| ==Phrack Magazine== | |
| Volume Four, Issue Forty-Two, File 11 of 14 | |
| ################################################### | |
| # The Paranoid Schizophrenics Guide to Encryption # | |
| # (or How to Avoid Getting Tapped and Raided) # | |
| ################################################### | |
| Written by The Racketeer of | |
| The /-/ellfire Club | |
| The purpose of this file is to explain the why and the how of Data | |
| Encryption, with a brief description of the future of computer security, | |
| TEMPEST. | |
| At the time of this issue's release, two of the more modern software | |
| packages use encryption methods covered in this article, so exercise some of | |
| your neurons and check into newer releases if they are available. Methods | |
| described in this file use PGP, covering an implementation of Phil Zimmermann's | |
| RSA variant, and the MDC and IDEA conventional encryption techniques by using | |
| PGP and HPACK. | |
| -------------------- | |
| WHY DATA ENCRYPTION? | |
| -------------------- | |
| This isn't exactly the typical topic discussed by me in Phrack. | |
| However, the importance of knowing encryption is necessary when dealing with | |
| any quasi-legal computer activity. I was planning on starting my series on | |
| hacking Novell Networks (so non-Internet users can have something to do), but | |
| recent events have caused me to change my mind and, instead of showing people | |
| how to get into more trouble (well, okay, there is plenty of that in this file | |
| too, since you're going to be working with contraband software), I've opted | |
| instead to show people how to protect themselves from the long arm of the Law. | |
| Why all this concern? | |
| Relatively recently, The Masters of Deception (MoD) were raided by | |
| various federal agencies and were accused of several crimes. The crimes they | |
| did commit will doubtlessly cause more mandates, making the already | |
| too-outrageous penalties even worse. | |
| "So?" you might ask. The MoD weren't exactly friends of mine. In fact, | |
| quite the contrary. But unlike many of the hackers whom I dealt with in the | |
| "final days" prior to their arrest, I bitterly protested any action against the | |
| MoD. Admittedly, I followed the episode from the beginning to the end, and the | |
| moral arguments were enough to rip the "Hacker World" to pieces. But these | |
| moral issues are done, the past behind most of us. It is now time to examine | |
| the aftermath of the bust. | |
| According to the officials in charge of the investigation against MoD | |
| members, telephone taps were used to gain evidence against members | |
| successfully. All data going in and out of their house was monitored and all | |
| voice communications were monitored, especially between members. | |
| So, how do you make a line secure? The party line answer is use of | |
| effective encryption methods. | |
| Federal investigative agencies are currently pushing for more | |
| technological research into the issue of computer security. All of the popular | |
| techniques which are being used by hackers today are being used by the | |
| government's R&D departments. | |
| Over the course of the last 5 years, I've watched as the U.S. | |
| Government went from a task force of nearly nil all the way to a powerful | |
| marauder. Their mission? Unclear. Regardless, the research being | |
| accomplished by federally-funded projects dealing with the issues of computer | |
| security are escalating. I've personally joined and examined many such | |
| conferences and have carefully examined the issues. Many of these issues will | |
| become future Phrack articles which I'll write. Others, such as limited-life | |
| semiconductors and deliberate telephone line noise sabotage caused by ACK | |
| packet detections in order to drive telecommunication costs higher, are sadly | |
| unpreventable problems of the future which won't be cured by simple awareness | |
| of the problem. | |
| They have different names -- Computer Emergency Response Team (CERT), | |
| Computer Assisted Security Investigative Analysis Tool (FBI's CASIAT), the | |
| Secret Service's Computer Fraud Division, or the National Computer Security | |
| Center (NSA's NCSC). Scores of other groups exist for every network, even | |
| every operating system. Their goal isn't necessarily to catch hackers; their | |
| goal is to acquire information about the act of hacking itself until it is no | |
| longer is a problem. Encryption stands in the way. | |
| Computer Security is literally so VAST a concept that, once a person | |
| awakens to low-level computer mechanics, it becomes nearly impossible to | |
