interception, bugging, side channel attacks, and quantum computers as replacements for the traditional means of cryptanalysis. In 2010, former NSA technical director Brian Snow said that both academic and government cryptographers are "moving very slowly forward in a mature field."[36]

However, any postmortems for cryptanalysis may be premature. While the effectiveness of cryptanalytic methods employed by intelligence agencies remains unknown, many serious attacks against both academic and practical cryptographic primitives have been published in the modern era of computer cryptography:[citation needed]

Thus, while the best modern ciphers may be far more resistant to cryptanalysis than the Enigma, cryptanalysis and the broader field of information security remain quite active.[37]

In 2004, it was reported that the United States had broken Iranian ciphers. It is unknown, however, whether this was pure cryptanalysis, or whether other factors were involved.[38]

Asymmetric cryptography (or public key cryptography) is cryptography that relies on using two (mathematically related) keys; one private, and one public. Such ciphers invariably rely on "hard" mathematical problems as the basis of their security, so an obvious point of attack is to develop methods for solving the problem. The security of two-key cryptography depends on mathematical questions in a way that single-key cryptography generally does not, and conversely links cryptanalysis to wider mathematical research in a new way.[citation needed]

Asymmetric schemes are designed around the (conjectured) difficulty of solving various mathematical problems. If an improved algorithm can be found to solve the problem, then the system is weakened. For example, the security of the DiffieHellman key exchange scheme depends on the difficulty of calculating the discrete logarithm. In 1983, Don Coppersmith found a faster way to find discrete logarithms (in certain groups), and thereby requiring cryptographers to use larger groups (or different types of groups). RSA's security depends (in part) upon the difficulty of integer factorization a breakthrough in factoring would impact the security of RSA.[citation needed]

In 1980, one could factor a difficult 50-digit number at an expense of 1012 elementary computer operations. By 1984 the state of the art in factoring algorithms had advanced to a point where a 75-digit number could be factored in 1012 operations. Advances in computing technology also meant that the operations could be performed much faster, too. Moore's law predicts that computer speeds will continue to increase. Factoring techniques may continue to do so as well, but will most likely depend on mathematical insight and creativity, neither of which has ever been successfully predictable. 150-digit numbers of the kind once used in RSA have been factored. The effort was greater than above, but was not unreasonable on fast modern computers. By the start of the 21st century, 150-digit numbers were no longer considered a large enough key size for RSA. Numbers with several hundred digits were still considered too hard to factor in 2005, though methods will probably continue to improve over time, requiring key size to keep pace or other methods such as elliptic curve cryptography to be used.[citation needed]

Another distinguishing feature of asymmetric schemes is that, unlike attacks on symmetric cryptosystems, any cryptanalysis has the opportunity to make use of knowledge gained from the public key.[39]

Quantum computers, which are still in the early phases of research, have potential use in cryptanalysis. For example, Shor's Algorithm could factor large numbers in polynomial time, in effect breaking some commonly used forms of public-key encryption.[40]

By using Grover's algorithm on a quantum computer, brute-force key search can be made quadratically faster. However, this could be countered by doubling the key length.[41]

Originally posted here:
Cryptanalysis - Wikipedia

Edward Snowden: Joe Biden told countries there’d be …

Russia has extended Edward Snowden's asylum to remain in Russia until 2020.He sought and received asylum in Russia in June 2013 after leaking volumes of information on American intelligence and surveillance operations to the media. USA TODAY

Edward Snowden, who in 2013 leaked information on how the NSA conducted surveillance on the public, said in an interview Mondaythat former-Vice President Joe Biden warned foreign countries that there would be "consequences" if they granted him asylum.

During a segment on "The 11th Hour with BrianWilliams" on MSNBC, Snowden said both Biden and then-Secretaryof State John Kerry blocked him from getting asylum.

Edward Snowden speaks from Russia to the Council of Europe in Strasbourg, France, in 2015.(Photo: Frederick Florin, AFP/Getty Images)

Biden's campaign team didn't immediately respond to a request for comment.

The former vice president did ask Ecuador to turn down an asylum request from Snowden in 2013, the Associated Press reported.Rafael Correa, the former president of Ecuador,said he had a "friendly and very cordial" conversation withBiden about the matter.

PUBLIC SURVEILLANCE:NSA improperly collected US phone call data after saying problem was fixed

White House officials said in 2013 that they had warned foreign governments that Snowden was facing felony charges and urged them not to aid his international flight.

Snowden, who is currently in Russia, said he has applied for asylum in 27 different countries, including France, Germany and Norway, but without luck.

"Every time one of these governments got close to opening their doors, the phone would ring in their foreign ministries," Snowden said in the interview with Williams. "And on the other end of the line would be a very senior American official. It was one of two people: then-Secretary of State John Kerry or then-Vice President Joe Biden."

MASSIVE BREACH:Ex-NSA contractor pleads guilty to hoarding national defense information

"They would say: 'Look, we don't care what the law is. We don't care if you can do this or not. We understand that protecting whistleblowers and granting asylum is a matter of human rights, and you could do this if you want to. But if you protect this man, if you let this guy out of Russia, there will be consequences.'"

When MSNBC's Williams asked if Snowden would vote for Biden in 2020, the former NSA contractor laughed but said he isn't taking a position on the upcoming presidential election.

