ECE 646 Fall Lab 1: Pretty Good Privacy Setup

Size: px
Start display at page:

Download "ECE 646 Fall Lab 1: Pretty Good Privacy Setup"

Transcription

1 ECE 646 Fall 2017 Lab 1: Pretty Good Privacy Setup This setup should be completed before the lecture on Tuesday, October 3. Please read the general information about GNU Privacy Guard from Wikipedia available at

2 PART I 1. INTRODUCTION GNU Privacy Guard (GnuPG or GPG) is a free software package functionally equivalent to PGP (Pretty Good Privacy). A basic GnuPG program has a command line interface, and is available for use with multiple operating systems. For several major operating systems, there exist one or more front-ends for GnuPG that enhance it with a Graphical User Interface (GUI). You are allowed to use any of the following versions of GPG in this class: Windows Users: Gpg4win v full version (Released: ) available at Linux Users: Version compatible with your version of Linux. Please see an example in Section INSTALLATION Download one of the aforementioned versions of GPG to your laptop or desktop at home. Windows Users: During the installation, add GPA as an additional component to install (on top of the components selected by default, such as GnuPG, Kleopatra, GpgOL, GpgEX, and Gpg4win Compendium). You will be asked a few straightforward questions. The default answers would be perfectly fine. Small changes (based on your personal preferences) are permitted as well. Linux Users (instructions tested using Linux Ubuntu LTS): The gnupg package is installed by default. However, you may need to install the GUI front-end. Here is brief description on the installation of GPA and Kleopatra front-ends. Once installed, the GUIs will look like Windows versions of the two front-ends. In order to install GPA, run the following commands: sudo apt-get install libpng16-16 sudo apt-get install gpa

3 In order to install Kleopatra, run the following command: sudo apt-get install kleopatra Download the installer by clicking the Download GPG Suite. To install, double-click on the icon of the downloaded file and follow the installation wizard. 3. KEY GENERATION First, you need to have an account provided by any of the free services, such as Gmail, Yahoo!, Hotmail, etc. YOU ARE NOT ALLOWED TO USE YOUR GMU ACCOUNT FOR THIS LAB!!! If you do not have such an account yet (or other students may be familiar with your current non-gmu account), please create a new account just for the purpose of this lab. Additionally, in order to impersonate other students taking this class with you, please create fake accounts of 3 students arbitrarily selected from the class list. These accounts will be fully controlled by you, but their IDs should suggest that they belong to a person you have chosen from the class list. For example, if the name of the student you are trying to impersonate is John Smith, you can create an account called: jsmith92@gmail.com. Using the program, generate new private-public key pairs for: Yourself (even if you have a long-term PGP key you have generated before), and students you will try to impersonate. Associate these keys with an appropriate full name and address. Hints: Generating key pairs may take a few seconds and even minutes. To speed up the process, you may move around the mouse or type randomly on the keyboard. This is because random number generation is needed for key generation. As an expiration date select a date two months after the key creation date (this will help us to invalidate all fake keys after this lab exercise is over). You will be asked to enter a passphrase used to protect access to your private key stored on a hard drive of your computer. This passphrase should be easy to memorize by you, but hard to guess by others. You can use the same passphrase for all keys you generate. Please note that if you forget your passphrase, you will need to repeat the entire key distribution process (including all tasks performed in class, described in Section 5) again, which may substantially delay your progress with this lab! It happened in this class many times before. Don t let it happen to you. After your keys are generated, their basic characteristics (User Name, Key ID, Expiry date, etc.) will appear in the GUI interface.

