background preloader

Cryptography

Facebook Twitter

Thunderbird & OpenPGP - secure email. Once you have generated your GnuPG key pair and configured your email account to work with Enigmail, you can view and manage the properties of your key pair by following the steps below.

Thunderbird & OpenPGP - secure email

Step 1. Click and select [Enigmail > Key Management]. Figure 1: Opening Enigmail's Key Management screen This will activate your Enigmail Key Management screen. Figure 2: Enigmail's Key Management screen Step 2. Figure 3: Key pair properties The Key Properties window displays important information about your GnuPG key pair: Sending encrypted emails using Thunderbird and PGP. Use an email client, not webmail One way of enhancing the confidentiality of your email is to use an application to send and receive email, such as Thunderbird.

Sending encrypted emails using Thunderbird and PGP

One of the most important security factors when you send emails is the method you use to log into your email provider. Thunderbird allows you to control how you log in. Whenever possible, you should use an SSL (Secure Sockets Layer) or TLS (Transport Layer Security) connection. These protocols protect your email password from possible interception by any third-party software installed on your system or at any point between Thunderbird and your email server. How to use PGP encryption with Thunderbird. In my last article, we have learnt that how to encrypt our Emails using Gnu Privacy Guard.

How to use PGP encryption with Thunderbird

Previously we used Microsoft Outlook as a desktop mail client and a GpgOL plugin to handle encryption decryption of our communication. Since Microsoft is a US-based company, that has to follow all the laws of that contingent. Should we trust Microsoft product to save our e-mail password and data? Obviously NO! This made me write a new article on the same topic is that today we are going to use an open source mail client i.e. Thunderbird Installation: Initially you need to download the Thunderbird mail client, and install it to make your email communication more secure and private. Open Thunderbird tool and configure your mail account, as shown: Installing and Configuring ENIGMAIL: In the next step you need to install an Add-on in Thunderbird, called ENIGMAIL. Enigmail is an easy to use and handy tool for key management. Open Crypto Audit Project.

HTTP tunnel. The HTTP stream with its covert channel is termed an HTTP tunnel.

HTTP tunnel

HTTP tunnel software consists of client-server HTTP tunneling applications that integrate with existing application software, permitting them to be used in conditions of restricted network connectivity including firewalled networks, networks behind proxy servers, and network address translation. Usage[edit] Mechanism[edit] The mediater server unwraps the actual data before forwarding it to the remote host in question. Symmetrically, when it receives data from the remote host, it wraps it in the HTTP protocol before sending it as part of an HTTP response to the application. In this situation, the application plays the role of a tunneling client, while the remote host plays the role of the server being communicated with. HTTP CONNECT tunneling[edit] A variation of HTTP tunneling when behind an HTTP Proxy Server is to use the "CONNECT" HTTP method.[1] HTTP tunneling without using CONNECT[edit] HTTP tunnel clients[edit] Geek to Live: Encrypt your web browsing session (with an SSH SOCKS proxy)

File Encryption Software - TopTenREVIEWS. Five Best File Encryption Tools. How cryptography is a key weapon in the fight against empire states. The original cypherpunks were mostly Californian libertarians.

How cryptography is a key weapon in the fight against empire states

I was from a different tradition but we all sought to protect individual freedom from state tyranny. Cryptography was our secret weapon. It has been forgotten how subversive this was. Cryptography was then the exclusive property of states, for use in their various wars. By writing our own software and disseminating it far and wide we liberated cryptography, democratised it and spread it through the frontiers of the new internet. The resulting crackdown, under various "arms trafficking" laws, failed. Our work in WikiLeaks imparts a keen understanding of the dynamics of the international order and the logic of empire. The struggle for Latin American self-determination is important for many more people than live in Latin America, because it shows the rest of the world that it can be done.

Handbook of Applied Cryptography. Alfred J.

Handbook of Applied Cryptography

Menezes, CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages Fifth Printing (August 2001) The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number. You can order the handbook today from any one of these online bookstores: Amazon Books (amazon.com) (Price as of May 9, 2016: US $84.10). Amazon.ca (for Canadian orders) (Price as of May 9, 2016: Cdn $118.22). An Overview of Cryptography. 1.

An Overview of Cryptography

INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. What is a Digital Signature? Bob has been given two keys.

What is a Digital Signature?

Cryptography steganography resources and challenges. Encryption. Visual Cryptography - StumbleUpon. What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used.

Visual Cryptography - StumbleUpon

The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information.