In this Feb. 14, 2015, file photo, Edward Snowden appears on a live video feed broadcast from Moscow at an event sponsored by ACLU Hawaii in Honolulu.(Photo: Marco Garcia, AP File Photo)

"Look, it's a difficult position being in the executive branch," he said. "It's a difficult position being in power, and you have to make unpopular decisions. I would like to think, having seen now in 2019 that all the allegations against me did not come true, national security was not harmed as a result of these disclosures ... I'd like to think these people would reevaluate their position."

There are more details about Snowden's life and quest for asylum in his newautobiography "Permanent Record," which on Tuesday was releasedin more than 20 countries including the U.S. and Britain.

The book details his dash out of the country six years ago after Snowden hailed as a hero, trashed as traitor leaked information from the NSA. He thought his stop in Russia was a layover on a flight from Hong Kong to Latin America, but his passport was canceled and he has lived in Putin-approvedexile ever since.

PERMANENT RECORD:Edward Snowden releases book in Russia, wants a fair trial in U.S.

LAWSUIT FILED:Feds sue Edward Snowden over 'Permanent Record'

Edward Snowden(Photo: The Guardian, AFP/Getty Images)

He claims he rejected overtures from Russian agents to aid their cause. And he claims he was a whistleblower, while the Justice Department of President Barack Obama charged him with espionage. Snowden is conducting a de facto book tour this week, via satellite from Moscow. He says he does not regret his actions and that he wants to return to the U.S.

"I'm not asking for a parade. I'm not asking for a pardon," he toldCBS News. "I'm not asking for a pass. What I'm asking for is a fair trial. And this is the bottom line that any American should require."

USA Today's John Bacon contributed reporting. Jessica Bies finds the news of the moment and brings it to you with local context and perspective. What have you heard people talking about? Call (302) 324-2881 oremailjbies@delawareonline.com with story ideas.

Read or Share this story: https://www.delawareonline.com/story/news/2019/09/17/snowden-biden-blocked-former-nsa-contractor-getting-asylum/2350070001/

Go here to see the original:
Edward Snowden: Joe Biden told countries there'd be ...

NSA Spying on Americans Is Illegal | American Civil …

Click here for more on NSA Surveillance

What if it emerged that the President of the United States was flagrantly violating the Constitution and a law passed by the Congress to protect Americans against abuses by a super-secret spy agency? What if, instead of apologizing, he said, in essence, "I have the power to do that, because I say I can." That frightening scenario is exactly what we are now witnessing in the case of the warrantless NSA spying ordered by President Bush that was reported December 16, 2005 by the New York Times.

According to the Times, Bush signed a presidential order in 2002 allowing the National Security Agency to monitor without a warrant the international (and sometimes domestic) telephone calls and e-mail messages of hundreds or thousands of citizens and legal residents inside the United States. The program eventually came to include some purely internal controls - but no requirement that warrants be obtained from the Foreign Intelligence Surveillance Court as the 4th Amendment to the Constitution and the foreign intelligence surveillance laws require.

In other words, no independent review or judicial oversight.

That kind of surveillance is illegal. Period.

The day after this shocking abuse of power became public, President Bush admitted that he had authorized it, but argued that he had the authority to do so. But the law governing government eavesdropping on American citizens is well-established and crystal clear. President Bush's claim that he is not bound by that law is simply astounding. It is a Presidential power grab that poses a challenge in the deepest sense to the integrity of the American system of government - the separation of powers between the legislative and executive branches, the concept of checks and balances on executive power, the notion that the president is subject to the law like everyone else, and the general respect for the "rule of law" on which our democratic system depends.

The ACLU ran the following advertisement in the December 29, 2005 edition of The New York Times:

The tensions between the need for intelligence agencies to protect the nation and the danger that they would become a domestic spy agency have been explicitly and repeatedly fought out in American history. The National Security Act of 1947 contained a specific ban on intelligence operatives from operating domestically. In the 1970s, America learned about the extensive domestic political spying carried out by the FBI, the military, the CIA, and the NSA, and Congress passed new laws to prevent a repeat of those abuses. Surveillance laws were debated and modified under presidents Ford, Carter, Reagan, Bush Sr. and Clinton.

But, President Bush would sweep aside this entire body of democratically debated and painstakingly crafted restrictions on domestic surveillance by the executive branch with his extraordinary assertion that he can simply ignore this law because he is the Commander-in-Chief. In a December 17 radio address, for example, Bush asserted that the spying was "fully consistent with my constitutional responsibilities and authorities." But his constitutional duty is to "take care that the laws be faithfully executed" (Article II, Section 3); the law here clearly establishes well-defined procedures for eavesdropping on U.S. persons, and the fact is, Bush ordered that those procedures not be followed.

Government eavesdropping on Americans is an extremely serious matter; the ability to intrude on the private realm is a tremendous power that can be used to monitor, embarass, control, disgrace, or ruin an individual. Because it is so invasive, the technology of wiretapping has been subject to carefully crafted statutory controls almost since it was invented. Ignoring those controls and wiretapping without a court order is a crime that carries a significant prison sentence (in fact, criminal violations of the wiretap statute were among the articles of impeachment that were drafted against President Nixon shortly before his resignation).

Unfortunately, although the law in this matter is crystal clear, many Americans, faced with President Bush's bold assertions of "inherent" authority for these actions, will not know what to believe. There are only 5 points they need to understand:

The law on surveillance begins with the Fourth Amendment to the Constitution, which states clearly that Americans' privacy may not be invaded without a warrant based on probable cause.

United States ConstitutionFourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. (emphasis added)

The US Supreme Court (US v. Katz 389 US 347) has made it clear that this core privacy protection does cover government eavesdropping. As a result, all electronic surveillance by the government in the United States is illegal, unless it falls under one of a small number of precise exceptions specifically carved out in the law.