4 You also will have an option of displaying additional details, such as Fingerprint, Key type, etc. by clicking on a key line in GPA or GPG Keychain, or by choosing a given line, right-clicking, and selecting Certificate Details in Kleopatra. Windows & Linux Users: If you use GPA (recommended), please enable Use Advanced Mode in Edit => Preferences. Then, choose Keyring => Keys => New key As an Algorithm, choose RSA or DSA. As a key size, choose 2048 or 3072 bits. If you use Kleopatra, please choose File => New Certificate => Create a personal OpenPGP key pair. After providing Name and , choose Advanced Settings. Choose RSA+RSA (meaning, RSA for signing and RSA for encryption) or DSA+Elgamal (meaning, DSA for signing and Elgamal for encryption). As a key size, choose 2048, 3072, or 4096 bits. Mark the Certificate Usage for Signing and Encryption. Mark Valid until, and set an expiration date to the date two months after the key creation date. Start the GPG Keychain app. Generate your key pair by clicking New in the tool bar. This will open a window and you need to enter the name of key owner, address and passphrase. There are more options under Advanced Options in the same window. Please set the Key type to RSA and RSA (default, meaning, RSA for signing and RSA for encryption) or DSA and Elgamal (meaning, DSA for signing and Elgamal for encryption). Set Length to 2048, 3072 (available for both aforementioned key types), or 4096 bits (available for RSA and RSA only). Then click Generate Key. 4. PUBLIC KEY CARD Using an arbitrary editor, please prepare and print your public key card containing the following information copied from the GUI of GPA, Kleopatra, or GPG Keychain: Your Name address: should be same as the one used to generate your public and private key (non-gmu address) Key ID Fingerprint. Please note that you do not need to prepare public key cards for any fake users, for which you have created public-private key pairs. No photo needs to be included as a part of the card. If you have problems with the access to a printer, the handwritten version of your card would be satisfactory as well.

5 5. KEY DISTRIBUTION: KEY EXCHANGE IN CLASS Bring four identical copies of your public key card, along with your GMU ID to the lecture on Tuesday, October 3. Submit one copy to the instructor. Show your GMU ID before the submission. Exchange public key cards with three of your classmates (preferably one friend and two strangers ). If you do not know their names, ask them to show you their GMU IDs. The group of three classmates you exchange the public key cards with is your DIRECT TRUST GROUP. AVOID FORMING CLOSED GROUPS OF 3 OR 4 STUDENTS WHO ALL EXCHANGE PUBLIC KEY CARDS AMONG ONE ANOTHER 6. DOCUMENTATION AND TESTING Please use the remaining time before the exchange of keys in class to get familiar with the program documentation, FAQs, and the meaning of all options of the menu. In particular consider getting familiar with the following resources: The Gpg4win Compendium (EN English version): HTML version: PDF version:

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

Lab: Securing with PGP

Lab: Securing  with PGP Objectives Understand the concept of public keys, signing, and encrypting email with PGP. Background GNUPG (or GNU Privacy guard) is a free implementation of the OpenPGP standard (RFC 4880) as a tool for

More information

LAB :: PGP (Pretty Good Privacy)

LAB :: PGP (Pretty Good Privacy) LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation

More information

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management

More information

Due: October 8, 2013: 7.30 PM

Due: October 8, 2013: 7.30 PM Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)

More information

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India Email Security PGP / Pretty Good Privacy SANOGXXX 10-18 July, 2017 Gurgaon, Haryana, India Issue Date: [31-12-2015] Revision: [V.1] Security issues for E-mail Confidentiality Network admin can read your

More information

Cryptography: Practice JMU Cyber Defense Boot Camp

Cryptography: Practice JMU Cyber Defense Boot Camp Cryptography: Practice 2013 JMU Cyber Defense Boot Camp Prerequisites This unit assumes that you have already known Symmetric-key encryption Public-key encryption Digital signature Digital certificates

More information

Learn PGP. SIPB Cluedump, 19 October Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22

Learn PGP. SIPB Cluedump, 19 October Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22 Learn PGP SIPB Cluedump, 19 October 2016 Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22 2 / 22 Overview 1. Theore cal PGP / Intro to Security 2. Prac cal PGP Installa on, Usage, Demo

