• Quick note - the problem with Youtube videos not embedding on the forum appears to have been fixed, thanks to ZiprHead. If you do still see problems let me know.

EMail encryption

ShowMe

Graduate Poster
Joined
Jul 25, 2001
Messages
1,350
Here's a bit of a different twist on email security, and I'm asking if anyone is familiar with a program to do what I want it to do.

I have a friend of mine that does taxes and wants to send tax drafts out to his clients, but wants them to be secure. I am familiar with digital signed messages, but he would be required to keep a copy of all the digital signatures, not to mention asking his folks to go get the signatures in the first place.

Ideally I'm trying to figure out a way that he can send them an encrypted message, they could get it and he could be reasonably certain only they could open it. The public / private key idea is a good one, but again it would require him having all their public keys. The idea is to find something as simple as possible for him to send and the recipient to receive & read.

One service I came across, called Protectoria, looked promising. Found at www.protectoria.com , you send a message via their web service which encrypts it and sends it automatically and sends a PIN code to the users cell phone. Unfortunately they only cover about 50% of the US until next fall.

Any recommendations?
 
He could try encrypted ZIP files. Some years ago I convinced an auditor that this was acceptable with a key of sufficient length for some personnel data. ISTR that the time to decrypt got longer and longer as the key length increased.

You could Google on this to see what the current situation is.
 
The problem with encrypted files is that they cannot be virus-scanned. The email filter at work automatically dumps any attachment that is encrypted or password-protected.

Email is not considered a secure medium.
 
Nothing is 100% secure. People have been known to follow the postman and steal mail and then steal your ID based on what they find.

Years ago, I got a call from the local police telling me that my Visa payment (in the old days of sending checks in the mail) had been found in the car of a guy they'd pulled over for speeding. It was in a rubber-banded bundle of 50+ Visa payments, all going through the El Segundo, CA post office. They suspected an inside job at the post office (duh!).

Okay, slightly OT, but I so rarely get to tell that story . . .
 
Yes, I know email is not inherently secure.

for that matter, neither is snail mail. If I needed to go the full secure route I suppose going with a Brink's truck with fingerprint ID at each end would be an option....what I'm looking for is something that would be *reasonably* secure.

Anything is better than nothing, of course. But I was hopeful that folks would have utilized such services in the past.

Gord, I will look into encrypted zip files. Thanks for the suggestion.
 
Gord, I will look into encrypted zip files. Thanks for the suggestion.

For what it's worth, my employer (who spends a lot of money on intellectual property and lawyers) uses encrypted .zip files as its method of choice for sending proprietary data outside the in-house networks. Just make sure you send the password separately or, better, use some completely different technique (like a phone call) to send it.

Disclaimer: I'm no expert in encryption of computer security. But this time I'm on-topic!
 
Yes, I know email is not inherently secure.

for that matter, neither is snail mail. If I needed to go the full secure route I suppose going with a Brink's truck with fingerprint ID at each end would be an option....what I'm looking for is something that would be *reasonably* secure.

Anything is better than nothing, of course. But I was hopeful that folks would have utilized such services in the past.

Gord, I will look into encrypted zip files. Thanks for the suggestion.

When I worked for a major Mortgage Lender, we were using encrypted PDF files. Something to consider as an alternative.

Also, you can encrypt emails themselves with pgp (or gpg if you want the opensource version.)

Here's how to use GPG to encrypt an email:

http://ask-leo.com/how_do_i_send_encrypted_email.html

Outlook 2007 can also encrypt emails, but I don't know the hows of such things. GreNME may know that. (I use mutt and gpg.)
 
>if anyone is familiar with a program to do what I want it to do.

GPG will do it and is free.

>I have a friend of mine that does taxes and wants to send tax drafts out to
>his clients, but wants them to be secure. I am familiar with digital signed
>messages, but he would be required to keep a copy of all the digital
>signatures, not to mention asking his folks to go get the signatures in the
>first place.

A digital signature will only let the person authenticate that the file is from your friend and has not been tampered with; it will not prevent anyone from reading the file.

Encryption will prevent people from reading the file; it does not ensure that the file has not been changed.

What your friends needs to do is to encrypt and sign the files. That way only the recipient (who has the decryption key) can read them, and the recipient can guarantee that it has not been altered in transit.