United States Code Title 50, Chapter 36, Subchapter 1Section 1809. Criminal sanctions

(a) Prohibited activitiesA person is guilty of an offense if he intentionally-

(1) engages in electronic surveillance under color of law except as authorized by statute

In other words, the NSA can only spy where it is explicitly granted permission to do so by statute. Citizens concerned about surveillance do not have to answer the question, "what law restricts the NSA's spying?" Rather, the government is required to supply an answer to the question "what law permits the NSA to spy?"

There are only three laws that authorize any exceptions to the ban on electronic eavesdropping by the government. Congress has explicitly stated that these three laws are the exclusive means by which domestic electronic surveillance can be carried out (18 USC, Section 2511(2)(f)). They are:

Title III and ECPA govern domestic criminal wiretaps and are not relevant to the NSA's spying. FISA is the law under which the NSA should have operated. It authorizes the government to conduct surveillance in certain situations without meeting all of the requirements of the Fourth Amendment that apply under criminal law, but requires that an independent Foreign Intelligence Surveillance Court oversee that surveillance to make sure that Americans who have no ties to foreign terrorist organizations or other "foreign powers" are not spied upon.

FISA was significantly loosened by the Patriot Act (which, for example, allowed it to be used for some criminal investigations), and parts of it now stand in clear violation of the Constitution's Fourth Amendment in the view of the ACLU and many others. However, even the post-Patriot Act version of FISA does not authorize the president to conduct warrantless eavesdropping on U.S. citizens or permanent legal residents in the U.S. without an order from the FISA Court. Yet it is that very court order requirement - imposed to protect innocent Americans - that the President has ignored.

In fact, one member of the FISA Court, Judge James Roberston, has apparently resigned from the court in protest of President Bush's secret authorization of this program. And the New York Times reported that the court's chief judge complained about the program when she was (belatedly) notified of it, and refused to allow information gathered under the program to be used as the basis for FISA wiretap orders.

Congress after 9/11 approved an Authorization to Use Military Force against those responsible for the attacks in order to authorize the president to conduct foreign military operations such as the invasion of Afghanistan.

But that resolution contains no language changing, overriding or repealing any laws passed by Congress. Congress does not repeal legislation through hints and innuendos, and the Authorization to Use Military Force does not authorize the president to violate the law against surveillance without a warrant any more than it authorizes him to carry out an armed robbery or seize control of Citibank in order to pay for operations against terrorists. In fact, when President Truman tried to seize control of steel mills that were gripped by strikes in 1952, the Supreme Court decisively rejected his authority to make such a seizure, even in the face of arguments that the strike would interfere with the supply of weapons and ammunition to American troops then under fire on the battlefields of the Korean War.

U.S. Supreme CourtYOUNGSTOWN CO. v. SAWYER, 343 U.S. 579 (1952)

"The order cannot properly be sustained as an exercise of the President's military power as Commander in Chief of the Armed Forces. . . .

"Nor can the seizure order be sustained because of the several constitutional provisions that grant executive power to the President. . . . The Constitution limits his functions in the lawmaking process to the recommending of laws he thinks wise and the vetoing of laws he thinks bad. And the Constitution is neither silent nor equivocal about who shall make laws which the President is to execute. . . .

"The Founders of this Nation entrusted the lawmaking power to the Congress alone in both good and bad times."

The Supreme Court also rejected similar assertions of inherent executive power by Richard Nixon.

In fact, FISA contains explicit language describing the president's powers "during time of war" and provides that "the President, through the Attorney General, may authorize electronic surveillance without a court order under this title to acquire foreign intelligence information for a period not to exceed fifteen days following a declaration of war by the Congress." 50 U.S.C. 1811 (emphasis added). So even if we accept the argument that the use-of-force resolution places us on a war footing, warrantless surveillance would have been legal for only 15 days after the resolution was passed on September 18, 2001.

Point #5: The need for quick action does not justify an end-run around the courtsThe FISA law takes account of the need for emergency surveillance, and the need for quick action cannot be used as a rationale for going outside the law. FISA allows wiretapping without a court order in an emergency; the court must simply be notified within 72 hours. The government is aware of this emergency power and has used it repeatedly. In addition, the Foreign Intelligence court is physically located in the Justice Department building, and the FISA law requires that at least two of the FISA judges reside in the Washington, DC area, for precisely the reason that rapid action is sometimes needed.

If President Bush still for some reason finds these provisions to be inadequate, he must take his case to Congress and ask for the law to be changed, not simply ignore it.

President Bush's claim that he has "inherent authority" as Commander-in-Chief to use our spy agencies to eavesdrop on Americans is astonishing, and such spying is clearly illegal. It must be halted immediately, and its origins must be thoroughly investigated by Congress and by a special counsel. (See letter from the ACLU to Attorney General Gonzales calling for a special counsel).

Given the extensive (indeed, excessive) surveillance powers that the government already possesses, the Administration's blatantly illegal use of warrantless surveillance raises an important question: why? One possibility, raised by the New York Times in a Dec. 24, 2005 story ("Spy Agency Mined Vast Data Trove, Officials Report"), is that the NSA is relying on assistance from several unnamed telecommunications companies to "trace and analyze large volumes of communications" and is "much larger than the White House has acknowledged."