More information

FRCC Secure Data Transfer. Users Guide V1.5

FRCC Secure Data Transfer. Users Guide V1.5 FRCC Secure Data Transfer Users Guide V1.5 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public

More information

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret

More information

An Introduction to How PGP Works

An Introduction to How PGP Works An Introduction to How PGP Works Revision: 0.01 Author: Kenneth Robert Ballou Date 2005-07-21 Document Change History Change Description/Reason Changed By Date Revision Initial Creation of Document Kenneth

More information

Mailvelope for Encryption

Mailvelope for  Encryption Mailvelope for Email Encryption Steve Revilak https://masspirates.org/blog/category/cryptoparty/ Cryptoparty @ Somerville Public Library July 15, 2016 1 / 15 What is Mailvelope Mailvelope is a browser

More information

Oracle Communications Network Charging and Control. Voucher Print Shop Operations Guide Release 6.0.1

Oracle Communications Network Charging and Control. Voucher Print Shop Operations Guide Release 6.0.1 Oracle Communications Network Charging and Control Voucher Print Shop Operations Guide Release 6.0.1 April 2017 Copyright Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software

More information

Secure Client & Third Party FAQs

Secure  Client & Third Party FAQs Secure E-mail Client & Third Party FAQs 1 P age Table of Contents Secure E-Mail Overview... 3 Options for viewing secure e-mail... 3 Delivery Option Decision Tree... 4 Before you start using Secure E-mail...

More information

Linux Connection Guide

Linux Connection Guide Linux Connection Guide .CIM Accessibility Linux.CIM is our Linux Terminal Server used by the students of Computer Science, Information Security and Mathematics. It is accessible 24-hours a day from both

More information

gpg4o Manual Version 5.0

gpg4o Manual Version 5.0 gpg4o Manual Version 5.0 Table of Contents Table of Contents 1 General 4 2 System Requirements 5 3 Functional Range 6 3.1 Versions Functional Range Comparison..................... 6 3.2 PGP/Inline and

More information

Technology for ESOL Part 1: Computer Basics and Operating System

Technology for ESOL Part 1: Computer Basics and Operating System Technology for ESOL Part 1: Computer Basics and Operating System Use these handouts while you go through the self-paced presentation. If you need help ask the Language Lab staff to assist you. Use the

More information

Getting Started Keybox Management

Getting Started Keybox Management Integration Console Getting Started Keybox Management version 0.6 Contents Welcome 3 Contact us 3 Getting Started 6 Create a Google Account 6 Requirements 6 Register your Google Account 6 Log into Integration

More information

Cryptography. Cryptography is everywhere. German Lorenz cipher machine

Cryptography. Cryptography is everywhere. German Lorenz cipher machine Crypto 101 Cryptography Cryptography is everywhere German Lorenz cipher machine 2 Cryptography Cryptography deals with creating documents that can be shared secretly over public communication channels

More information

PGP Key Verification. Version 1.1, 08/26/2002. Stephen Gill Published: 08/26/2002

PGP Key Verification. Version 1.1, 08/26/2002. Stephen Gill   Published: 08/26/2002 PGP Key Verification Version 1.1, 08/26/2002 Stephen Gill E-mail: gillsr@cymru.com Published: 08/26/2002 Contents Credits Introduction... 2 Instructions... 2 Step 1: Retrieve... 3 Step 2: Fingerprint...