>Ideally I'm trying to figure out a way that he can send them an encrypted
>message, they could get it and he could be reasonably certain only they
>could open it. The public / private key idea is a good one, but again it
>would require him having all their public keys. The idea is to find something
>as simple as possible for him to send and the recipient to receive & read.

Yes, public key encryption will let him do this. It requires a basic understanding what to do though.

>One service I came across, called Protectoria, looked promising.

Disclaimer: I only spent 5 minutes on Protectoria's site. I'm not a professional cryptographer but I have read a few books on it and have implemented AES, RSA and SHA-1, including RSA key generation.

1) Your friend has to trust Protectoria. They have all the unencrypted emails. What happens if they go bankrupt and one of your friend's client's enemies buys their assets?

2) I'm concerned about the PIN code. To have the PIN match the randomness of a 128-bit AES key, the PIN code would have to be 39 digits long (0-9). I can't see anyone transcribing that from a SMS message on their phone to type it in to a web page.

3) Unlike GPG which requires you to type in a passphrase, which you can memorize, I get the understanding that anyone who has access to the recipient's email and cell phone can read a Protectoria message.

>Any recommendations?

Fax or U.S. Postal Service. The U.S. government considers it good enough to use to send some classified data. Trying to get your friend's clients to install GPG and understand basic cryptography may be difficult.

Assuming that he can teach them, GPG does manage the keys, and has GUI interfaces to make it easier to use. He and all his clients would generate GPG public & private key pairs, and then securely exchange the public keys. That would be done in a face-to-face meeting, or phone, or another method as long as both parties are really, really, really sure that the other person is who they say they are.

When your friend has a file to send to a client, he would use GPG to encrypt the file using the client's public key*, and sign it with his private key. He would enter his passphrase to do this. When the client receives the file, the client would use GPG to decrypt the file and verify the signature. The client would enter her passphrase to do this.

I say "passphrase" because a password is too short to be secure. Ten random words from the diceware word list gives you over 2^128 possibilities. For example,
gpo get allah append track depth he'd maid ri yeats
is a 10-word passphrase generated from the diceware word list.

It's difficult but not impossible to remember something with that much randomness. You should write down your passphrases, but protect them like you would a stack of hundred-dollar bills or a signed, blank check. Lock the paper in a safe.

Good encryption products do not have back doors. If anyone forgets their passphrase, then they cannot access their keys. They can not decrypt or sign files. They will have to generate a new key pair.

Your friend must keep the unencrypted files because he cannot decrypt a file sent to one of his clients.

BTW, the passphrase vs. password argument applies to encrypted ZIP files. There are programs that will try dictionary attacks on encrypted ZIP files; they probably also try simple letter substitutions (digit 1 for letter l, digit 0 for letter o, etc.) and variant capitalization.

* This isn't exactly correct. Actually it most likely generates a random key for a symmetric cipher, encrypts the file with that, and finally encrypts the key with the client's public key. It has the same effect but it is much faster.
 
the better option is to provide a online venue that requires password protection and unique user id to access the information via a database.

Emails can get lost, PDF / Zip password protection can get cracked.

A website that is behind an SSL certificate and HTTPS is much more secure than email.

But nothing will be face to face.
 
A website that is behind an SSL certificate and HTTPS is much more secure than email.
I think you're forgetting that there's a chain of relays between you and a website. It would be easier to alter DNS credentials and have it redirected to another system for a man-in-the-middle attack than decrypting an encrypted attachment. How many novice users check the SSL certificate?

Also, unless the tax preparer is willing to host his own web site on a system he controls, you'll have to have the unencrypted tax returns on the host's server. You're now opening another method for an attack, crack the server or host.
 
Get a digital signature.

With a digital signature you can both sign an email, and encrypt it.
 
I think you're forgetting that there's a chain of relays between you and a website. It would be easier to alter DNS credentials and have it redirected to another system for a man-in-the-middle attack than decrypting an encrypted attachment. How many novice users check the SSL certificate?

Email is worst than this. on a website, you have more protection. An email sent to the wrong email address or a mistyped one, has a higher chance of landing in someone else's hands, than some hacker trying to redirect or mess with DNS settings.