This, as security expert Bruce Schneier has noted, suggests the Bush Administration has developed a "a whole new surveillance paradigm" - exploiting the NSA's well known capabilities to spy on individuals not one at a time, as FISA permits, but to run communications en masse through computers in the search for suspicious individuals or patterns. This "new paradigm" may well be connected to the NSA program sometimes known as "Echelon," which carries out just that kind of mass collection of communications (see http://www.nsawatch.org). This "wholesale" surveillance, as Schneier calls it, would constitute an illegal invasion of Americans' privacy on a scale that has never before been seen. (See Schneier, "NSA and Bush's Illegal Eavesdropping," Salon.com)

According to the Times, several telecommunications companies provided the NSA with direct access to streams of communications over their networks. In other words, the NSA appears to have direct access to a large volume of Americans' communications - with not simply the assent, but the cooperation of the companies handling those communications.

We do not know from the report which companies are involved or precisely how or what the NSA can access. But this revelation raises questions about both the legal authority of the NSA to request and receive this data, and whether these companies may have violated either the Federal laws protecting these communications or their own stated privacy polices (which may, for example, provide that they will only turn over their customers' data with their consent or in response to a proper order).

Regardless of the scale of this spying, we are facing a historic moment: the President of the United States has claimed a sweeping wartime power to brush aside the clear limits on his power set by our Constitution and laws - a chilling assertion of presidential power that has not been seen since Richard Nixon.

See more here:
NSA Spying on Americans Is Illegal | American Civil ...

Blockchain Cryptography Explained | Lisk Academy

What is Cryptography?

A lot of people use cryptography on a daily basis without realizing it as many popular messaging apps use encryption. It is also one of the core aspects of blockchain technology. In this segment of the Lisk Academy we will provide a simple yet detailed explanation of cryptography, both symmetric and asymmetrickey cryptography.

Cryptography is the method of disguising and revealing, otherwise known as encrypting and decrypting, information through complex mathematics. This means that the information can only be viewed by the intended recipients and nobody else. The method involves taking unencrypted data, such as a piece of text, and encrypting it using a mathematical algorithm, known as a cipher. This produces a ciphertext, a piece of information that is completely useless and nonsensical until it is decrypted. This method of encryption is known as symmetric-key cryptography.

An early example of cryptography was the Caesar cipher, used by Julius Caesar to protect Roman military secrets. Each letter in a messages was substituted with the letter 3 spaces to the left in the alphabet, this knowledge was essentially the key that encrypted the message. Caesars generals knew that to decode the letters they only had to shift each to the right by three, whilst the information remained safe if intercepted by Caesars enemies. Modern cryptography works on a similar concept, albeit with far greater levels of complexity.

The code base for most ciphers are open source projects, meaning their code can be examined by anyone. The most widely used cipher in the world called is AES and is free for anyone to use. The AES libraries, that are implementing the algorithm, are open to viewing by the public and have been fully investigated over a five year period. As a result, it has been studied in considerable detail and to date no vulnerabilities have been discovered. So much so, that the cipher is also used by the NSA, the United States intelligence agency, as the tool of choice for encrypting information.

In blockchain, cryptography is primarily used for two purposes:

Blockchain technology utilizes cryptography as a means of ensuring transactions are done safely, whilesecuring all information and storages of value. Therefore, anyone using blockchain can have complete confidence that once something is recorded on a blockchain, it is done so legitimately and in a manner that preserves security.

Despite being founded upon a similar framework, the type of cryptography used in blockchain, namely public-key cryptography, is considerably better suited to the functions associated with the technology than symmetric-key cryptography.

Public-key cryptography, also known as asymmetric cryptography, represents an improvement on standard symmetric-key cryptography as it allows information to be transferred through a public key that can be shared with anyone.

Rather than using a single key for encryption and decryption, as is the case with symmetric key cryptography, separate keys (a public key and a private key) are used.

A combination of a users public key and private key encrypt the information, whereas the recipients private key and sender's public key decrypt it. It is impossible to work out what the private key is based on the public key. Therefore, a user can send their public key to anyone without worrying that someone will gain access to their private key. The sender can encrypt files that they can be sure will only be decrypted by the intended party.

Imagine it like this, Blaine has a two-tiered box that, when locked, allows items to pass through to the second tier. This box has two separate keys - one for each tier. The key to the first tier is the public key, and the key to the second is the private key. Blaine gives copies of the public key to all of his friends, but only keeps the private key for himself. Anyone needing to send Blaine a secret note can open the box, insert the note, and close it again so that its secure. However, once the box closes the note passes through to the second tier, to which only Blaine has access. On a simple level, this is how public-key cryptography works.

Furthermore, through public-key cryptography a digital signature is produced, securing the integrity of the data that is being shown. This is done by combining a user's private key with the data that they wish to sign, through a mathematical algorithm.

Since the actual data itself is part of the digital signature, the network will not recognize it as valid if any part of it is tampered with. Editing even the slightest aspect of the data reshapes the whole signature, making it false and obsolete. Through this, blockchain technology is capable of guaranteeing that any data being recorded onto it is true, accurate and untampered with. Digital signatures are what give the data recorded on a blockchain its immutability.

Continued here:
Blockchain Cryptography Explained | Lisk Academy

Chelsea Manning’s Case Is Wikileaks – patribotics.blog

Chelsea Mannings case is Wikileaks vs the United States.

Thats the Grand Jury and the case consists of charging Wikileaks with conspiring with Russia, including in Mannings original leak.

Manning is right.In her press conference today, Manning astutely pointed out that Julian Assange is already indicted by the United States and not by Mueller. Grand Juries, she said, are for the purpose of an indictment so why does the Government want to force her to testify at a Grand Jury, if Assange is already indicted?

