.NET Encryption Simplified – CodeProject

Microsoft's .NET framework has robust support for encryption in the System.Security.Cryptography namespace. Everything you need to perform encryption is available in that class, but it's difficult to understand unless you have a firm grasp of cryptographic theory. Over the last four months, I've struggled with the concepts and theory behind encrypting and decrypting data. I've wrapped all my derived knowledge into a class I call Encryption. This class is heavily documented, string oriented, and most of all, simple! It's ideal for learning more about encryption.

There are three essential cryptographic concepts represented in the Encryption namespace. It's important that every developer understands these concepts before proceeding any further:

Hashes aren't encryption, per se, but they are fundamental to all other encryption operations. A hash is a data fingerprint - a tiny set of bytes that represents the uniqueness of a much larger block of bytes. Like fingerprints, no two should ever be alike, and a matching fingerprint is conclusive proof of identity. A full discussion of hashes is outside the scope of this article, but I highly recommend Steve Friedl's Illustrated Guide to Cryptographic Hashes for more background.

In symmetric encryption, a single key is used for encrypting and decrypting the data. This type of encryption is quite fast, but has a severe problem: in order to share a secret with someone, they have to know your key. This implies a very high level of trust between people sharing secrets; if an unscrupulous person has your key-- or if your key is intercepted by a spy-- they can decrypt all the messages you send using that key!

Asymmetric encryption solves the trust problem inherent in symmetric encryption by using two different keys: a public key for encrypting messages, and a private key for decrypting messages. This makes it possible to communicate in secrecy with people you don't fully trust. If an unscrupulous person has your public key, who cares? The public key is only good for encryption; it's useless for decryption. They can't decrypt any of your messages! However, asymmetric encryption is very slow. It's not recommended for use on more than roughly 1 kilobyte of data.

These three concepts are heavily intertwined and always seen together in modern cryptography. They have different strengths and weaknesses; combining them offers a much higher level of security than can be achieved using a single method alone. For example, when digitally transmitting a check to your bank, all three of these methods are used:

Image reprinted from Entrust's Introduction to Cryptography and Digital Signatures PDF.

In order to open the check, these steps are simply performed in the reverse order by the recipient. Note that if any of these steps were missing, the transaction would have significant weaknesses that could be exploited!

See more here:
.NET Encryption Simplified - CodeProject

Encrypting files in C#.NET using the Advanced Encryption …

One of the biggest challenges when dealing with the security and encryption for a system, is the determination of the correct ciphering paradigm. In .NET, there is a copious amount of libraries available for use in the System.Cryptography namespace. A significant amount of these libraries have been deprecated, usually, due to vulnerabilities being subsequently exposed, so it is very easy to use something that may be as watertight as a sieve.

This is further compounded by the fact that the cryptography APIs are very detailed and low level they are not easy to use for a novice the consequences of setting a single parameter incorrectly results in a security implementation that may as well not exist. Consequently, it is imperative that this subject never be approached in a typical agile/sprint manner security should definitely be approached using a waterfall model. Have no hesitation to advise any manager or architect that your solution will be ready, when it is ready. The agile methodology is typically about adding units of functionality in a YAGNI way, accruing technical debt that can be paid back later, and refactoring applied, this just simply not a correct or acceptable approach when dealing with the security of a system. Do ensure you take the time to do a lot of research, understanding the pitfalls of various implementations is vital to a robust security implementation.

The abundance of so many different types of cryptography, implemented using Symmetric (same key is used to encrypt and decrypt) and Asymmetric (public key and private key used to encrypt and decrypt) algorithms has necessitated that Governments try and standardise implementations across departments, sites and even countries. The AES was released in 2001 as a replacement for the Data Encryption Standard (DES) which had been found to be susceptible to backdoors. This new standard has been widely adopted in commercial environments, as it had a requirement to be able to protect information for a minimum of 20 years or 30 years.

A number of papers were submitted in the application process for the AES by various academic institutions, with the winning cipher named Rijndael (pronounced rain-dahl) a play on the names of the authors of the paper, Joan Daemen and Vincent Rijmen (paper available here). I am sure you will agree that comprehension and implementation of the paper is better suited to domain experts. The algorithm was written by two gifted PhD calibre researchers, so your time as a developer is better suited to try and resolve the domain problems that your business is trying to solve (unless you are a cryptographer of course). You can be sure that researchers at Microsoft have done all the time consuming work of implementing and testing the algorithm, rather than to trying to implement the Rijndael Block Cipher yourself.

