HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 8 MINUTES AGO.
You are here: Home / Personal Tech / Yahoo Joins Google To Encrypt E-mail
Build Apps 5x Faster
For Half the Cost Enterprise Cloud Computing
On Force.com
Yahoo Joins Google To Make E-mail Spy-Proof
Yahoo Joins Google To Make E-mail Spy-Proof
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
AUGUST
11
2014



Search engine giant Yahoo is getting on the e-mail encryption bandwagon. The company is joining Google to create a system that could roll out next year and virtually make your inbox completely secure.

In fact, the Wall Street Journal is reporting the system Google and Yahoo are pushing forward could make it “mathematically impossible” to hand over your messages to a court of law. The announcement comes just months after Microsoft upgraded its encryption for Outlook.com, however Redmond is not on board with the Google/Yahoo project -- at least not yet.

“We have to make it to clear to people it is not secret you’re emailing your priest,” Alex Stamos, Yahoo’s Chief Information Security Officer, said in an interview at the Black Hat security conference, according to the Journal. “But the content of what you’re emailing him is secret.”

Why PGP?

In June, Google made headlines by flying in the face of the National Security Agency with a new Chrome browser add-on. The idea is to make your e-mail more secure and spy-proof -- and to provoke other e-mail providers to take similar measures. But the new system Google and Yahoo are building aims to takes it up a notch.

While end-to-end encryption tools like PGP (Pretty Good Privacy) and GnuPG (Gnu Privacy Guard) have been around for a long time, they require a lot of technical know-how and manual effort to use. Google is trying to make this kind of encryption easier by releasing code for a new Chrome extension that uses OpenPGP, and Yahoo and Google will continue working on a broader PGP-based solution for the consumer market.

According to International PGP, PGP combines some of the best features of both conventional and public key cryptography. In other words, PGP is a hybrid cryptosystem.

“When a user encrypts plaintext with PGP, PGP first compresses the plaintext. Data compression saves modem transmission time and disk space and, more importantly, strengthens cryptographic security,” according to the Web site. “Most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher. Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis. (Files that are too short to compress or which don't compress well aren't compressed.)”

How it Works

The International PGP site explains that PGP then creates a session key, which is a one-time-only secret key. This key is a random number generated from the random movements of your mouse and the keystrokes you type.

“This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext,” according to the International PGP. “Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.”

According to the site, decryption works in the reverse. That means the recipient's PGP copy uses a private key to recover the temporary session key. PGP then uses that temporary session key to decrypt the conventionally encrypted ciphertext.

“The combination of the two encryption methods combines the convenience of public key encryption with the speed of conventional encryption,” the International PGP explained. “Conventional encryption is about 1, 000 times faster than public key encryption. Public key encryption in turn provides a solution to key distribution and data transmission issues. Used together, performance and key distribution are improved without any sacrifice in security.”

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
ISACA® offers a global community of more than 115,000 IS/IT constituents in over 180 countries. We develop and deliver industry-leading certifications, education, research and business frameworks. We equip individuals to be leaders in the fast-changing world of information systems and IT - Learn More>
MORE IN PERSONAL TECH
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
Sony is no stranger to breaches. Sony’s PlayStation Network was hacked in 2011 and attackers obtained 77 million user accounts. The latest attack comes against Sony Pictures Entertainment.

ENTERPRISE HARDWARE SPOTLIGHT
Chinese computer maker Lenovo got creative with the marketing campaign around its Yoga 3 Pro. Lenovo hired the Upright Citizens Brigade, a comic troupe, to help drum up visibility for its new device.

MOBILE TECHNOLOGY SPOTLIGHT
In its bid for the wearables market, Sony is reportedly developing a watch made out of electronic paper for release as soon as next year. The e-paper watch will emphasize style over tech innovations.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.