But again, NOTHING is better than a in person - person meet to exchange paper work.
 
Email is worst than this. on a website, you have more protection.
You didn't address the fact that the documents are sitting unsecured on the server. Who controls it? Probably not the tax preparer. Most security breaches don't happen because someone breaks the protocol or the cryptography, but because of human error. A few years ago a newspaper in the Boston area accidentally exposed thousands of customers' credit card information because they recycled printout to wrap newspaper bundles instead of shredding it as was their policy. Adding a web server adds a third party with a totally different agenda to the protocol. Their agenda isn't keeping the tax records secure, but rather profit. That includes not being sued, but if your contract doesn't specify that they will guarantee security (rather than do industry standard things), then you may not be able to win if you sue when they leak information.
An email sent to the wrong email address or a mistyped one, has a higher chance of landing in someone else's hands, than some hacker trying to redirect or mess with DNS settings.
That's why the attachments are encrypted, so it doesn't matter how many attackers intercept it. In fact, when you use cryptography you are assuming that the communication will be intercepted, and MITM attacks will be attempted, people will alter the messages, people will try to forge messages, people will replay messages, etc. While I'm far from an expert, Bruce Schneier's "Applied Cryptography" has protocols the cryptographic community has worked out for all these attacks.
But again, NOTHING is better than a in person - person meet to exchange paper work.
I agree completely. For tax returns though, the mail is probably secure enough.
 
Last edited:
Get a digital signature.

With a digital signature you can both sign an email, and encrypt it.

If you encrypt a file with your own public key (which is essentially what you mean by a digital signature) you will be the only person who can decrypt it.

If I wanted reasonable security (as opposed to paranoid level which is very expensive), I would get some crypto software (openssl will do the trick but is not particularly user friendly). I would create my own certificate authority and roll a certificate using it for each of my clients which I would deliver to the client in person. I would instruct them to install my CA certificate and to only accept e-mails signed by me and encrypted with the certificate I gave them.
 
If you encrypt a file with your own public key (which is essentially what you mean by a digital signature) you will be the only person who can decrypt it.
That's not quite quite right. You use your private key to encrypt to make a digital signature. Since public-key cryptography tends to be much slower than private key, you usually hash the message and encrypt the hash. Then anyone can decrypt the hash and verify that it matches the hash of the message. The fact that it does shows that the message has not been changed, and you signed the hash. The signed hash is the digital signature.
 
There is a good summary of the options and issues at:
Thanks. Those links have some good advice,
We have time and again seen or heard of organizations that use really poor passwords, like a dictionary word, and use that same password for all encrypted documents. This is often done to make things easy for the staff or users, but effectively renders the attempt at encryption laughable.
However, they then write
If the encrypted file is stored in a server with access only available via a web site where you have to enter the password, then:
Casually omitting that they have access, wrote all the apps, wrote the web apps you can use to generate PGP keys, etc.. They even say they never email the encrypted file, hence it probably is decrypted on their end.
Admittedly, LuxSci is selling a secure service, see:
Read their contract very carefully, and examine the local and federal laws to see how they interact. You are giving a third party access to confidential data.

I read their Master Services Agreement, and as I understand it, the most you can sue them for is the amount you paid them in the previous three months, and then only if they are grossly negligent or perform willful misconduct. Also they have the right to delegate services to third parties, so the group keeping the secret isn't "you - your client - them", but "you - your client - them - anyone they want".

Companies like that good ideas, but they are not open to audits. That's why I prefer open source code; many people can inspect the code and look for holes. Heck, FIPS AES and SHA-1 standards are on web. The patent on RSA expired years ago, and there's a good description in Practical Cryptography, including prime generation. You can code your own!
 
If you encrypt a file with your own public key (which is essentially what you mean by a digital signature) you will be the only person who can decrypt it.

If I wanted reasonable security (as opposed to paranoid level which is very expensive), I would get some crypto software (openssl will do the trick but is not particularly user friendly). I would create my own certificate authority and roll a certificate using it for each of my clients which I would deliver to the client in person. I would instruct them to install my CA certificate and to only accept e-mails signed by me and encrypted with the certificate I gave them.

With a digital signature it is encrypted so that only the digital signature of the receiver can unlock it.
 

Back
Top Bottom