Answer: Because its a separate trial from that of Assange. It is the trial of Wikileaks, for conspiring with the GRU against the United States since Manning leaked her cables in 2010.

Patribotics hopesto expand reporting and commission other writers. If you would like todonate, there are buttons around the site, or you couldmake a contribution here.

This blog has consistently argued that Mueller said Trump was not proven guilty YET, but would be proven guilty once the Wikileaks = the GRU case concludes. Mannings self-serving pleas to camera only underscore our central thesis.

Mannings allies who are also Wikileaks allies are arguing another salient point, and its a pity the mainstream media is not paying any attention. They say that the Government wants to relitigate her court martial. Here we have a whining tweet from Jude Fleming, who masquerades as a journalist concerned for the free press; in fact, as her twitter header shows, Fleming works for Ruptly, a state blog of the Putin government.

Chelsea Manning has been asked to answer the same questions before a Grand Jury. Spoiler alert for US Govt > READ THE COURT MARTIAL TRANSCRIPT, ITS ALL THERE. Next, look up redundant. RevolvingInjustice FreeChelseaManning

How does Russias Ms. Fleming know this? Manning has refused to answer the questions, correct? So she has no idea what the Grand Jury want to ask Chelsea Manning, does she? Except, Fleming works for Russia so of course she knows.

As we reported, Wikileaks colluded with the GRU in the Manning case and ever since. Chelsea knows this, and so does Russia (Flemings employers). They know exactly what the Grand Jury wants to ask Ms. Manning. Lets pretend for a second that this wasnt the case, and Fleming worked for CNN instead of Ruptly. Why would her court martial testimony be the first thing that springs to mind? It wouldnt. Chelsea Manning has been out of prison, pardoned by President Obama, for some time. She has done all kinds of nefarious things since her release. For example, shes partied with white nationalists and other employees of the Russian state, like Cassandra Fairbanks, who worked for Sputnik, and the alt-rights Jack Posobiec and his Russian wife.

A Grand Jury could be asking Manning about any of these things. But the Ruptly journalist iscertainthat she is being asked about her Grand Jury testimony at her Court Martial.

And the Ruptly journalist is dead right. Because Chelsea Mannings case is Wikileaks, the one that will convict Trump for conspiring with Russia.

Because Chelsea Manning who has immunity, following her pardon, for the 2010 crime she was convicted of, and cannot take the Fifth perjured herself at her 2010 court martial. If she repeats that lie today, she will have committed a new perjury.

I want to take the mainstream media by the scruff of their shirts and shake some sense into them. Do folks not see what is right in front of them? Let me recap:

Chelsea Manning is not refusing to testify because of any feeling about Grand Juries. She lied at her court martial. She knows Russia was involved. The FBI have the goods. Chelsea would face far worse charges than merely perjury, and shed face them under the Uniform Code of Military Justice.

Jude Fleming of Ruptly knows that, because her Russian bosses told her so. Its why she knows, in advance, what questions the Grand Jury want to ask Manning. Flemings Russian bosses know that Wikileaks didnt receive whistleblower info and publish it. They were working,all the time, from the beginning,for the Russian state.

Wikileaks IS Russia. And Trumps campaign was found to have conspired with Wikileaks. If Chelsea Mannings case is Wikileaks, and it definitely is, then her fear is of revealing just how long she, exactly like Assange, has been working for the Kremlin.

As I wrote in my first post on this blog, Dear Mr. Putin, Lets Play Chess, a long essay I wrote in December 2016 and published here in January 2017:

I have an overarching theory of Russias attack on America and the West. Here it is.

There have not been a series of attacks on America and Europe by Vladimir Putin. There has been one single operation; it is the same operation.

This afternoon, Chelsea Manning went one step further in proving me right.

Patribotics is grateful to you for making this site possible. Yoursupportenables us to report on Putin and Donald Trump. Please consider adonationhere

Like Loading...

Related

Read more here:
Chelsea Manning's Case Is Wikileaks - patribotics.blog

Julian Assange Now in Hospital Wing of British Prison, Lawyer …

The health of imprisoned WikiLeaks founder Julian Assange has deteriorated so drastically that his lawyer says it is not possible to conduct a normal conversation with him.

Swedish outletUpsala Nya Tidningreports that Assange is so ill that he is now in the hospital wing of the prison.

Wikileaks founder Julian Assanges Swedish lawyer wants the arrest hearing on Monday in Uppsala to be postponed. According to the lawyer, who has now visited his client in British prison, Assange is admitted to the medical department and was unable to make a call, the newspaper reports.

Assange is currently imprisoned at Belmarsh Prison in the United Kingdom and facing eighteen charges under the Espionage Act in the United States for his publication of the Iraq and Afghan War Logs. If extradited and convicted, he could be sentenced to up to 175 years in prison.`

The award-winning publisher is under investigation in Sweden for sex crimes, which he and many of his supporters believe is a setup to get him into the nation where he could be more easily extradited to the United States. A hearing in the case is scheduled for June 3 and Assanges legal team had attempted to get it postponed until his health improved.

One of the reasons is that Assanges health situation on Friday was such that it was not possible to conduct a normal conversation with him, Assanges Swedish defense lawyer Per Samuelson told Reuters.

I meant that it should be postponed until I had time to meet again and go through the issues in peace and quiet. I suggested no specific date and meant it should be postponed until everything was ready, but the district court has now decided that this wont happen.