To this end, Microsoft have implemented the Rijndael Block Cipher in two in .NET classes which, incidentally, both inherit from the SymmetricAlgorithm abstract base class

Unlike some of the asymmetric implementations by Microsoft, the AES implementation allows you to work at a very high level of abstraction, reducing the amount of parameters you have to configure, hence the scope for error. I have created a class that allows you to encrypt and decrypt strings (your password), and then use this to encrypt a files from anywhere on your machine.

Thus far, the only way this algorithm can be broken is by using a technique known as brute force. This is done by a supercomputer(s) trying every known word in a language, and various password to try and generate the correct password. Typically, these types of programs run over weeks or even months, but can be increased to millennia if the end user chooses a strong password to begin with, which is why having a well defined password policy is vital.

public MainWindow()

{

InitializeComponent();

Continued here:
Encrypting files in C#.NET using the Advanced Encryption ...

Apples Tim Cook Delivers Blistering Speech On Encryption …

Yesterday evening, Apple CEO Tim Cook was honored for corporate leadership during EPICs Champions of Freedom event in Washington. Cook spoke remotely to the assembled audience on guarding customer privacy, ensuring security and protecting their right to encryption.

Like many of you, we at Apple reject the idea that our customers should have to make tradeoffs between privacy and security, Cook opened. We can, and we must provide both in equal measure. We believe that people have a fundamental right to privacy. The American people demand it, the constitution demands it, morality demands it.

This marked the first time that EPIC, a nonprofit research center in Washington focused on emerging privacy and civil liberties issues, has giventhe honor to a person from the business world. The hosts of the event included cryptographer Bruce Schneier, EPIC president Marc Rotenberg, Lobbyist Hilary Rosen and Stanford Lecturer in Law Chip Pitts.

Cook was characteristically passionate about all three topics. A theme that has persisted following hisappearance on Charlie Rose late last year to define how Apple handled encryption, his public letter on Apples new security page in the wake of the celebrity nude hacking incidentsand his speech earlier this year at President Obamas Summit on Cybersecurity at Stanford an event which was notably not attendedby other Silicon Valley CEOs like Facebooks Mark Zuckerberg, Yahoos Marissa Mayer and Googles Larry Page and Eric Schmidt.

Cook lost no time in directing comments at companies (obviously, though not explicitly) like Facebook and Google, which rely on advertising to users based on the data they collect from them for a portion, if not a majority, of their income.

Im speaking to you from Silicon Valley, where some of the most prominent and successful companies have built their businesses by lulling their customers into complacency about their personal information, said Cook. Theyre gobbling up everything they can learn about you and trying to monetize it. We think thats wrong. And its not the kind of company that Apple wants to be.

Cook went on to state, as he has before when talking about products like Apple Pay, that Apple doesnt want your data.

We dont think you should ever have to trade it for a service you think is free but actually comes at a very high cost. This is especially true now that were storing data about our health, our finances and our homes on our devices, Cook went on, getting even more explicit when talking about user privacy.

We believe the customer should be in control of their own information. You might like these so-called free services, but we dont think theyre worth having your email, your search history and now even your family photos data mined and sold off for god knows what advertising purpose. And we think some day, customers will see this for what it is.

That, in case you missed it, is an epic subtweet of Googles Photos product, which was just rolled out at I/O.The fact that Photos is free of charge, and Apples products are not likely spurred the talk about very high costs.

Read more:
Apples Tim Cook Delivers Blistering Speech On Encryption ...

Clock Ticking on Sweden’s Investigation on Julian Assange

Stockholm: Sweden's sexual assault inquiry on Julian Assange is being pinched by time, with the statute of limitations about to expire on one charge and investigators unable to access Ecuador's embassy in London to question the WikiLeaks founder.

Swedish prosecutors petitioned the Ecuadorian embassy in June to interview Assange, who has been holed up in Quito's London mission since 2012 to avoid extradition to Sweden on allegations of rape and sexual assault -- charges Assange vehemently denies.

"I am very critical of Ecuador's position. It can't really be said they did what they could to allow Sweden to question Assange," said Claes Borgstrom, a lawyer for one of the two women who accuse the WikiLeaks founder of having assaulted them in 2010.

Swedish prosecutors initially insisted Assange return to Sweden for interrogation -- a condition the 44-year-old Australian rejected on fears Stockholm could deliver him to US authorities, who may try him for leaking nearly 750,000 classified military and diplomatic documents in 2010.

In response to his enduring embassy asylum, Swedish prosecutors in March agreed to Assange's compromise offer to question him inside the London mission, but have yet to see their requests to see him approved by Ecuador.

If Swedish justice authorities are not allowed to question Assange before the statute of limitations on the sexual assault charges expire on August 13 and 18, Borgstrom said he was pretty sure the case will be dropped.