| prevent that person from gaining unauthorized access to machines. This is | |
| somewhat contradictory to the "it's all social engineering" concept which we | |
| have been hearing about on Nightline and in the papers. If you can't snag them | |
| one way though, you can get them another -- the fact is that computers are | |
| still too damn vulnerable these days to traditional hacking techniques. | |
| Because of the ease of breaking through security, it becomes very | |
| difficult to actually create an effective way to protect yourself from any form | |
| of computer hacking. Look at piracy: they've tried every trick in the book to | |
| protect software and, so far, the only success they have had was writing | |
| software that sucked so much nobody wanted a copy. | |
| Furthermore, totally non-CPU related attacks are taking place. The | |
| passing of Anti-TEMPEST Protection Laws which prevent homes from owning | |
| computers that don't give off RF emissions has made it possible for any Joe | |
| with a few semesters of electrical engineering knowledge to rig together a | |
| device that can read what's on your computer monitor. | |
| Therefore: | |
| Q: How does a person protect their own computer from getting hacked? | |
| A: You pretty much can't. | |
| I've memorized so many ways to bypass computer security that I can | |
| rattle them off in pyramid levels. If a computer is not even connected to a | |
| network or phone line, people can watch every keystroke typed and everything | |
| displayed on the screen. | |
| Why aren't the Fedz using these techniques RIGHT NOW? | |
| I can't say they are not. However, a little research into TEMPEST | |
| technology resulted in a pretty blunt fact: | |
| There are too many computer components to scan accurately. Not the | |
| monitor, oh no! You're pretty much fucked there. But accessories for input | |
| and output, such as printers, sound cards, scanners, disk drives, and so | |
| forth...the possibility of parallel CPU TEMPEST technology exists, but there are | |
| more CPU types than any mobile unit could possibly use accurately. | |
| Keyboards are currently manufactured by IBM, Compaq, Dell, Northgate, | |
| Mitsuma (bleah), Fujitsu, Gateway, Focus, Chichony, Omni, Tandy, Apple, Sun, | |
| Packard-Bell (may they rot in hell), Next, Prime, Digital, Unisys, Sony, | |
| Hewlett-Packard, AT&T, and a scattering of hundreds of lesser companies. Each | |
| of these keyboards have custom models, programmable models, 100+ key and < 100 | |
| key models, different connectors, different interpreters, and different levels | |
| of cable shielding. | |
| For the IBM compatible alone, patents are owned on multiple keyboard | |
| pin connectors, such as those for OS/2 and Tandy, as well as the fact that the | |
| ISA chipsets are nearly as diverse as the hundreds of manufacturers of | |
| motherboards. Because of lowest-bid practices, there can be no certainty of | |
| any particular connection -- especially when you are trying to monitor a | |
| computer you've never actually seen! | |
| In short -- it costs too much for the TEMPEST device to be mobile and | |
| to be able to detect keystrokes from a "standard" keyboard, mostly because | |
| keyboards aren't "standard" enough! In fact, the only real standard which I | |
| can tell exists on regular computers is the fact that monitors still use good | |
| old CRT technology. | |
| Arguments against this include the fact that most of the available PC | |
| computers use standard DIN connectors which means that MOST of the keyboards | |
| could be examined. Furthermore, these keyboards are traditionally serial | |
| connections using highly vulnerable wire (see Appendix B). | |
| Once again, I raise the defense that keyboard cables are traditionally | |
| the most heavily shielded (mine is nearly 1/4 inch thick) and therefore falls | |
| back on the question of how accurate a TEMPEST device which is portable can be, | |
| and if it is cost effective enough to use against hackers. Further viewpoints | |
| and TEMPEST overview can be seen in Appendix B. | |
| As a result, we have opened up the possibility for protection from | |
| outside interference for our computer systems. Because any DECENT encryption | |
| program doesn't echo the password to your screen, a typical encryption program | |
| could provide reasonable security to your machine. How reasonable? | |
| If you have 9 pirated programs installed on your computer at a given | |
| time and you were raided by some law enforcement holes, you would not be | |
| labeled at a felon. Instead, it wouldn't even be worth their time to even raid | |