Sweden had tried to drop the investigation in 2013, but was pressured to keep it open by the British government further fueling speculation that it is a political hit job. A Crown Prosecution Service had emailed Swedish prosecutors telling them, Dont you dare get cold feet!!!

Prior to his arrest, Assange spent nearly seven years in the Ecuadorian Embassy in London, unable to receive proper medical treatment, despite the lack of sunshine and fresh air taking a toll on his system. Doctors who visited him there wrote an article for the Guardian pleading for him to be allowed to go to the hospital for treatment, headlining their account We examined Julian Assange, and he badly needs carebut he cant get it.

The doctors wrote, experience tells us that the prolonged uncertainty of indefinite detention inflicts profound psychological and physical trauma above and beyond the expected stressors of incarceration. These can include severe anxiety, pathological levels of stress, dissociation, depression, suicidal thoughts, post-traumatic stress disorder and chronic pain, among others.

A source close to Assange confirmed the reports about his health to The Gateway Pundit.

We have been watching the slow-motion assassination of Julian Assange. They have been choking him to death by tactical psyops, siege tactics, and wilful neglect as surely as if they placed a noose tied around his neck, not just in Belmarsh Prison but in the embassy as well. The only difference between his execution and someone on death row is the same as the difference between covert and overt warfare, which makes sense because the intelligence, judicial and military agencies who are carrying out his death sentence operate within the same power structure which carries out war. First came the smears (propaganda), then came the siege (sanctions), and they staged their coup (dragged him out of the embassy) and now theyve got him in their clutches and they can do what they want behind closed doors. Thats how you kill a nation while still looking like a nice guy, and thats how theyre killing Assange, independent journalist Caitlin Johnstone wrote of his conditions.

Continued here:
Julian Assange Now in Hospital Wing of British Prison, Lawyer ...

How to Set Up BitLocker Encryption on Windows

BitLocker is a tool built into Windows that lets you encrypt an entire hard drive for enhanced security. Heres how to set it up.

When TrueCrypt controversially closed up shop, they recommended their users transition away from TrueCrypt to using BitLocker or Veracrypt. BitLocker has been around in Windows long enough to be considered mature, and is anencryption product generally well-regarded by security pros. In this article, were going to talk about how you can set it up on your PC.

RELATED: Should You Upgrade to the Professional Edition of Windows 10?

Note: BitLocker Drive Encryption and BitLocker To Go require a Professional or Enterprise edition of Windows 8 or 10, or the Ultimate version of Windows 7. However, starting with Windows 8.1, the Home and Pro editions of Windows include a Device Encryption feature(a feature also included in Windows 10) that works similarly. We recommend Device Encryption if your computer supports it, BitLocker for Pro users who cant use Device Encryption, and VeraCrypt for people using a Home version of Windows where Device Encryption wont work.

Many guides out there talk about creating a BitLocker container that works much like the kind of encrypted container you can create with products like TrueCrypt or Veracrypt. Its a bit of a misnomer, but you can achieve a similar effect. BitLocker works by encrypting entire drives. That could be your system drive, a different physical drive, or a virtual hard drive (VHD) that exists as a file and is mounted in Windows.

RELATED: How to Create an Encrypted Container File With BitLocker on Windows

The difference is largely semantic. In other encryption products, you usually create an encrypted container, and then mount it as a drive in Windows when you need to use it. With BitLocker, you create a virtual hard drive, and then encrypt it. If youd like to use a container rather than, say, encrypt your existing system or storage drive, check out our guide to creating an encrypted container file with BitLocker.

For this article, were going to concentrate on enabling BitLocker for an existing physical drive.

RELATED: How to Use BitLocker Without a Trusted Platform Module (TPM)

To use BitLocker for a drive, all you really have to do is enable it, choose an unlock methodpassword, PIN, and so onand then set a few other options. Before we get into that, however, you should know that using BitLockers full-disk encryption on a system drive generally requires a computer with a Trusted Platform Module (TPM) on your PCs motherboard. This chip generates and store the encryption keys that BitLocker uses. If your PC doesnt have a TPM, you can use Group Policy to enable using BitLocker without a TPM. Its a bit less secure, but still more secure than not using encryption at all.

You can encrypt a non-system drive or removable drive without TPM and without having to enable the Group Policy setting.

On that note, you should also know that there are two types of BitLocker drive encryption you can enable:

In Windows 7 through 10, you really dont have to worry about making the selection yourself. Windows handles things behind the scenes, and the interface youll use to enable BitLocker doesnt look any different. If you end up unlocking an encrypted drive on Windows XP or Vista, youll see the BitLocker to Go branding, so we figured you should at least know about it.

So, with that out of the way, lets go over how this actually works.

The easiest way to enable BitLocker for a drive is to right-click the drive in a File Explorer window, and then choose the Turn on BitLocker command. If you dont see this option on your context menu, then you likely dont have a Pro or Enterprise edition of Windows and youll need to seek another encryption solution.

Its just that simple. The wizard that pops up walks you through selecting several options, which weve broken down into the sections that follow.

The first screen youll see in the BitLocker Drive Encryption wizard lets you choose how to unlock your drive. You can select several different ways of unlocking the drive.

If youre encrypting your system drive on a computer thatdoesnt have a TPM, you can unlock the drive with a password or a USB drive that functions as a key. Select your unlock method and follow the instructions for that method (enter a password or plug in your USB drive).

RELATED: How to Enable a Pre-Boot BitLocker PIN on Windows

If your computer does have a TPM, youll see additional options for unlocking your system drive. For example, you can configure automatic unlocking at startup (where your computer grabs the encryption keys from the TPM and automatically decrypts the drive). You could alsouse a PIN instead of a password, or even choose biometric options like a fingerprint.