More information

INFORMATION SECURITY - PRACTICAL ASSESSMENT - TP3 - CRYPTOGRAPHY AND APPLICATIONS. GRENOBLE INP ENSIMAG

INFORMATION SECURITY - PRACTICAL ASSESSMENT - TP3 - CRYPTOGRAPHY AND APPLICATIONS. GRENOBLE INP ENSIMAG INFORMATION SECURITY - PRACTICAL ASSESSMENT - TP3 - CRYPTOGRAPHY AND APPLICATIONS GRENOBLE INP ENSIMAG http://www.ensimag.fr COMPUTER SCIENCE 3RD YEAR SIF-LOAD - 1ST SEMESTER, 2011 Lecturers: Fabien Duchene

More information

Public Key Infrastructures

Public Key Infrastructures Public Key Infrastructures Trust Models Cryptography and Computer Algebra Prof. Johannes Buchmann Dr. Johannes Braun We trust certificates because we trust the system(s). Direct trust Web of trust Hierarchical

More information

Installing VMware Player to Run Ubuntu Linux on a Windows Machine

Installing VMware Player to Run Ubuntu Linux on a Windows Machine Installing VMware Player to Run Ubuntu Linux on a Windows Machine Check that you are connected to the internet before beginning (open Internet Explorer or Firefox or similar). Installing VMware Player

More information

Lab: PGP Encryption First download the PGP software from: http://www.dcs.napier.ac.uk/~bill/zips/pgpcmdln_6.5.8_win32_fw.zip Unzip it, and install it to the system. Objectives Activity 1. Generate public

More information

CLIENT DATABASE SECURITY

CLIENT DATABASE SECURITY CLIENT DATABASE SECURITY 1502 RXR Plaza 15th Floor, West Tower Uniondale, NY 11556 Telephone: (516) 227-6600 Facsimile: (516) 227-1799 Website: http://www.openlink.com Revision History Document Name Date

More information

Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software, Data

More information

Virtual Machine Connection Guide for AWS Labs

Virtual Machine Connection Guide for AWS Labs Virtual Machine Connection Guide for AWS Labs Thank you for participating in our hands-on workshop. We are glad to have you in our class! This class relies on our accompanying lab environment which provides

More information

Using Cryptography CMSC 414. October 16, 2017

Using Cryptography CMSC 414. October 16, 2017 Using Cryptography CMSC 414 October 16, 2017 Digital Certificates Recall: K pub = (n, e) This is an RSA public key How do we know who this is for? Need to bind identity to a public key We can do this using

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Using TU Eindhoven s VPN with Ubuntu

Using TU Eindhoven s VPN with Ubuntu Using TU Eindhoven's VPN with Ubuntu 14.04 or 16.04 TU Eindhoven s Virtual Private Networking (VPN) service can be used on Linux computers. This document describes how to do it using Ubuntu 14.04 or 16.04

More information

This quickstart will help you get started with Turnitin. To begin, you need to register with Turnitin and create a user profile.

This quickstart will help you get started with Turnitin. To begin, you need to register with Turnitin and create a user profile. Introduction This quickstart will help you get started with Turnitin. To begin, you need to register with Turnitin and create a user profile.! If you have received an e-mail from Turnitin with a temporary

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

File Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb

File Encryption. Steven M. Bellovin https://www.cs.columbia.edu/~smb File Encryption Steven M. Bellovin https://www.cs.columbia.edu/~smb Why Encrypt Files? Theft of files Theft of media Theft of computer Cloud storage? I.e. Someone else s computer 1 Issues with File Encryption

More information

Certificate-based authentication for data security

Certificate-based authentication for data security Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important

More information

Making Use of the Subliminal Channel in DSA

Making Use of the Subliminal Channel in DSA shardy@aculei.net http://www.aculei.net/ shardy The Fifth HOPE July 10, 2004 Outline 1 Digital Signatures What they are and what they do ElGamal signatures DSA signatures 2 Subliminal Channels Overview

More information

PURCHASING AND USING A PERSONAL SECURE CERTIFICATE. Document issue: 12.1 Date of issue: March 2017

PURCHASING AND USING A PERSONAL SECURE  CERTIFICATE. Document issue: 12.1 Date of issue: March 2017 PURCHASING AND USING A PERSONAL SECURE EMAIL CERTIFICATE Document issue: 12.1 Date of issue: March 2017 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

In this lesson, students learn dos and don ts for and practice sending an .