| you. If you have 9 pirated programs installed on your computer, had 200 | |
| pirated programs encrypted in a disk box, and you were raided, you would have | |
| to be charged with possession of 9 pirated programs (unless you did something | |
| stupid, like write "Pirated Ultima" or something on the label). | |
| We all suspected encryption was the right thing to do, but what about | |
| encryption itself? How secure IS encryption? | |
| If you think that the world of the Hackers is deeply shrouded with | |
| extreme prejudice, I bet you can't wait to talk with crypto-analysts. These | |
| people are traditionally the biggest bunch of holes I've ever laid eyes on. In | |
| their mind, people have been debating the concepts of encryption since the dawn | |
| of time, and if you come up with a totally new method of data encryption, -YOU | |
| ARE INSULTING EVERYONE WHO HAS EVER DONE ENCRYPTION-, mostly by saying "Oh, I | |
| just came up with this idea for an encryption which might be the best one yet" | |
| when people have dedicated all their lives to designing and breaking encryption | |
| techniques -- so what makes you think you're so fucking bright? | |
| Anyway, crypto-(anal)ysts tend to take most comments as veiled insults, | |
| and are easily terribly offended. Well, make no mistake, if I wanted to insult | |
| these people, I'd do it. I've already done it. I'll continue to do it. And I | |
| won't thinly veil it with good manners, either. | |
| The field of Crypto-analysis has traditionally had a mathematical | |
| emphasis. The Beal Cipher and the German Enigma Cipher are some of the more | |
| popular views of the field. Ever since World War 2, people have spent time | |
| researching how technology was going to affect the future of data encryption. | |
| If the United States went to war with some other country, they'd have a | |
| strong advantage if they knew the orders of the opposing side before they were | |
| carried out. Using spies and wire taps, they can gain encrypted data referred | |
| to as Ciphertext. They hand the information over to groups that deal with | |
| encryption such as the NSA and the CIA, and they attempt to decode the | |
| information before the encrypted information is too old to be of any use. | |
| The future of Computer Criminology rests in the same ways. The | |
| deadline on white collar crimes is defaulted to about 3-4 years, which is | |
| called the Statute of Limitations. Once a file is obtained which is encrypted, | |
| it becomes a task to decrypt it within the statute's time. | |
| As most crypto-analysts would agree, the cost in man-hours as well as | |
| supercomputer time would make it unfeasible to enforce brute force decryption | |
| techniques of random encryption methods. As a result of this, government | |
| regulation stepped in. | |
| The National Security Agency (referred to as "Spooks" by the relatively | |
| famous tormenter of KGB-paid-off hackers, Cliff Stoll, which is probably the | |
| only thing he's ever said which makes me think he could be a real human being) | |
| released the DES -- Data Encryption Standard. This encryption method was | |
| basically solid and took a long time to crack, which was also the Catch-22. | |
| DES wasn't uncrackable, it was just that it took "an unreasonable | |
| length of time to crack." The attack against the word "unreasonable" keeps | |
| getting stronger and stronger. While DES originated on Honeywell and DEC PDPs, | |
| it was rumored that they'd networked enough computers together to break a | |
| typical DES encrypted file. Now that we have better computers and the cost | |
| requirements for high-speed workstations are even less, I believe that even if | |
| they overestimated "unreasonable" a hundredfold, they'd be in the "reasonable" | |
| levels now. | |
| To explain how fast DES runs these days... | |
| I personally wrote a password cracker for DES which was arguably the | |
| very first true high-speed cracker. It used the German "Ultra-Fast Crypt" | |
| version of the DES algorithm, which happened to contain a static variable used | |
| to hold part of the previous attempt at encrypting the password, called the | |
| salt. By making sure the system wouldn't resalt on every password attempt, I | |
| was able to guess passwords out of a dictionary at the rate of 400+ words per | |
| second on a 386-25 (other methods at that time were going at about 30 per | |
| second). As I understand it now, levels at 500+ for the same CPU have been | |
| achieved. | |
| Now this means I can go through an entire dictionary in about five | |