If youre encrypting a non-system drive or removable drive, youll see only two options (whether you have a TPM or not). You can unlock the drive with a password or a smart card (or both).

BitLocker provides you with a recovery key that you can use to access your encrypted files should you ever lose your main keyfor example, if you forget your password or if the PC with TPM dies and you have to access the drive from another system.

You can save the key to your Microsoft account, a USB drive, a file, or even print it. These options are the same whether youre encrypting a system or non-system drive.

If you back up the recovery key to your Microsoft account, you can access the key later at https://onedrive.live.com/recoverykey. If you use another recovery method, be sure to keep this key safeif someone gains access to it, they could decrypt your drive and bypass encryption.

You can also back up your recovery key multiple ways if you want. Just click each option you want to use in turn, and then follow the directions. When youre done saving your recovery keys, click Next to move on.

Note: If youre encrypting a USB or other removable drive, you wont have the option of saving your recovery key to a USB drive. You can use any of the other three options.

BitLocker automatically encrypts new files as you add them, but you must choose what happens with the files currently on your drive. You can encrypt the entire driveincluding the free spaceor just encrypt the used disk files to speed up the process. These options are also the same whetheryoure encrypting a system or non-system drive.

RELATED: How to Recover a Deleted File: The Ultimate Guide

If youre setting up BitLocker on a new PC, encrypt the used disk space onlyits much faster. If youre setting BitLocker up on a PC youve been using for a while, you should encrypt the entire drive to ensure no one can recover deleted files.

When youve made your selection, click the Next button.

If youre using Windows 10, youll see an additional screen letting you choose an encryption method. If youre using Windows 7 or 8, skip ahead to the next step.

Windows 10 introduced a new encryption method named XTS-AES. It provides enhanced integrity and performance over the AES used in Windows 7 and 8. If you know the drive youre encrypting is only going to be used on Windows 10 PCs, go ahead and choose the New encryption mode option. If you think you might need to use the drive with an older version of Windows at some point (especially important if its a removable drive), choose the Compatible mode option.

Whichever option you choose (and again, these are the same for system and non-system drives), go ahead and click the Next button when youre done, and on the next screen, click the Start Encrypting button.

The encryption process can take anywhere from seconds to minutes or even longer, depending on the size of the drive, the amount of data youre encrypting, and whether you chose to encrypt free space.

If youre encrypting your system drive, youll be prompted to run a BitLocker system check and restart your system. Make sure the option is selected, click the Continue button, and then restart your PC when asked.After the PC boots back up for the first time, Windows encrypts the drive.

If youre encrypting a non-system or removable drive, Windows does not need to restart and encryption begins immediately.

Whatever type of drive youre encrypting, you can check the BitLocker Drive Encryption icon in the system tray to see its progress, and you can continue using your computer while drives are being encryptedit will just perform more slowly.

If your system drive is encrypted, unlocking it depends on the method you chose (and whether your PC has a TPM). If you do have a TPM and elected to have the drive unlocked automatically, you wont notice anything differentyoull just boot straight into Windows like always. If you chose another unlock method, Windows prompts you to unlock the drive (by typing your password, connecting your USB drive, or whatever).

RELATED: How to Recover Your Files From a BitLocker-Encrypted Drive

And if youve lost (or forgotten) your unlock method, press Escape on the prompt screen to enter your recovery key.

If youve encrypted a non-system or removable drive, Windows prompts you to unlock the drive when you first access it after starting Windows (or when you connect it to your PC if its a removable drive). Type your password or insert your smart card, and the drive should unlock so you can use it.

In File Explorer, encrypted drives show a gold lock on the icon (on the left). That lock changes to gray and appears unlocked when you unlock the drive (on the right).

You can manage a locked drivechange the password, turn off BitLocker, back up your recovery key, or perform other actionsfrom the BitLocker control panel window. Right-click any encrypted drive, and then select Manage BitLocker to go directly to that page.

Like all encryption, BitLocker does add some overhead. Microsofts official BitLocker FAQ says that Generally it imposes a single-digit percentage performance overhead. If encryption is important to you because you have sensitive datafor example, a laptop full of business documentsthe enhanced security is well worth the performance trade-off.

See the original post:
How to Set Up BitLocker Encryption on Windows

Encryption: What It Is, and How It Works for You | Tom’s Guide

Encryption refers to any process used to make sensitive data more secure and less likely to be intercepted by those unauthorized to view it.

There are several modern types of encryption used to protect sensitive electronic data, such as emails, files, folders and entire drives. It's very important to understand what kinds of encryption are most important for a particular need, and to not be lulled into a false sense of security by fancy-sounding process names.

There are many encryption programs that provide excellent security for very little money sometimes even for free.

For example, consider the folder-encryption options available to users of the Microsoft Windows operating system. Microsoft's encryption is generally strong, meaning that most users won't have to seek out additional methods of protecting their sensitive financial data, medical records and other sensitive files.

MORE: 17 Security and Privacy Apps and Plugins

Or, if you're worried about Microsoft's alleged relationship with the U.S. National Security Agency, try TrueCrypt, an open-source, free-to-use software solution.

The most dangerous pitfall of folder encryption is that there may be temporary versions of the sensitive files that are not encrypted.

Consider this: Most computer users regularly save their work to avoid catastrophic data loss due to a power outage, electrical storm or other unexpected event. Each time the user saves a file in progress, a temporary version of that file is created and stored in the aptly named "temp" folder, where it remains unencrypted.