In this lesson, students learn dos and don ts for  and practice sending an  . Overview: In this lesson, students learn dos and don ts for email and practice sending an email. Objective: The student will send an email: reply to an email; and send an email with an attachment. Alaska

More information

Security and Privacy

Security and Privacy E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

More information

Provider payment Frequently Asked Questions

Provider payment Frequently Asked Questions Provider payment Frequently Asked Questions General information Great-West Life pays you with one cheque twice monthly and an easy-to-read statement. If you sign up for direct deposit, you can enjoy the

More information

COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY:

COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: PING(6), DIG, TRACEROUTE(6), NETSTAT September 24, 2012 Abstract In this TP you will

More information

L8: Public Key Infrastructure. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L8: Public Key Infrastructure. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L8: Public Key Infrastructure Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 9/21/2015 CSCI 451 - Fall 2015 1 Acknowledgement Many slides are from

More information

Secure All The Things Using a Yubikey for 2-Factor on (Almost) All Your Accounts. Jesse Stengel The University of Arizona

Secure All The Things Using a Yubikey for 2-Factor on (Almost) All Your Accounts. Jesse Stengel The University of Arizona Secure All The Things Using a Yubikey for 2-Factor on (Almost) All Your Accounts Jesse Stengel The University of Arizona What is a Yubikey? Yubikeys are small USB devices made by Yubico for doing various

More information

ECSE-323 Digital System Design. Lab #1 Using the Altera Quartus II Software Fall 2008

ECSE-323 Digital System Design. Lab #1 Using the Altera Quartus II Software Fall 2008 1 ECSE-323 Digital System Design Lab #1 Using the Altera Quartus II Software Fall 2008 2 Introduction. In this lab you will learn the basics of the Altera Quartus II FPGA design software through following

More information

SETTING UP MAILVELOPE

SETTING UP MAILVELOPE Document name: SETTING UP MAILVELOPE Document date: 2015 Copyright information: Content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence OpenLearn Study Unit:

More information

Lecture 1 Niyaz M. Salih

Lecture 1 Niyaz M. Salih Lecture 1 Niyaz M. Salih Definition An Operating System, or OS, is low-level software that enables a user and higher-level application software to interact with a computer s hardware and the data and other

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) -- PGP services -- PGP key management (c) Levente Buttyán (buttyan@crysys.hu) What is PGP? general purpose application to protect (encrypt and/or sign) files can be used to protect

More information

2. GETTING STARTED SECURE FILE TRANSFER PROTOCOL (SFTP) PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

2. GETTING STARTED SECURE FILE TRANSFER PROTOCOL (SFTP) PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures A. Secure File Transfer Protocol (SFTP) Procedures Overview A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using

More information

Cloud Computing. Luigi Santangelo Department of Computer Engineering University of Pavia

Cloud Computing. Luigi Santangelo Department of Computer Engineering University of Pavia Cloud Computing Luigi Santangelo Department of Computer Engineering University of Pavia luigi.santangelo@unipv.it What we will learn Part 1: What is cloud computing Five main cloud computing elements Cloud

More information

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646 646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:

More information

Authentication KAMI VANIEA 1

Authentication KAMI VANIEA 1 Authentication KAMI VANIEA FEBRUARY 1ST KAMI VANIEA 1 First, the news KAMI VANIEA 2 Today Basics of authentication Something you know passwords Something you have Something you are KAMI VANIEA 3 Most recommended

More information

A look at the PGP keyserver data

A look at the PGP keyserver data A look at the PGP keyserver data Hanno Böck 1 / 23 The PGP Ecosystem Should we care? PGP problems Is PGP here to stay? Conclusion The PGP Ecosystem The OpenPGP standard (RFC 4880) Software packages (Original

