{"id":30293,"date":"2015-04-08T14:41:12","date_gmt":"2015-04-08T18:41:12","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-for-everyone.php"},"modified":"2015-04-08T14:41:12","modified_gmt":"2015-04-08T18:41:12","slug":"encryption-for-everyone","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-for-everyone.php","title":{"rendered":"Encryption for everyone"},"content":{"rendered":"<p><p>  In the wake of the revelations that intelligence agencies have  been engaged in mass surveillance activities, both industry and  society at large are looking for practicable encryption solutions  that protect businesses and individuals. Previous technologies  have failed in practice because they were too expensive or not  user friendly enough. Fraunhofer has launched an open initiative  called \"Volksverschlsselung\" with the aim of bringing end-to-end  encryption to the masses. Fraunhofer researchers will be  presenting a prototype of their easy-to-use software and the  infrastructure concept behind it at CeBIT 2015 .<\/p>\n<p>    Encryption is the most effective antidote to unwarranted, mass    surveillance of people, companies and authorities. Although    there are any number of computer programs designed to, say,    make e-mail communication more secure, most people find them to    be too much of a hassle. This is why the German government made    establishing universal and easy-to-use encryption part of its    Digital Agenda. A research team from the Fraunhofer Institute    for Secure Information Technology SIT in Darmstadt developed a    public encryption concept that factors in user friendliness    from the outset. The software automatically installs the    cryptographic keys in the right places on your computer. The    researchers are also working on an infrastructure that will be    available to everyone and is compatible with existing    encryption services.  <\/p>\n<p>    \"With this initiative and what it's developing, Fraunhofer is    supporting the German government's efforts to better protect    people and companies,\" says Prof. Michael Waidner, Head of    Fraunhofer SIT. This is why \"Volksverschlsselung\" is to be    made available as open-source software.  <\/p>\n<p>    Key allocation for beginners  <\/p>\n<p>    The software is the centerpiece of the solution. It relieves    the user of the previously difficult task of allocating keys by    recognizing which applications -- different e-mail programs,    for example -- on your computer, smartphone or tablet can use    cryptography and automatically allocates the right key to each    one. The software also generates cryptographic keys that can be    used to encrypt e-mails or files.  <\/p>\n<p>    If you want to send someone an encrypted e-mail, you need the    public key. In the \"Volksverschlsselung\" model, you can obtain    this from the central infrastructure. \"It works like a phone    book,\" says project manager Michael Herfert. \"Anyone can look    up and download public keys. The central infrastructure also    ensures that the keys actually belong to the person requesting    them and helps prevent identity fraud.\" At CeBIT 2015,    Fraunhofer researchers will demonstrate how people can register    using the eID function of the German identity card. Other ways    of registering are to be made possible in the future. To make    it possible for a vast number of people to use the    \"Volksverschlsselung\" infrastructure, it would ideally have to    be set up to handle several million keys. This calls for an    infrastructure that is as efficient as it is secure. The    current plan is to install the infrastructure on a    high-security server at the Fraunhofer Institute Center in    Birlinghoven near Bonn, and other trusted partners will also be    able to participate soon.  <\/p>\n<p>    Companies also stand to benefit from the results of the    \"Volksverschlsselung\" project -- especially from the software.    Solutions developed as part of the project could help small and    medium-sized enterprises in particular by making it easier for    them to implement encryption and thus better protect trade    secrets.  <\/p>\n<p>    The researchers will be presenting a prototype of the software    at CeBIT 2015 in Hannover from March 16 to 20. This version of    the software is designed for Windows desktop computers, but    further versions for other operating systems and mobile devices    are in the pipeline. The research team is also working on    various add-ons, including one that supports ad hoc encryption.  <\/p>\n<p>    Story Source:  <\/p>\n<p>    The above story is based on materials provided by    Fraunhofer-Gesellschaft.    Note: Materials may be edited for content and length.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.sciencedaily.com\/releases\/2015\/04\/150408090338.htm\/RK=0\/RS=a0ZiFKOP0YuzZYu4mGKZt84l9H4-\" title=\"Encryption for everyone\">Encryption for everyone<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30293","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30293"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30293"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30293\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}