entrusthead for NeXTStep

burglar


WHY WOULD ANYONE WANT TO ATTACK YOUR COMPUTERS?


How about:

-financial fraud
-theft of resources
-industrial espionage
-wanton vandalism or `showoffs'
-malicious attacks by disgruntled employees
-illicit eavesdropping for financial or political gain


computerActive Inc.'s Entrust for NeXTStep provided your organization with a set of tools to manage the security and integrity of information throughout your enterprise. It addressed four key areas:

Data Privacy:
The contents of a protected file could only be viewed by the person who protected it and by the people who have been authorized by that person to do so.

Public Key Encryption:
Encryption was used to protect information stored electronically or being transferred between any users throughout an organization, and between different organizations inluding through mail systems through the INTERNET.

Data Origin Authentication:
You could check the digital signature of the person who signed the file to ensure the file really came from the person you think it did.

Data Integrity:
You could be sure the file had not been altered since it was signed. A valid digital signature that accompanied the file was the guarantee.

Automated Key Management:
It was easy for users to encrypt and sign files for others. The concept of keys was transparent to users, but was of utmost importance to guarantee the privacy and integrity of sensitive data.

User keys could have a limited validity period. When this time period expired Entrust automatically updated all users' keys with new ones without the users being aware that this update had occurred.



Product Features:

Graphical User Interfaces:
It was simple to use, quick to learn, an included online help.

High Speed Cryptographic Software:
On an Intel486 running, the encryption software was fast enough to be practical for encrypting all the files in a user's directories.

Encryption for Groups:
Encrypt a file for multiple recipients in one operation, without the overhead of creating separate encrypted copies for each recipient.

Choice of Encryption Algorithms:
Entrust supported the best available public key encryption algorithms and emerging standards, including RSA, DES and others.

All file types:
Entrust handled any file, from any application, without restriction. You could secure text, forms, images, even multiple files, with a single operation.

Key Security:
The cryptographic keys were created by the customer, therefore, were not accessible to any external agency.

ASCII Encoding Option:
It could make encrypted files compatible with all electronic transfer methods, including ASCII-only electronic mail systems.

Written by computerActive Inc using licensed toolkits from Entrust Corporation.
(Entrust is a trademark of Entrust Corporation)


Using NEXTSTEP Entrust

Launch the Application

Select a file, drag and drop it onto the Entrust Icon on your Dock. In this example we will use Shakespeare/Hamlet/1.2.

If the Entrust application is not already running it will be launched and you will be asked for a password.

Note that this password is not the password and account you use for logging into the NEXTSTEP computer. This is an entirely independent account used only for encrypting and/or signing documents or folders. Whatever holes may or may not exist within the NEXTSTEP accounts and security system are eliminated here.

Select the intended recipients

Once you enter your Entrust password you will be presented with a Select Recipients panel inviting you to select one or many recipients.

fig31

This is where Entrust starts to differentiate itself. The list of names you see in the Selection List with their public keys is from a corporate wide X.500 database of public keys.

This database holds all the public keys approved and verified by trusted individuals in the organization. It records not only the person's public key but also the certifying authority.

An X.500 database is capable of managing thousands of users, so we provide you with the ability to create groups or mail lists. With a single click of a mouse you could select a group of ten people who are intended readers of this soon-to-be-encrypted and signed file.

Encrypt the file or folder

Once you have all the desired individuals and groups listed in the Selected Recipients window, press the Encrypt button.

The Select Recipients panel will disappear and be replaced by a Process Status Panel. This gives a running report on the progress of the encryption.

For the file Shakespeare/Hamlet/1.2 which is 15494 bytes long and 9 printed pages long, it takes less than 3 seconds to complete the job for six recipients and write it to the disk on a three year old NeXTstation Turbo. Experts in the field will be picki ng themselves off the floor about now. This as at least ten times faster than traditional speeds given the same file sizes and hardware.

Note that there are two pie charts. One to show the progress of the individual file being encrypted and the other to show the progress of the whole folder being encrypted if that is what you wanted.

Note the resultant file

For output you have choices. In the above example we chose to have the original file hard deleted from the disk and replaced with the encrypted file. This is appropriate if you wish to secure a file in your home directory.

