The document provides an introduction to encryption basics including symmetric and asymmetric encryption. It explains how symmetric encryption works with Alice and Bob sharing a password to encrypt and decrypt messages. It also explains how asymmetric encryption works with Alice using Bob's public key to encrypt a message that only Bob can decrypt with his private key. The document recommends tools for encrypting email, disks, and browsing privately including Thunderbird, TrueCrypt, and Tor. It discusses some challenges with encryption including managing keys and speeds with Tor. The overall purpose is to educate about the importance of encryption for privacy.
9. • Phonebook encryption
• Plaintext: S-E-C-R-E-T
• S = Jenny Smith 867-5309
• Cypher text then becomes 6 phone numbers
• To decrypt you would have to find each phone
number in the phone book
• Easy to make & Hard to solve
One Way Functions
42. • Walk you through creating a gpg key in wizard mode.
• Manage all your keys
• Encrypt and Decrypt mail Automagically
• Sign outgoing email with your public key
43. Web Based Email
Gmail and Yahoo and other web based email providers
don't support encryption and decryption natively.
44.
45. • The Onion Router
• “Tor directs Internet traffic through a free, worldwide
volunteer network consisting of more than three
thousand relays to conceal a user's location or usage
from anyone conducting network surveillance or
traffic analysis.” -Wikipedia
50. • Exit nodes can be monitored
• Can be hard to configure
• Speed
Problems With Tor
51. • Virtual Private Network
• Creates an encrypted point-to-point network
• Allows you to remotely access your local network
resources such as printers, servers, computers
VPN