More information

2. GETTING STARTED A. Secure File Transfer Protocol Procedures

2. GETTING STARTED A. Secure File Transfer Protocol Procedures OVERVIEW: A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits of using the SFTP are: 1. SFTP Is A Standard Protocol For

More information

CareCarma. It Starts With Family

CareCarma. It Starts With Family CareCarma It Starts With Family 3. INTRODUCTION 3. How can CareCarma Help You? 3. CareCarma Home Page 4. CareCarma CareCircle 4. CareCarma CareCircle Tools 5. Work on Different Plattforms 6. GETTING STARTED

More information

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests: 646 Cryptography and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing

More information

CONTENT. regipay manual 2/10

CONTENT. regipay manual 2/10 regipay manual CONTENT Content... 2 Introduction... 3 Accounts... 3 What is a regify account?...3 Sending account... 3 Management account / Group administrator...3 Employee accounts... 3 Groups... 4 Employee

More information

Sharing Secrets using Encryption Facility - Handson

Sharing Secrets using Encryption Facility - Handson Sharing Secrets using Encryption Facility - Handson Lab Steven R. Hart IBM March 12, 2014 Session Number 14963 Encryption Facility for z/os Encryption Facility for z/os is a host based software solution

More information

ENCRYPTION ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR S FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD A BLACK PAPER

ENCRYPTION  ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR  S FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD  A BLACK PAPER EMIL REPORT FROM SOVEREIGNMN.COM PPER EMIL HOW TO SECURE YOUR EMILS FOR FREE WITH THE STRONGEST IN THE WORLD PPER 1 EMIL PPER Why You Should Encrypt Your Emails... 3 Encrypting Your Emails With PGP:...

More information

SSL/TLS and Why the CA System is Broken

SSL/TLS and Why the CA System is Broken SSL/TLS and Why the CA System is Broken or: How China can read your email James Schwinabart james@schwinabart.com September 6, 2011 What is SSL/TLS? Secure Sockets Layer or Transport Layer Security A protocol

More information

pretty Easy privacy NULLcon 2017, Goa https://pep.foundation Privacy by Default.

pretty Easy privacy NULLcon 2017, Goa https://pep.foundation  Privacy by Default. pretty Easy privacy NULLcon 2017, Goa sva@pep.foundation https://pep.foundation twitter@sva twitter@pepfoundation Privacy by Default. PGP / GPG PGP Pretty Good Privacy Created by Phil Zimmermann in 1991

More information

Turnitin in Moodle Guide for AUB faculty

Turnitin in Moodle Guide for AUB faculty Turnitin in Moodle Guide for AUB faculty Table of Contents Introduction... 2 Creating a Turnitin Assignment in Moodle... 2 Viewing Student Submissions and Originality reports... 4 Originality report Modes...

More information

Read every line of the exam sheet before programming!

Read every line of the exam sheet before programming! Final Exam, CS130 Fall 2006 Instructions. This exam is similar to the midterms, except that you have two hours and fifteen minutes to work. The executable file to submit is Final.exe. Don t forget to put

More information

Blackboard Frequently Asked Questions: Student Issues

Blackboard Frequently Asked Questions: Student Issues Blackboard Frequently Asked Questions: Student Issues Course Issues Why am I not seeing a course I just registered for in CUNYfirst, in Blackboard? It takes 24-48 hours from the time you registrar or change

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

Overview: Requirements:

Overview: Requirements: ONENOTE PROJECT DUE BEFORE CLASS BEGINS THE WEEK OF Overview: FEBRUARY 11, 2008 One of the main skills we want CIS 150 students to take away from this class is the ability to adapt to and be able to work

More information

2013/14. ita`leem A Student Guide

2013/14. ita`leem A Student Guide 2013/14 ita`leem A Student Guide E-learning Unit, Centre for Professional Development (CPD), International Islamic University Malaysia, Level 2, Education Building, P.O. Box 10, 50728 Kuala Lumpur, Malaysia.

