Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard...

37
Why cryptography? Encrypted communication Hard disk encryption Summary Everyday Cryptography Michael F. Herbst [email protected] http://blog.mfhs.eu Interdisziplin¨ ares Zentrum f¨ ur wissenschaftliches Rechnen Ruprecht-Karls-Universit¨ at Heidelberg 24 November 2014 1 / 22

Transcript of Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard...

Page 1: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Everyday Cryptography

Michael F. [email protected]

http://blog.mfhs.eu

Interdisziplinares Zentrum fur wissenschaftliches RechnenRuprecht-Karls-Universitat Heidelberg

24 November 2014

1 / 22

Page 2: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Table of Contents

1 Why cryptography?Why even bother?

2 Encrypted communicationPGP and EmailInstant Messaging

3 Hard disk encryptionEncrypting your files

4 Summary

1 / 22

Page 3: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Table of Contents

1 Why cryptography?Why even bother?

2 Encrypted communicationPGP and EmailInstant Messaging

3 Hard disk encryptionEncrypting your files

4 Summary

2 / 22

Page 4: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Why even bother?

Why cryptography?

Global total surveillanceselector-based surveillance

⇒ Responsibility for people around us as wellPrivacy and confidentialityKeeping (company) secretsCryptonoise

3 / 22

Page 5: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Why even bother?

Why use free software?

Free Software0 Use the software as you wish1 Study the program in source and adapt it as you wish2 Redistribute copies to help your neighbour3 Distribute modified copies to help the whole community

Free Software has higher potential to be secureAll Software contains bugsBugs can be fixed by everyone for everyoneYou or person you trust can review source

⇒ Only free software is really trustworthy

4 / 22

Page 6: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Table of Contents

1 Why cryptography?Why even bother?

2 Encrypted communicationPGP and EmailInstant Messaging

3 Hard disk encryptionEncrypting your files

4 Summary

5 / 22

Page 7: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Unencrypted Emails

6 / 22

Page 8: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Unencrypted Emails

6 / 22

Page 9: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Unencrypted Emails

#$!? #$!?

6 / 22

Page 10: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Unencrypted Emails

#$!? #$!?

6 / 22

Page 11: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Unencrypted Emails

#$!? #$!?

6 / 22

Page 12: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Demo

DEMO

7 / 22

Page 13: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Using Transport Layer Security (TLS)

#$!? #$!?

8 / 22

Page 14: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Using Transport Layer Security (TLS)

#$!? #$!?

8 / 22

Page 15: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Using Transport Layer Security (TLS)

#$!? #$!?

8 / 22

Page 16: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Using Transport Layer Security (TLS)

#$!? #$!?

8 / 22

Page 17: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Using End2End encryption (e.g. Pretty Good Privacy)

#$!? #$!?

9 / 22

Page 18: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Asymmetric encryption (here: PGP)

A

Alice’s Public Key

A

Alice’s Private Key

A

Alice’s Private Key

A

Alice’s Public Key

Bob’s computer

Eve and the internet

#$!?

Alice’s computer

10 / 22

Page 19: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Asymmetric encryption (here: PGP)

A

Alice’s Public Key

A

Alice’s Private Key

Bob’s computer

Eve and the internet

#$!?

Alice’s computer

10 / 22

Page 20: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Asymmetric encryption (here: PGP)

A

Alice’s Public Key

A

Alice’s Private Key

Bob’s computer

Eve and the internet

#$!?

Alice’s computer

10 / 22

Page 21: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

Asymmetric encryption (here: PGP)

A

Alice’s Public Key

A

Alice’s Private Key

Bob’s computer

Eve and the internet

#$!?

Alice’s computer

10 / 22

Page 22: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

PGP and Email

What do you need?