| minutes on a DES-encrypted segment. The NSA has REAL cash and some of the | |
| finest mathematicians in the world, so if they wanted to gain some really | |
| decent speed on encryption, DES fits the ideal for parallel programming. | |
| Splitting a DES segment across a hundred CPUs, each relatively modern, they | |
| could crank out terraflops of speed. They'd probably be able to crack the code | |
| within a few days if they wanted to. | |
| Ten years from now, they could do it in a few seconds. | |
| Of course, the proper way to circumnavigate DES encryption is to locate | |
| and discover a more reliable, less popular method. Because the U.S. Government | |
| regulates it, it doesn't mean it's the best. In fact, it means it's the | |
| fucking lamest thing they could sweeten up and hope the public swallows it! | |
| The last attempt the NSA made at regulating a standard dealing with encryption, | |
| they got roasted. | |
| I'm somewhat convinced that the NSA is against personal security, and | |
| from all the press they give, they don't WANT anyone to have personal security. | |
| Neither does the Media for that matter. | |
| Because of lamers in the "Biblical Injustice Grievance Group of | |
| Opposing Terrible Sacrilege" (or BIGGOTS) who think that if you violate a LAW | |
| you're going to Hell (see APPENDIX C for my viewpoint of these people) and who | |
| will have convinced Congress to pass ease-of-use wire taps on telephone lines | |
| and networks so that they can monitor casual connections without search | |
| warrants, encryption will be mandatory if you want any privacy at all. | |
| And to quote Phil Zimmermann, "If privacy is outlawed, only the | |
| outlaws will have privacy." | |
| Therefore, encryption methods that we must use should be gathered into | |
| very solid categories which do NOT have endorsement of the NSA and also have | |
| usefulness in technique. | |
| HOW TO USE DECENT ENCRYPTION: | |
| (First, go to APPENDIX D, and get yourself a copy of PGP, latest version.) | |
| First of all, PGP is contraband software, presumably illegal to use in | |
| the United States because of a patent infringement it allegedly carries. The | |
| patent infringement is the usage of a variant of the RSA encryption algorithm. | |
| Can you patent an algorithm? By definition, you cannot patent an idea, just a | |
| product -- like source code. Yet, the patent exists to be true until proven | |
| false. More examples of how people in the crypto-analyst field can be assholes. | |
| Anyway, Phil's Pretty Good Software, creators of PGP, were sued and all | |
| rights to PGP were forfeited in the United States of America. Here comes the | |
| violation of the SECOND law, illegal exportation of a data encryption outside | |
| of the United States of America. Phil distributed his encryption techniques | |
| outside the USA, which is against the law as well. Even though Mr. Zimmermann | |
| doesn't do any work with PGP, because he freely gave his source code to others, | |
| people in countries besides the United States are constantly updating and | |
| improving the PGP package. | |
| PGP handles two very important methods of encryption -- conventional | |
| and public key. These are both very important to understand because they | |
| protect against completely different things. | |
| ----------------------- | |
| CONVENTIONAL ENCRYPTION | |
| ----------------------- | |
| Conventional encryption techniques are easiest to understand. You | |
| supply a password and the password you enter encrypts a file or some other sort | |
| of data. By re-entering the password, it allows you to recreate the original | |
| data. | |
| Simple enough concept, just don't give the password to someone you | |
| don't trust. If you give the password to the wrong person, your whole business | |
| is in jeopardy. Of course, that goes with just about anything you consider | |
| important. | |
| There are doubtlessly many "secure enough" ciphers which exist right | |
| now. Unfortunately, the availability of these methods are somewhat slim | |
| because of exportation laws. The "major" encryption programs which I believe | |
| are worth talking about here are maintained by people foreign to the USA. | |
| The two methods of "conventional" encryption are at least not DES, | |
| which qualifies them as okay in my book. This doesn't mean they are impossible | |
| to break, but they don't have certain DES limitations which I know exist, such | |
| as 8 character password maximum. The methods are: MDC, as available in the | |
| package HPACK; and IDEA, as available in Pretty Good Privacy. | |
| Once you've installed PGP, we can start by practicing encrypting | |
