diff options
Diffstat (limited to 'teaching/encryption/01-encryption-101-basics.md')
-rwxr-xr-x | teaching/encryption/01-encryption-101-basics.md | 70 |
1 files changed, 70 insertions, 0 deletions
diff --git a/teaching/encryption/01-encryption-101-basics.md b/teaching/encryption/01-encryption-101-basics.md new file mode 100755 index 0000000..082016c --- /dev/null +++ b/teaching/encryption/01-encryption-101-basics.md @@ -0,0 +1,70 @@ +Title: 01. Encryption 101: Basics +Date: 2013-07-26 20:31 +Category: Data Privacy +Tags: Guides +Slug: 01-encryption-101-basics +Status: published + +If you haven't lived under a rock for the past few weeks you'll have +heard about the NSA and PRISM essentially spying spying on the entire +world. Now, I will write an article about why this is actually upsetting +and there are good reasons to protect ones privacy even if you have +"nothing to hide". In this tutorial I want to show you that encrypting +your communications and computers is a good way to protect yourself but +hardly the only thing you can do. And even if you encrypt everything in +your life you will leave behind a lot of meta data on the internet. +Enough to reconstruct what you were doing, what you think, who you would +vote for etc. + +In this series I want to show you a little bit how you can protect +yourself. However, in this first post I want to explain you the basics +of cryptography. I won't go into detail about mathematical constructs, +you can read that on Wikipedia. But as an average person you won't need +that. Let's begin. + +There are different ways how to encrypt things. The two big ways I want +to talk about now is **symmetric** and **asymmetric** encryption. + +Let's look at symmetric encryption first: + +![tutorial\_encryption\_symmetric](http://www.spacekookie.de/wp-content/uploads/2013/07/Screen-Shot-2013-07-26-at-22.13.29.png) + +In symmetric encryption the user creates a key. That key is then being +used to encrypt but also decrypt a file. This makes the process of +encryption and decryption very fast, however also creates the problem +that the key needs to be transferred safely. If somebody got hold of the +key they could encrypt and decrypt files that they might not be able to. +Symmetric encryption is great for hard drive and large chunks of data. + +However this isn't very practical in communication with others. You want +others to be able to encrypt messages sending to you but be the only one +that can decrypt them again. This is the basic idea of asymmetric +encryption. The following schematic will explain. + +![tutorial\_encryption\_assymetric](http://www.spacekookie.de/wp-content/uploads/2013/07/Screen-Shot-2013-07-26-at-22.14.54.png) + +There is a pair of keys: one public, one private. The public key is +being used to encrypt a file. In practise this is the key that you send +out to other people. They encrypt the messages they send to you and then +send them to you. +The private key is the one you keep to yourself (private) and under no +circumstances send to any computer or device. Only transport it on +offline drives like USB sticks, SD cards or external hard drives. This +is the key that will allow you to decrypt messages sent to you. + +If you use asymmetric encryption in your communication you can encrypt +messages for others with their public keys and decrypt messages others +sent you with your private key. + + + +In following tutorials I will quickly show you how to encrypt messages +using PGP on Mac OS X, Windows and Linux, how to encrypt your hard drive +on Mac and Windows and also how to use encrypted instant messaging +services. After that I will show you ways to stay anonymous on the +internet and leave behind fewer clues about who you are and what you +were doing. Even if you have nothing to hide that doesn't mean that you +need to invite everybody into your private life! + +P.S. This tutorial series was inspired by my brothers short descriptions +about security [here](http://www.leandersabel.de/itsecurity/). |