ProgramsThunderbird and Enigmail (Windows, LinuX, OS X)GPGTools (OS X with Apple Mail)They all use: GnuPG

Linkshttps://www.mozilla.org/thunderbird/

https://www.enigmail.net

https://gpgtools.org/

https://www.gnupg.org/

11 / 22

Page 23: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Instant Messaging

Instant Messaging: Typical setup

Without any encryption

12 / 22

Page 24: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Instant Messaging

Instant Messaging: Typical setup

Without any encryption

With TLS encryption

12 / 22

Page 25: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Instant Messaging

Secure Instant Messaging

ProtocolAsymmetric encryptionOff-the-record (OTR) messaging — https://otr.cypherpunks.ca/

Works with many chat protocols and everyone who has pluginPerfect forward secrecyCan establish secret connection via passphrase and other channel

ProgramsMultiprotocol: Facebook chat, Google Talk, SIP, XMPP (Jabber),IRC, MSN, . . .Adium — https://www.adium.im/ (OS X)Pidgin — https://pidgin.im/ (Windows, LinuX)Jitsi — https://jit.si/ (Windows, LinuX, OS X)

13 / 22

Page 26: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Instant Messaging

Secure Video Chats

Jitsi (https://jit.si/) not only good for chattingOpen source Skype alternativeUses End2End encrypted video and audioRelatively new project (buggy, some pitfalls)Aims to be easy-to-use and secure-by-default

14 / 22

Page 27: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted
Page 28: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Table of Contents

1 Why cryptography?Why even bother?

2 Encrypted communicationPGP and EmailInstant Messaging

3 Hard disk encryptionEncrypting your files

4 Summary

15 / 22

Page 29: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Encrypting your files

Hardware vs. software encryption

Hardware encryption Crypto built-in to hard-drive / chipSoftware encryption Crypto realised by program running

Both can be totally transparent to userBoth can be attacked if physical accessAttacking hardware encryption a little easier(warm-replug-attacks)Hardware-encryption less portable

⇒ Software encryption almost always the better choice

Warm-replug-attackhttps://events.ccc.de/congress/2012/Fahrplan/events/5091.en.html

16 / 22

Page 30: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Encrypting your files

Software encryption software

LinuXdm-crypt and LUKS (package: cryptsetup)https://code.google.com/p/cryptsetup/

Transparent crypto layer

Windows and OS XTrueCrypt 7.1a (not the 7.2 Version)Important: Use this linkhttps://www.heise.de/download/truecrypt.html

(VeraCrypt — use with care)

17 / 22

Page 31: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Encrypting your files

Software encryption software

LinuXdm-crypt and LUKS (package: cryptsetup)https://code.google.com/p/cryptsetup/

Transparent crypto layer

Windows and OS XTrueCrypt 7.1a (not the 7.2 Version)Important: Use this linkhttps://www.heise.de/download/truecrypt.html

(VeraCrypt — use with care)

17 / 22

Page 32: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Table of Contents

1 Why cryptography?Why even bother?

2 Encrypted communicationPGP and EmailInstant Messaging

3 Hard disk encryptionEncrypting your files

4 Summary

18 / 22

Page 33: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Summary

By default everyday communication cannot be consideredsecure

Crytpographic alternatives exist

Setting up crypto initially is a barrier

Once it runs properly: Almost no extra effort needed

Regain privacy and trust

19 / 22

Page 34: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Need any help?

Go to a cryptopartye.g. http://cryptoparty-hd.deYou can give me your email and I’ll let you know when thenext one happens

...duh!

20 / 22

Page 35: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Images

From https://en.wikipedia.org/wiki/File:Asymmetric_cryptography_-_step_2.svg

From the Tango Icon Theme —http://tango.freedesktop.org

The rest is my own work or derived of one of the aboveAll released under CC by-sa 4.0

21 / 22

Page 36: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted

Why cryptography? Encrypted communication Hard disk encryption Summary

Links

https://jit.si/

https://www.enigmail.net

http://cryptoparty-hd.de

This presentation will soon be on http://blog.mfhs.eu

This work is licensed under a Creative CommonsAttribution-ShareAlike 4.0 International Licence.

22 / 22

Page 37: Everyday Cryptography - michael-herbst.com...2014/11/24  · PGP and Email Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1/22 Why cryptography? Encrypted