| some typical files on your PC. To conventionally encrypt your AUTOEXEC.BAT | |
| file (it won't delete the file after encryption), use the following command: | |
| C:\> pgp -c autoexec.bat | |
| Pretty Good Privacy 2.1 - Public-key encryption for the masses. | |
| (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92 | |
| Date: 1993/01/19 03:06 GMT | |
| You need a pass phrase to encrypt the file. | |
| Enter pass phrase: { Password not echoed } | |
| Enter same pass phrase again: Just a moment.... | |
| Ciphertext file: autoexec.pgp | |
| C:\> dir | |
| Volume in drive C is RACK'S | |
| Directory of c:\autoexec.pgp | |
| autoexec.pgp 330 1-18-93 21:05 | |
| 330 bytes in 1 file(s) 8,192 bytes allocated | |
| 52,527,104 bytes free | |
| PGP will compress the file before encrypting it. I'd say this is a | |
| vulnerability to the encryption on the basis that the file contains a ZIP file | |
| signature which could conceivably make the overall encryption less secure. | |
| Although no reports have been made of someone breaking PGP this way, I'd feel | |
| more comfortable with the ZIP features turned off. This is somewhat contrary | |
| to the fact that redundancy checking is another way of breaking ciphertext. | |
| However, it isn't as reliable as checking a ZIP signature. | |
| Although PGP will doubtlessly become the more popular of the two | |
| programs, HPACK's encryption "strength" is that by being less popular, it will | |
| probably not be as heavily researched as PGP's methods will be. Of course, by | |
| following PGP, new methods of encryption will doubtlessly be added as the | |
| program is improved. | |
| Here is how you'd go about encrypting an entire file using the HPACK | |
| program using the MDC "conventional" encryption: | |
| C:\> hpack A -C secret.hpk secret.txt | |
| HPACK - The multi-system archiver Version 0.78a0 (shareware version) | |
| For Amiga, Archimedes, Macintosh, MSDOS, OS/2, and UNIX | |
| Copyright (c) Peter Gutmann 1989 - 1992. Release date: 1 Sept 1992 | |
| Archive is 'SECRET.HPK' | |
| Please enter password (8..80 characters): | |
| Reenter password to confirm: | |
| Adding SECRET .TXT | |
| Done | |
| Anyway, I don't personally think HPACK will ever become truly popular | |
| for any reason besides its encryption capabilities. ZIP has been ported to an | |
| amazing number of platforms, in which lies ZIP's encryption weakness. If you | |
| think ZIP is safe, remember that you need to prevent the possibility of four | |
| years of attempted password cracking in order to beat the Statutes of | |
| Limitations: | |
| Here is the introduction to ZIPCRACK, and what it had to say about how | |
| easy it is to break through this barrier: | |
| (Taken from ZIPCRACK.DOC) | |
| ----- | |
| ZIPCRACK is a program designed to demonstrate how easy it is to find | |
| passwords on files created with PKZIP. The approach used is a fast, | |
| brute-force attack, capable of scanning thousands of passwords per second | |
| (5-6000 on an 80386-33). While there is currently no known way to decrypt | |
| PKZIP's files without first locating the correct password, the probability that | |
| a particular ZIP's password can be found in a billion-word search (which takes | |
| about a day on a fast '486) is high enough that anyone using the encryption | |
| included in PKZIP 1.10 should be cautious (note: as of this writing, PKZIP | |
| version 2.00 has not been released, so it is not yet known whether future | |
| versions of PKZIP will use an improved encryption algorithm). The author's | |
| primary purpose in releasing this program is to encourage improvements in ZIP | |
| security. The intended goal is NOT to make it easy for every computer user to | |
| break into any ZIP, so no effort has been made to make the program | |
| user-friendly. | |
| ----- End Blurb | |
| Likewise, WordPerfect is even more vulnerable. I've caught a copy of | |
| WordPerfect Crack out on the Internet and here is what it has to say about | |
| WordPerfect's impossible-to-break methods: | |
| (Taken from WPCRACK.DOC:) | |
| ----- | |
| WordPerfect's manual claims that "You can protect or lock your documents with a | |
| password so that no one will be able to retrieve or print the file without | |
| knowing the password - not even you," and "If you forget the password, there is | |
| absolutely no way to retrieve the document." [1] | |
| Pretty impressive! Actually, you could crack the password of a Word Perfect | |
| 5.x file on a 8 1/2" x 11" sheet of paper, it's so simple. If you are counting | |
| on your files being safe, they are NOT. Bennet [2] originally discovered how | |