"If the statute of limitations expires, and most indications are that it will, the prosecutor will close the investigation," he said.

Should that happen, however, the inquiry would continue into the accusation of rape, which carries a 10-year statute of limitations and therefore expires in 2020.

Late request

Attorneys for Assange say suspicions that Quito is using delaying tactics are unfounded.

Go here to see the original:
Clock Ticking on Sweden's Investigation on Julian Assange

WikiLeaks – Target Tokyo

(on 2015-07-31) Press Release

Today, Friday 31 July 2015, 9am CEST, WikiLeaks publishes "Target Tokyo", 35 Top Secret NSA targets in Japan including the Japanese cabinet and Japanese companies such as Mitsubishi, together with intercepts relating to US-Japan relations, trade negotiations and sensitive climate change strategy.

The list indicates that NSA spying on Japanese conglomerates, government officials, ministries and senior advisers extends back at least as far as the first administration of Prime Minister Shinzo Abe, which lasted from September 2006 until September 2007. The telephone interception target list includes the switchboard for the Japanese Cabinet Office; the executive secretary to the Chief Cabinet Secretary Yoshihide Suga; a line described as "Government VIP Line"; numerous officials within the Japanese Central Bank, including Governor Haruhiko Kuroda; the home phone number of at least one Central Bank official; numerous numbers within the Japanese Finance Ministry; the Japanese Minister for Economy, Trade and Industry Yoichi Miyazawa; the Natural Gas Division of Mitsubishi; and the Petroleum Division of Mitsui.

Today's publication also contains NSA reports from intercepts of senior Japanese government officials. Four of the reports are classified TOP SECRET. One of the reports is marked "REL TO USA, AUS, CAN, GBR, NZL", meaning it has been formally authorised to be released to the United States' "Five Eyes" intelligence partners: Australia, Canada, Great Britain and New Zealand.

The reports demonstrate the depth of US surveillance of the Japanese government, indicating that intelligence was gathered and processed from numerous Japanese government ministries and offices. The documents demonstrate intimate knowledge of internal Japanese deliberations on such issues as: agricultural imports and trade disputes; negotiating positions in the Doha Round of the World Trade Organization; Japanese technical development plans, climate change policy, nuclear and energy policy and carbon emissions schemes; correspondence with international bodies such as the International Energy Agency (IEA); strategy planning and draft talking points memoranda concerning the management of diplomatic relations with the United States and the European Union; and the content of a confidential Prime Ministerial briefing that took place at Shinzo Abe's official residence.

Julian Assange, WikiLeaks Editor-in-Chief, said: "In these documents we see the Japanese government worrying in private about how much or how little to tell the United States, in order to prevent undermining of its climate change proposal or its diplomatic relationship. And yet we now know that the United States heard everything and read everything, and was passing around the deliberations of Japanese leadership to Australia, Canada, New Zealand and the UK. The lesson for Japan is this: do not expect a global surveillance superpower to act with honour or respect. There is only one rule: there are no rules."

WikiLeaks Investigations Editor Sarah Harrison said: "Today's publication shows us that the US government targeted sensitive Japanese industry and climate change policy. Would the effectiveness of Japan's industry and climate change proposals be different today if its communications had been protected?"

Japan has been a close historical ally of the United States since the end of World War II. During a recent Presidential visit to Japan, US President Barack Obama described the East Asian country as "one of Americas closest allies in the world". Today's publication adds to previous WikiLeaks publications showing systematic mass spying conducted by US intelligence against the US-allied governments of Brazil "Bugging Brazil", France "Espionnage lyse" and Germany "The Euro Intercepts"; "All the Chancellor's Men".

Read the full list of NSA high priority targets for Japan published today here.

WikiLeaks' journalism is entirely supported by the general public. If you would like to support more work like this, please visit https://wikileaks.org/donate.

Follow this link:
WikiLeaks - Target Tokyo

Edward Snowden: White House Rejects Pardon Plea

We use cookies to give you the best experience. If you do nothing we'll assume that it's ok.

The former National Security Agency employee who leaked details of US spying is told he must return to the US to face trial.

12:22, UK, Monday 03 August 2015

Snowden is living in Russia after leaking details of classified secrets

President Obama has rejected calls to pardon Edward Snowden for revealing details of America's unlawful spying programme.

A petition on the White House website declaring the former National Security Agency employee a national hero has gathered 167,955 signatures in two years.

But Obama's advisor on Homeland Security and Counterterrorism has spoken-out to insist Snowden should return to the US from Russia to face a criminal trial for espionage.

"MrSnowden's dangerous decision to steal and disclose classified information had severe consequences for the security of our country and the people who work to protect it," said Lisa Monaco.