More information

Everyday Cryptography. John Kristoff

Everyday Cryptography. John Kristoff Everyday Cryptography John Kristoff jtk@cymru.com 1 Revealed at! Novel new amplification and reflection threat...and network information disclosure vulnerability D'OH! Not accepted! :-( See you at NANOG

More information

INTRODUCTION... 2 GETTING STARTED...

INTRODUCTION... 2 GETTING STARTED... Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Controls to be activated with the mouse will be shown as Start button > Settings > System > About.

More information

This user guide provides thorough explanations of the features and products found in the Turnitin website that are available for use by instructors.

This user guide provides thorough explanations of the features and products found in the Turnitin website that are available for use by instructors. INTRODUCTION Welcome to Turnitin. Turnitin provides originality checking services, class management tools, and paperless digital grading products to educational institutions around the world. This user

More information

CipherMail encryption. CipherMail white paper

CipherMail  encryption. CipherMail white paper CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

GPG, SSH, and Identity for Beginners

GPG, SSH, and Identity for Beginners GPG, SSH, and Identity for Beginners GUADEC Strasbourg, July 2014 Federico Mena Quintero federico@gnome.org 263F 590F 7E0F E1CB 3EA2 74B0 1676 37EB 6FB8 DCCE DEMO Crypto is Hard(tm) Be diligent...... even

More information

QuickStart Guide for External Assessors

QuickStart Guide for External Assessors Students may be required to submit their work to external assessors who do not have Chalk & Wire accounts. Additionally, administrators may send assessments directly to external assessors, which do not

More information

Microsoft Yammer Users Guide

Microsoft Yammer Users Guide 2017 Microsoft Yammer Users Guide This guide will assist you with using Microsoft Yammer. INFORMATION TECHNOLOGY SERVICES ITS TRAINING Table of Contents What is Yammer?... 2 Access... 2 Navigating Yammer...

More information

COMPUTING FUNDAMENTALS I

COMPUTING FUNDAMENTALS I FALL 2017 / COMPUTER SCIENCE 105 COMPUTING FUNDAMENTALS I DAY 2 27 SEPTEMBER 2017 COURSE ADMIN COURSE ADMIN NOTECARDS - ATTENDANCE & FEEDBACK Name Student ID One of: What did you learn or find most interesting?

More information

AutoCrypt provides protection of applications without any programming efforts.

AutoCrypt provides protection of applications without any programming efforts. Purpose of Application: Automatic Protection of applications without programming efforts Version: Smarx OS PPK 8.0 and higher Last Update: 31 October 2016 Target Operating Systems: Windows 10/8/7/Vista

More information

MU Video CaptureSpace FAQ

MU Video CaptureSpace FAQ MU Video CaptureSpace FAQ MU Video CaptureSpace Frequently Asked Questions What is MU Video CaptureSpace? MU Video CaptureSpace is a desktop application that allows users to easily record content. From

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Penceil Paper 5. Mapping 'Living with Computers' course to ICT Skill for Life Standards. Alan Clarke Niace

Penceil Paper 5. Mapping 'Living with Computers' course to ICT Skill for Life Standards. Alan Clarke Niace Penceil Paper 5 Mapping 'Living with Computers' course to ICT Skill for Life Standards Alan Clarke Niace September 2005 Mapping Living with Computers course to ICT Skill for Life Standards This document

More information

GUIDELINES REGARDING PROTECTED FILES

GUIDELINES REGARDING PROTECTED FILES GUIDELINES REGARDING PROTECTED FILES This guide shows you step-by-step how to open protected pdf s (PPDF). Documents from SKOV A/S is protected with Microsoft Rights Management (RMS). The procedure described

More information

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests: 646 Cryptography and Computer Network Security Course web page: Google Kris Gaj 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing

More information

User Guide for Students

User Guide for Students User Guide for Students 2018-2019 About this Guide This guide was prepared by the Department of Distance Education & Instructional Technology at Black River Technical College in order to provide students