| the file was encrypted, and Bergen and Caelli [3] determined further | |
| information regarding version 5.x. I have taken these papers, extended them, | |
| and written some programs to extract the password from the file. | |
| ----- End Blurb | |
| --------------------- | |
| PUBLIC KEY ENCRYPTION | |
| --------------------- | |
| Back to the Masters of Deception analogy -- they were telephone | |
| tapped. Conventional encryption is good for home use, because only one person | |
| could possibly know the password. But what happens when you want to transmit | |
| the encrypted data by telephone? If the Secret Service is listening in on your | |
| phone calls, you can't tell the password to the person that you want to send | |
| the encrypted information to. The SS will grab the password every single time. | |
| Enter Public-Key encryption! The concepts behind Public-Key are very | |
| in-depth compared to conventional encryption. The idea here is that passwords | |
| are not exchanged; instead a "key" which tells HOW to encrypt the file for the | |
| other person is given to them. This is called the Public Key. | |
| You retain the PRIVATE key and the PASSWORD. They tell you how to | |
| decrypt the file that someone sent you. There is no "straight" path between | |
| the Public Key and the Private Key, so just because someone HAS the public key, | |
| it doesn't mean they can produce either your Secret Key or Password. All it | |
| means is that if they encrypt the file using the Public Key, you will be able | |
| to decrypt it. Furthermore, because of one-way encryption methods, the output | |
| your Public Key produces is original each time, and therefore, you can't | |
| decrypt the information you encrypted with the Public Key -- even if you | |
| encrypted it yourself! | |
| Therefore, you can freely give out your own Public Key to anyone you | |
| want, and any information you receive, tapped or not, won't make a difference. | |
| As a result, you can trade anything you want and not worry about telephone | |
| taps! This technique supposedly is being used to defend the United States' | |
| Nuclear Arsenal, if you disbelieve this is secure. | |
| I've actually talked with some of the makers of the RSA "Public-Key" | |
| algorithm, and, albeit they are quite brilliant individuals, I'm somewhat | |
| miffed at their lack of enthusiasm for aiding the public in getting a hold of | |
| tools to use Public Key. As a result, they are about to get railroaded by | |
| people choosing to use PGP in preference to squat. | |
| Okay, maybe they don't have "squat" available. In fact, they have a | |
| totally free package with source code available to the USA public (no | |
| exportation of code) which people can use called RSAREF. Appendix E explains | |
| more about why I'm not suggesting you use this package, and also how to obtain | |
| it so you can see for yourself. | |
| Now that we know the basic concepts of Public-Key, let's go ahead and | |
| create the basics for effective tap-proof communications. | |
| Generation of your own secret key (comments in {}s): | |
| C:\> pgp -kg { Command used to activate PGP for key generation } | |
| Pretty Good Privacy 2.1 - Public-key encryption for the masses. | |
| (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92 | |
| Date: 1993/01/18 19:53 GMT | |
| Pick your RSA key size: | |
| 1) 384 bits- Casual grade, fast but less secure | |
| 2) 512 bits- Commercial grade, medium speed, good security | |
| 3) 1024 bits- Military grade, very slow, highest security | |
| Choose 1, 2, or 3, or enter desired number of bits: 3 {DAMN STRAIGHT MILITARY} | |
| Generating an RSA key with a 1024-bit modulus... | |
| You need a user ID for your public key. The desired form for this | |
| user ID is your name, followed by your E-mail address enclosed in | |
| <angle brackets>, if you have an E-mail address. | |
| For example: John Q. Smith <12345.6789@compuserve.com> | |
| Enter a user ID for your public key: | |
| The Racketeer <rack@lycaeum.hfc.com> | |
| You need a pass phrase to protect your RSA secret key. | |
| Your pass phrase can be any sentence or phrase and may have many | |
| words, spaces, punctuation, or any other printable characters. | |
| Enter pass phrase: { Not echoed to screen } | |
| Enter same pass phrase again: { " " " " } | |
| Note that key generation is a VERY lengthy process. | |
| We need to generate 105 random bytes. This is done by measuring the | |
| time intervals between your keystrokes. Please enter some text on your | |
| keyboard, at least 210 nonrepeating keystrokes, until you hear the beep: | |
| 1 .* { decrements } | |
| -Enough, thank you. | |
