TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum

TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum

aseanregionalforum.asean.org
from aseanregionalforum.asean.org More from this publisher
15.05.2015 Views

and asymmetrical encryption can be used to protect the symmetrical encryption key. To compare the strength of the keys with respect to the types of encryption, it is enough to note that a key 256 bits long in a symmetrical algorithm corresponds to a 15360 bit long asymmetrical algorithm key such as RSA. With respect to communication networks, email is considered one of the most important modern methods to exchange messages, be they encrypted or not. In order to safeguard the person communicating, the following conditions must be adhered to in dealing with email used for secret issues: 1. Do not use American email (Yahoo, Hotmail, etc). 2. Never use your regular personal email, but set up an email specifically for the exchange of sensitive messages. 3. When registering an email address for private matters, never enter accurate information. Instead, give fictitious information (name, address, date of birth, gender, etc). 4. Do not log into your private email directly from your machine. A proxy must be used to reach your private email so that even if your email is being monitored, the IP address that you use to check your email will be one far away from your location. That is because every IP address in the world is registered in global databases and knowing the [IP] number used by your computer is like knowing your address. The [IP] number leads to the internet service provider and the company leads those inquiring about you, to you. 2. About E-mail encryption The following is a primer on how e-mail encryption works. This encryption is based on a Public Key cryptography algorithm that requires two keys, Public and Private. The Public key is used for encrypting the data while the Private key is used for the recipient to decrypt the encrypted message. The two keys work together in what is called key-ring. Both keys are required to complete the ring. 2.1 Encryption Strength: One of the main features of a strong encryption is the key length in bits. In Symmetric encryption, some countries allow only 128 bits encryption. The Unites States and Canada allow up to 256 bit encryption which is very uncommon. In Asymmetric encryption, serious information security requires a key of at least 1024 bit in length. Until now, messages encrypted with long keys are impossible to crack. A 1024 bit long RSA key, which is a key based on 309 long decimal numbers, are up to now impossible to crack based on the most recent research in computer science and prime numbers. [pg 52] A 512 bit long key required five months of continuous parallel processing of 292 powerful computers in 2000. A 2048 bit key is billions of times stronger than 1024 bit key. The strength of the key also depends on an authentic key generation; this is why using foreign made software programs for key generation is very risky. Foreign companies that create programs for encryption key generation can access the private key using the public key. 2.2 Public Key: After generating a public key and a private key, and protecting the private key with a "Passphrase" which we will explain later, you then need to publish the public key in a public area such as the forums, Internet websites, or servers especially provided for this purpose. Anyone interested in sending you an encrypted message is then able to simply take your public key to encrypt and send you the message. The message cannot be decrypted without the private key which is secret and only you have it. This means that you must first send your public key to any person wanting to send you an important message. 2.3 Private Key

The private key is used to decrypt messages encrypted with a public key. You must protect this key in a secure location. Make copies of both the private and public key (Key-ring) and store them in a safe place, because if you lose these keys you will have no other way of recovering the encrypted data and messages. You should also generate other keys for future use. 3. Mujahidin Secrets Program The program Mujahidin Secrets offers absolutely the highest encryption level in asymmetrical encryption for exchanging messages and all sorts of files over networks. It is the first Islamicly produced program to provide this kind of encryption: 256-bit symmetric encryption and highly secret 2048-bit key asymmetric encryption. The program incorporates the highest pre-encryption data compression levels for size reduction. It uses a new technology called "stealthy encryption" that enables the program to randomly change the encryption algorithm every time a file is encrypted and to produce a random session key that changes each time, thus making it possible to thwart attempts to analyze encrypted files, since each file is encrypted with a different algorithm from the list of five algorithms that the program uses. Mujahidin Secrets uses the five algorithms chosen by encryption experts in the AES algorithm selection filters. All of them have keys of 256 bits. [pg 53] Asymmetric encryption technology allows public keys to be transmitted across the network. Public keys can be posted in jihadist forums. The key's fingerprint can be used to verify the identity of the communicating party. The public key can be used to encrypt files before sending them. The keys used are themselves encrypted and cannot be used or analyzed by other programs. Diagram 1: The main page of the Mujahidin Secrets program produced by the Technical Security Unit of the GIMF

and asymmetrical encryption can be used to protect the symmetrical encryption key. To compare the strength of the<br />

keys with respect to the types of encryption, it is enough to note that a key 256 bits long in a symmetrical algorithm<br />

corresponds to a 15360 bit long asymmetrical algorithm key such as RSA.<br />

With respect to communication networks, email is considered one of the most important modern methods to<br />

exchange messages, be they encrypted or not. In order to safeguard the person communicating, the following<br />

conditions must be adhered to in dealing with email used for secret issues:<br />

1. Do not use American email (Yahoo, Hotmail, etc).<br />

2. Never use your regular personal email, but set up an email specifically for the exchange of sensitive<br />

messages.<br />

3. When registering an email address for private matters, never enter accurate information. Instead, give<br />

fictitious information (name, address, date of birth, gender, etc).<br />

4. Do not log into your private email directly from your machine. A proxy must be used to reach your private<br />

email so that even if your email is being monitored, the IP address that you use to check your email will be<br />

one far away from your location. That is because every IP address in the world is registered in global<br />

databases and knowing the [IP] number used by your computer is like knowing your address. The [IP]<br />

number leads to the internet service provider and the company leads those inquiring about you, to you.<br />

2. About E-mail encryption<br />

The following is a primer on how e-mail encryption works. This encryption is based on a Public Key cryptography<br />

algorithm that requires two keys, Public and Private. The Public key is used for encrypting the data while the<br />

Private key is used for the recipient to decrypt the encrypted message. The two keys work together in what is called<br />

key-ring. Both keys are required to complete the ring.<br />

2.1 Encryption Strength:<br />

One of the main features of a strong encryption is the key length in bits. In Symmetric encryption, some countries<br />

allow only 128 bits encryption. The Unites States and Canada allow up to 256 bit encryption which is very<br />

uncommon. In Asymmetric encryption, serious information security requires a key of at least 1024 bit in length.<br />

Until now, messages encrypted with long keys are impossible to crack. A 1024 bit long RSA key, which is a key<br />

based on 309 long decimal numbers, are up to now impossible to crack based on the most recent research in<br />

computer science and prime numbers.<br />

[pg 52]<br />

A 512 bit long key required five months of continuous parallel processing of 292 powerful computers in 2000. A<br />

2048 bit key is billions of times stronger than 1024 bit key. The strength of the key also depends on an authentic<br />

key generation; this is why using foreign made software programs for key generation is very risky. Foreign<br />

companies that create programs for encryption key generation can access the private key using the public key.<br />

2.2 Public Key:<br />

After generating a public key and a private key, and protecting the private key with a "Passphrase" which we will<br />

explain later, you then need to publish the public key in a public area such as the forums, Internet websites, or<br />

servers especially provided for this purpose. Anyone interested in sending you an encrypted message is then able to<br />

simply take your public key to encrypt and send you the message. The message cannot be decrypted without the<br />

private key which is secret and only you have it. This means that you must first send your public key to any person<br />

wanting to send you an important message.<br />

2.3 Private Key

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!