Simply deleting temp files isn't enough protection, either. Someone who wants to access your data badly enough will likely be able to access those files using free or cheap data-recovery software.

All encryption techniques have weak spots. As these weaknesses are revealed and exploited, new methods of encrypting data are developed to provide additional layers of security for users.

One of the most common and bothersome weaknesses occurs when an encryption method, also called a cipher or an algorithm, that's supposed to generate seemingly random strings of gibberish instead produces outputs that have a discernible pattern. If the pattern gets noticed by interlopers, it may help them crack the encrypted data.

A similar issue involves encryption algorithms that generate predictable patterns of characters in response to repetitious, predictable input.

MORE: Email Encryption: Worth the Trouble?

If this problem is extensive enough, it can help digital intruders decipher at least part of the encrypted data, which may include financial information, government documents or other sensitive information. In many cases, even a partial data breach can be devastating.

Individuals and organizations that want to add protection to their encryption algorithms often insert extra lines of code to alter the outputs -- a practice known as "salting."

For example, one of the most common passwords used is simply "password." Malicious hackers know what "password" and other common passwords look like after they're run though common encryption algorithms.

But if an organization adds extra characters to each password during the encryption process, such as "password" plus "safe," the output will be something malicious hackers won't recognize as long as the extra characters are kept secret.

Encryption can also be used to verify the integrity of a file or piece of software. The raw binary data of a file or application is run through a special encryption algorithm to produce a "hash," a long number unique to that file.

Any alteration to the file, such as by a hacker inserting malicious code or by random data corruption, will produce a different hash. Computers and mobile devices compare a new piece of software's stated hash to its actual one before installing the software.

A similar process involves running a piece of software through a simple algorithm that produces a single short number, a "checksum." Altering the software in any way will likely produce a different checksum.

To guard against random, accidental corruption, many pieces of software include protection in the form of self-diagnostic checksum matches that the software performs each time it's launched.

Data encryption is important for everyone, not just big corporations and government officials. The topic can be intimidating for those without extensive computer experience, but thankfully, for most users, keeping sensitive data safe is a relatively straightforward process.

The key is to start early and regularly verify the effectiveness of the chosen security measures.

Follow us@tomsguide, onFacebookand onGoogle+.

More:
Encryption: What It Is, and How It Works for You | Tom's Guide

What is The Difference Between Hashing and Encrypting

Hashing and encrypting are two words that are often used interchangeably, but incorrectly so.

Do you understand the difference between the two, and the situations in which you should use one over the other? In today's post I investigate the key differences between hashing and encrypting, and when each one is appropriate.

A hash is a string or number generated from a string of text. The resulting string or number is a fixed length, and will vary widely with small variations in input. The best hashing algorithms are designed so that it's impossible to turn a hash back into its original string.

MD5 - MD5 is the most widely known hashing function. It produces a 16-byte hash value, usually expressed as a 32 digit headecimal number. Recently a few vulnerabilities have been discovered in MD5, and rainbow tables have been published which allow people to reverse MD5 hashes made without good salts.

SHA - There are three different SHA algorithms -- SHA-0, SHA-1, and SHA-2. SHA-0 is very rarely used, as it has contained an error which was fixed with SHA-1. SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.

Hashing is an ideal way to store passwords, as hashes are inherently one-way in their nature. By storing passwords in hash format, it's very difficult for someone with access to the raw data to reverse it (assuming a strong hashing algorithm and appropriate salt has been used to generate it).

When storing a password, hash it with a salt, and then with any future login attempts, hash the password the user enters and compare it with the stored hash. If the two match up, then it's virtually certain that the user entering the password entered the right one.

Hashing is great for usage in any instance where you want to compare a value with a stored value, but can't store its plain representation for security reasons. Other use cases could be checking the last few digits of a credit card match up with user input or comparing the hash of a file you have with the hash of it stored in a database to make sure that they're both the same.

Encryption turns data into a series of unreadable characters, that aren't of a fixed length. The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key.

There are two primary types of encryption, symmetric key encryption and public key encryption. In symmetric key encryption, the key to both encrypt and decrypt is exactly the same. This is what most people think of when they think of encryption.

Public key encryption by comparison has two different keys, one used to encrypt the string (the public key) and one used to decrypt it (the private key). The public key is is made available for anyone to use to encrypt messages, however only the intended recipient has access to the private key, and therefore the ability to decrypt messages.

Encryption should only ever be used over hashing when it is a necessity to decrypt the resulting message. For example, if you were trying to send secure messages to someone on the other side of the world, you would need to use encryption rather than hashing, as the message is no use to the receiver if they cannot decrypt it.

If the raw value doesn't need to be known for the application to work correctly, then hashing should always be used instead, as it is more secure.

If you have a usecase where you have determined that encryption is necessary, you then need to choose between symmetric and public key encryption. Symmetric encryption provides improved performance, and is simpler to use, however the key needs to be known by both the person/software/system encrypting and decrypting data.

If you were communicating with someone on the other side of the world, you'd need to find a secure way to send them the key before sharing your secure messages. If you already had a secure way to send someone an encryption key, then it stands to reason you would send your secure messages via that channel too, rather than using symmetric encryption in the first place.

Many people work around this shortcoming of symmetric encryption by initially sharing an encryption key with someone using public key encryption, then symmetric encryption from that point onwards -- eliminating the challenge of sharing the key securely.

View original post here:
What is The Difference Between Hashing and Encrypting