| ...................................................++++ ........++++ | |
| Key generation completed. | |
| It took a 33-386DX a grand total of about 10 minutes to make the key. | |
| Now that it has been generated, it has been placed in your key ring. We can | |
| examine the key ring using the following command: | |
| C:\> pgp -kv | |
| Pretty Good Privacy 2.1 - Public-key encryption for the masses. | |
| (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92 | |
| Date: 1993/01/18 20:19 GMT | |
| Key ring: 'c:\pgp\pubring.pgp' | |
| Type bits/keyID Date User ID | |
| pub 1024/7C8C3D 1993/01/18 The Racketeer <rack@lycaeum.hfc.com> | |
| 1 key(s) examined. | |
| We've now got a viable keyring with your own keys. Now, you need to | |
| extract your Public Key so that you can have other people encrypt shit and have | |
| it sent to you. In order to do this, you need to be able to mail it to them. | |
| Therefore, you need to extract it in ASCII format. This is done by the | |
| following: | |
| C:\> pgp -kxa "The Racketeer <rack@lycaeum.hfc.com>" | |
| Pretty Good Privacy 2.1 - Public-key encryption for the masses | |
| (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92 | |
| Date: 1993/01/18 20:56 GMT | |
| Extracting from key ring: 'c:\pgp\pubring.pgp', userid "The Racketeer | |
| <rack@lycaeum.hfc.com>". | |
| Key for user ID: The Racketeer <rack@lycaeum.hfc.com> | |
| 1024-bit key, Key ID 0C975F, created 1993/01/18 | |
| Extract the above key into which file? rackkey | |
| Transport armor file: rackkey.asc | |
| Key extracted to file 'rackkey.asc'. | |
| Done. The end result of the key is a file which contains: | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.1 | |
| mQCNAisuyi4AAAEEAN+cY6nUU+VIhYOqBfcc12rEMph+A7iadUi8xQJ00ANvp/iF | |
| +ugZ+GP2ZnzA0fob9cG/MVbh+iiz3g+nbS+ZljD2uK4VyxZfu5alsbCBFbJ6Oa8K | |
| /c/e19lzaksSlTcqTMQEae60JUkrHWpnxQMM3IqSnh3D+SbsmLBs4pFrfIw9AAUR | |
| tCRUaGUgUmFja2V0ZWVyIDxyYWNrQGx5Y2FldW0uaGZjLmNvbT4= | |
| =6rFE | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| This can be tagged to the bottom of whatever E-Mail message you want to | |
| send or whatever. This key can added to someone else's public key ring and | |
| thereby used to encrypt information so that it can be sent to you. Most people | |
| who use this on USENET add it onto their signature files so that it is | |
| automatically posted on their messages. | |
| Let's assume someone else wanted to communicate with you. As a result, | |
| they sent you their own Public Key: | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.1 | |
| mQA9AitgcOsAAAEBgMlGLWl8rub0Ulzv3wpxI5OFLRkx3UcGCGsi/y/Qg7nR8dwI | |
| owUy65l9XZsp0MUnFQAFEbQlT25lIER1bWIgUHVkIDwxRHVtUHVkQG1haWxydXMu | |
| Yml0bmV0Pg== | |
| =FZBm | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| Notice this guy, Mr. One Dumb Pud, used a smaller key size than you | |
| did. This shouldn't make any difference because PGP detects this | |
| automatically. Let's now add the schlep onto your key ring. | |
| C:\> pgp -ka dumbpud.asc | |
| Pretty Good Privacy 2.1 - Public-key encryption for the masses. | |
| (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92 | |
| Date: 1993/01/22 22:17 GMT | |
| Key ring: 'c:\pgp\pubring.$01' | |
| Type bits/keyID Date User ID | |
| pub 384/C52715 1993/01/22 One Dumb Pud <1DumPud@mailrus.bitnet> | |
| New key ID: C52715 | |
| Keyfile contains: | |
| 1 new key(s) | |
| Adding key ID C52715 from file 'dumbpud.asc' to key ring 'c:\pgp\pubring.pgp'. | |
| Key for user ID: One Dumb Pud <1DumPud@mailrus.bitnet> | |
| 384-bit key, Key ID C52715, crated 1993/01/22 | |
| This key/userID associate is not certified. | |
| Do you want to certify this key yourself (y/N)? n {We'll deal with this later} | |
| Okay, now we have the guy on our key ring. Let's go ahead and encrypt | |
| a file for the guy. How about having the honor of an unedited copy of this | |
| file? | |
| C:\> pgp -e encrypt One {PGP has automatic name completion} | |
| Pretty Good Privacy 2.1 - Public-key encryption for the masses. | |
| (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92 | |
| Date: 1993/01/22 22:24 GMT | |
| Recipient's public key will be used to encrypt. | |
| Key for user ID: One Dumb Pud <1DumPud@mailrus.bitnet> | |
| 384-bit key, Key ID C52715, created 1993/01/22 | |
| WARNING: Because this public key is not certified with a trusted | |
| signature, it is not known with high confidence that this public key | |
| actually belongs to: "One Dumb Pud <1DumPud@mailrus.bitnet>". | |
| Are you sure you want to use this public key (y/N)? y | |
| ------------------------------------------------------------------------------ | |