However if your intent is to keep the file "in the clear" on your home directory but wish to have a secured copy to send over the internet , then you would go to the preferences panel and deselect the "Delete after encrypting" check box.

fig32

Note that in this panel there is an Encrypt operations section with choices of encryption algorithms. Today there are two DES and CAST. In the future there will be more.

Note also that there are check boxes for Encrypt, Sign and My eyes only. You might want to sign a document but not encrypt it. This would allow anyone to read the file with absolute confidence that you signed it and that it has not been changed after you signed it. My eyes only is a short cut which encrypts files for yourself without the Selected Recipients panel popping up.

As NEXTSTEP users we sometimes forget that there are still people out there who's e-mail systems can only handle ASClI. We provide an option in the Destination Files section for writing the files in ASCII. Normally you would want to keep them in binary form (tougher to break the encryption, faster to decrypt and the resultant files are smaller).

You now have an encrypted and signed file which can be left on the network server with confidence. If anyone manages to defeat the Unix file security systems and illegitimately grab a copy they will not be able to decipher the contents. The same can be s aid for sending it across the Internet.

Decrypt the file

Encrypted files have a file name extension .ent . Select the file you wish to decrypt in the file viewer and double click it. If the Entrust application is still running it will decrypt the file. If not, then the double click will launch the application , ask for your password and then decrypt the file. In our example of Shakespeare/Hamlet/1.2 the file was decrypted in less than 2 seconds and then an appropriate application was launched to view the file. In this example it was Edit.

fig33

You have decrypted a file.

The above panel tells you where it put the resultant file and in the Files section it lists the decrypted files and their status. Note two icons beside the file name, one looks like an open padlock, the other looks like a pen. If you click on the Signature button a new panel will pop up.

fig34

If you see this panel you know that the file was not corrupted along the way and that it was signed by Jill Hennessy and that HASC-ELM certifies that this was really Jill's valid public key. Note if even a single character, comma or space was changed you would not see this panel. The decryption process would abort and you would be told that things are not right.

Prove it to yourself. Encrypt a file. Open it with edit, go to the middle of the jumble of characters and change something, save the file. Now try to decrypt it. It will know. Make sure you do this on a copy of the encrypted file.

Note that this encryption/signature process is independent of the application used to create the source file. It is independent of operating system. That file could be sitting on a Novell server, or a Digital NFS server. It doesn't matter, if your NEXTSTEP computer can see the file you can encrypt and sign it. The process is independent of the transport mechanism. You may have gotten it from a server or from a floppy or from an Internet e-mail. It doesn't matter to the system. Any file you encrypt and/o r sign can be decrypted on Macintoshes, Windows, Sun's and HP workstations.

Back to the Preferences Panel

In the Decrypt Operations section you have the option of writing the decrypted file to disk with the same file name or to keep the information in memory and launch an application.

Under the Decrypt Options you can choose to leave the encrypted file on the disk and write the decrypted file to the hard disk or you can cause the encrypted file to be hard deleted upon decryption.

The Destination Files option asks if it should overwrite existing files if they have the same file name.

In the General Options section you can set a time-out for automatic log off of Entrust after a specified idle time. Note that this is again separate from the general system account and will not log you out of your NEXTSTEP system.

The remaining fields have to do with you taking your NEXTSTEP portable on the road. It is possible for you to download a database of valid public keys to take with you. You are exposed, should one of those keys be declared invalid while you are away you won't know about it until you reconnect to the network. The risk is probably acceptable for short periods of time. It's certainly better than telling the world to invalidate a lost credit card number.

Should you for any reason feel that your key pair has been compromised, you have only to notify your Certifying Authority. Your old public key will be invalidated. A new key pair will be issued. Within moments everyone on the net will be using the new pu blic key. Users look you up know anything has changed.

This capability allows your organization to effect sophisticated policies like automatic expiration of key pairs when students go back to school or when employees leave the company. After invalidation of their key pairs it is still possible to access the work they left behind through an auditable mechanism. You may automate the expiration of keys of all employees at regular intervals without the users knowing or caring. Their private signature password remains intact.

Integration within NEXTSTEP

From any application select a portion of a file. Go to the Browser Services menu. Select Entrust/Selection and the selected information will be encrypted and written to a file in a directory specified by you.



Written and distributed by calogo.vsm


NeXT Entrust PPT