"He should come home to the United States and be judged by a jury of his peers, not hide behind the cover of an authoritarian regime.

1/11

Original post:
Edward Snowden: White House Rejects Pardon Plea

r/CryptoCurrency – reddit

subscribeunsubscribe17,552 readers

~24 users here now

Welcome to r/CryptoCurrency. This subreddit is intended for open discussions of all subjects related to emerging crypto-currencies including (but not limited to): Bitcoin, Litecoin, Namecoin, NovaCoin, Peercoin, Devcoin, Terracoin, Ripple, etc.

To stay better alert of new content on r/CryptoCurrency, subscribe to our RSS feed. If you're looking for our chatroom, you can find it by clicking here. Last but not least, try out our image flair and let us know what coins you're a fan of or are affiliated with!

Warnings Fun Announcements Mining Security Trading Investing Adoption Videos Podcasts Questions Exchanges Technical Wallets Innovations Politics General News Developments Discussions Concepts Privacy DAO/DAC Offer flair or subreddit suggestions

/r/Anoncoin /r/Bitcoin /r/Burstcoin /r/Blackcoin /r/CryptogenicBullion /r/Devcoin /r/DigiByte /r/Digitalcoin /r/Dogecoin /r/Dashpay /r/Ethereum /r/Ethtrader /r/Feathercoin /r/Flappycoin /r/Gridcoin /r/DotA2 /r/Litecoin /r/Mazacoin /r/Maxcoin /r/Megacoin /r/Mintcoin /r/Mooncoin /r/Myriadcoin /r/Namecoin /r/NobleCoin /r/NXT /r/Nyancoins /r/Peercoin /r/Primecoin /r/Quarkcoin /r/ReddCoin /r/Ripplers /r/Stealthcoin /r/Tacocoin /r/Terracoin /r/TheRealPandacoin /r/TopCoin /r/Vertcoin

/r/Best_of_Crypto /r/BitcoinMining /r/BitShares /r/Crypto /r/CryptoMarkets /r/Jobs4Crypto /r/LitecoinMining /r/Mastercoin /r/DoItForTheCoin /r/Ethtrader

/r/CryptoCurrency/wiki/directory

This is a new ad format that we are currently testing. We often try new types of ads in a limited capacity. If you have feedback, please let us know in the ads subreddit.

This area shows new and upcoming links. Vote on links here to help them become popular, and click the forwards and backwards buttons to view more.

Originally posted here:
r/CryptoCurrency - reddit

Now it’s Edward Snowden the comic book as NSA leaker …

Edward Snowden leaked the National Security Agency's secrets then went on the run and is now in Russia He started storm over eavesdropping on emails, texts and phone records and said he was acting as a whistleblower Spy chiefs say he betrayed his country and that terrorists now use encryption - putting lives at risk Pulitzernominated Ted Rall has drawn 'Snowden' with graphic novel versions of the leaker, and other figures including Obama

By Daniel Bates For Dailymail.com

Published: 14:32 EST, 31 July 2015 | Updated: 16:50 EST, 31 July 2015

346 shares

58

View comments

Leaker: Edward Snowden stole the largest haul of secrets in history from the NSA

You've seen the film, read the book - now read the Edward Snowden comic.

A comic book artist is to publish a graphic novel telling the story of the man behind the biggest intelligence leak in military history.

'Snowden' by Pulitzer-nominated Ted Rall claims that the former contractor for the National Security Agency stole 1.7 million classified documents because he was angry at President Obama.

Read more:
Now it's Edward Snowden the comic book as NSA leaker ...

Funniest NSA Spying Memes and Cartoons – Political Humor

Funniest NSA Spying Memes and Cartoons

The Best Memes, Parodies and Cartoons about the NSA Surveillance Scandal

"The Obamacare website is not the only one crashing. The NSA website went offline Friday after suspected hackers broke into it. Hey, NSA: It's not so much fun when people are sneaking into YOUR computer, is it?" Jay Leno

"According to a poll, the majority of Americans are OK with the Obama administration listening in on our phone calls. Guys approve because they feel it increases security. And women approve of Obama's policy because finally a man is listening to them." Conan O'Brien

"Mr. President, no one is saying you broke any laws, we're just saying it's a little bit weird you didn't have to." The Daily Show's John Oliver on the NSA spying scandal

This spying scandal at the White House isn't going away. In fact, it was just announced that President Obama will meet a group of regular Americans to hear their concerns about the White House surveillance program. Or more accurately, to RE-HEAR them." Jimmy Fallon

Read more NSA jokes >

Continue reading here:
Funniest NSA Spying Memes and Cartoons - Political Humor

Search WikiLeaks

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Continue reading here:
Search WikiLeaks