More information

PGP(R) Desktop Version 10.1 for Mac OS X Release Notes

PGP(R) Desktop Version 10.1 for Mac OS X Release Notes Page 1 of 8 PGP(R) Desktop Version 10.1 for Mac OS X Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Desktop

More information

PGP Command Line Version 10.0 Release Notes

PGP Command Line Version 10.0 Release Notes PGP Command Line Version 10.0 Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Command Line Software Development

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information

CPSC 150 Laboratory Manual. Lab 1 Introduction to Program Creation

CPSC 150 Laboratory Manual. Lab 1 Introduction to Program Creation CPSC 150 Laboratory Manual A Practical Approach to Java, jedit & WebCAT Department of Physics, Computer Science & Engineering Christopher Newport University Lab 1 Introduction to Program Creation Welcome

More information

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers

More information

Entrust Cloud Enterprise. Enrollment Guide

Entrust Cloud Enterprise. Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Document issue: 1.0 Copyright 2016 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of

More information

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading

ECE 646 Lecture 4A. Pretty Good Privacy PGP. Short History of PGP based on the book Crypto by Steven Levy. Required Reading ECE 646 Lecture 4A Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 18.1 or 19.1 Pretty Good Privacy (PGP) On-line Chapters

More information

Labtainer Student Guide

Labtainer Student Guide Labtainer Student Guide January 18, 2018 1 Introduction This manual is intended for use by students performing labs with Labtainers. Labtainers assume you have a Linux system, e.g., a virtual machine.

More information

The Kleopatra Handbook

The Kleopatra Handbook Marc Mutz Developer: David Faure Developer: Steffen Hansen Developer: Matthias Kalle Dalheimer Developer: Jesper Pedersen Developer: Daniel Molkentin 2 Contents 1 Introduction 7 2 Main Functions 8 2.1

More information

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

Pretty Good Privacy PGP. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E ECE 646 Lecture 4 Pretty Good Privacy PGP Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 18.1 or 19.1 Pretty Good Privacy (PGP) On-line Chapters

More information

Linux Command Homework Individual/Team (1-2 Persons) Homework Assignment Turn In One Copy Per Person 5 Points

Linux Command Homework Individual/Team (1-2 Persons) Homework Assignment Turn In One Copy Per Person 5 Points All of the work in this project is my own! I have not left copies of my code in public folders on university computers. I have not given any of this project to others. I will not give any portion of this

More information

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design Welcome to INTRODUCTION TO WINDOWS 10 Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design Email: cpu@cpu-onsite.com Phone: 209-296-0660 1 You are viewing the Student Version of the

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

CMPSCI 187 / Spring 2015 Hangman

CMPSCI 187 / Spring 2015 Hangman CMPSCI 187 / Spring 2015 Hangman Due on February 12, 2015, 8:30 a.m. Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 CMPSCI 187 / Spring 2015 Hangman Contents Overview

More information

Lab 4-2 Create an Activity Diagram

Lab 4-2 Create an Activity Diagram Create an Activity Diagram Lab 4-2 Create an Activity Diagram Before You Begin In this lab, you ll practice creating an activity diagram that shows the workflow for a use case s basic flow. We will model

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide April 4, 2016, Rev: 5454 Copyright c 2008-2016, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Introduction to Windows 10. Windsor Senior Computer Users Group October 12, 2015

Introduction to Windows 10. Windsor Senior Computer Users Group October 12, 2015 Introduction to Windows 10 Windsor Senior Computer Users Group October 12, 2015 Should you upgrade? Availability Windows 10 will be available as a free upgrade (until July 2016) for anyone with a valid

More information

User Guide for Students

User Guide for Students User Guide for Students 2017-2018 About this Guide This guide was prepared by the Department of Distance Education & Instructional Technology at Black River Technical College in order to provide students

More information