TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum
TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum
and asymmetrical encryption can be used to protect the symmetrical encryption key. To compare the strength of the keys with respect to the types of encryption, it is enough to note that a key 256 bits long in a symmetrical algorithm corresponds to a 15360 bit long asymmetrical algorithm key such as RSA. With respect to communication networks, email is considered one of the most important modern methods to exchange messages, be they encrypted or not. In order to safeguard the person communicating, the following conditions must be adhered to in dealing with email used for secret issues: 1. Do not use American email (Yahoo, Hotmail, etc). 2. Never use your regular personal email, but set up an email specifically for the exchange of sensitive messages. 3. When registering an email address for private matters, never enter accurate information. Instead, give fictitious information (name, address, date of birth, gender, etc). 4. Do not log into your private email directly from your machine. A proxy must be used to reach your private email so that even if your email is being monitored, the IP address that you use to check your email will be one far away from your location. That is because every IP address in the world is registered in global databases and knowing the [IP] number used by your computer is like knowing your address. The [IP] number leads to the internet service provider and the company leads those inquiring about you, to you. 2. About E-mail encryption The following is a primer on how e-mail encryption works. This encryption is based on a Public Key cryptography algorithm that requires two keys, Public and Private. The Public key is used for encrypting the data while the Private key is used for the recipient to decrypt the encrypted message. The two keys work together in what is called key-ring. Both keys are required to complete the ring. 2.1 Encryption Strength: One of the main features of a strong encryption is the key length in bits. In Symmetric encryption, some countries allow only 128 bits encryption. The Unites States and Canada allow up to 256 bit encryption which is very uncommon. In Asymmetric encryption, serious information security requires a key of at least 1024 bit in length. Until now, messages encrypted with long keys are impossible to crack. A 1024 bit long RSA key, which is a key based on 309 long decimal numbers, are up to now impossible to crack based on the most recent research in computer science and prime numbers. [pg 52] A 512 bit long key required five months of continuous parallel processing of 292 powerful computers in 2000. A 2048 bit key is billions of times stronger than 1024 bit key. The strength of the key also depends on an authentic key generation; this is why using foreign made software programs for key generation is very risky. Foreign companies that create programs for encryption key generation can access the private key using the public key. 2.2 Public Key: After generating a public key and a private key, and protecting the private key with a "Passphrase" which we will explain later, you then need to publish the public key in a public area such as the forums, Internet websites, or servers especially provided for this purpose. Anyone interested in sending you an encrypted message is then able to simply take your public key to encrypt and send you the message. The message cannot be decrypted without the private key which is secret and only you have it. This means that you must first send your public key to any person wanting to send you an important message. 2.3 Private Key
The private key is used to decrypt messages encrypted with a public key. You must protect this key in a secure location. Make copies of both the private and public key (Key-ring) and store them in a safe place, because if you lose these keys you will have no other way of recovering the encrypted data and messages. You should also generate other keys for future use. 3. Mujahidin Secrets Program The program Mujahidin Secrets offers absolutely the highest encryption level in asymmetrical encryption for exchanging messages and all sorts of files over networks. It is the first Islamicly produced program to provide this kind of encryption: 256-bit symmetric encryption and highly secret 2048-bit key asymmetric encryption. The program incorporates the highest pre-encryption data compression levels for size reduction. It uses a new technology called "stealthy encryption" that enables the program to randomly change the encryption algorithm every time a file is encrypted and to produce a random session key that changes each time, thus making it possible to thwart attempts to analyze encrypted files, since each file is encrypted with a different algorithm from the list of five algorithms that the program uses. Mujahidin Secrets uses the five algorithms chosen by encryption experts in the AES algorithm selection filters. All of them have keys of 256 bits. [pg 53] Asymmetric encryption technology allows public keys to be transmitted across the network. Public keys can be posted in jihadist forums. The key's fingerprint can be used to verify the identity of the communicating party. The public key can be used to encrypt files before sending them. The keys used are themselves encrypted and cannot be used or analyzed by other programs. Diagram 1: The main page of the Mujahidin Secrets program produced by the Technical Security Unit of the GIMF
- Page 1 and 2: [pg i - Cover] [pg ii] Why a Techni
- Page 3 and 4: [pg 1] Secret Communications: Hidin
- Page 5 and 6: 2. (1) Modifying the Bit (LSB Modif
- Page 7 and 8: After opening the carrier file with
- Page 9 and 10: After comparing the file for which
- Page 11 and 12: Example 1: The picture above, 512 x
- Page 13 and 14: Part 6: The same picture but after
- Page 15 and 16: Diagram 15: Statistical analysis co
- Page 17 and 18: How To Set Up a Jihadist Website fr
- Page 19 and 20: 9. Control panel: There are various
- Page 21 and 22: [pg 25] Smart Weapons: Short-Range
- Page 23 and 24: Diagram 4: Interior of a Blackhawk
- Page 25 and 26: Diagram 8: One of the mujahidin ste
- Page 27 and 28: target will try to evade the missil
- Page 29 and 30: "Length: 1.5 meters "Farthest effec
- Page 31 and 32: [pg 37]
- Page 33 and 34: Video Series - Question and Answer
- Page 35 and 36: adio signal) is drawn as high and l
- Page 37 and 38: All right, we will give some genera
- Page 39 and 40: [pg 46] Translating Movies with Sub
- Page 41 and 42: e. You will notice that the program
- Page 43: [pg 50] 'The Mujahidin Secrets Prog
- Page 47 and 48: Diagram 3: New Key Pair Generator w
- Page 49 and 50: Upon selecting a private key, you c
- Page 51 and 52: Diagram 10: Information about the p
- Page 53 and 54: Diagram 12: File Compression and Se
- Page 55 and 56: When you receive a file encrypted w
- Page 57 and 58: To increase the secrecy of the file
- Page 59: 3. If your article is not approved
and asymmetrical encryption can be used to protect the symmetrical encryption key. To compare the strength of the<br />
keys with respect to the types of encryption, it is enough to note that a key 256 bits long in a symmetrical algorithm<br />
corresponds to a 15360 bit long asymmetrical algorithm key such as RSA.<br />
With respect to communication networks, email is considered one of the most important modern methods to<br />
exchange messages, be they encrypted or not. In order to safeguard the person communicating, the following<br />
conditions must be adhered to in dealing with email used for secret issues:<br />
1. Do not use American email (Yahoo, Hotmail, etc).<br />
2. Never use your regular personal email, but set up an email specifically for the exchange of sensitive<br />
messages.<br />
3. When registering an email address for private matters, never enter accurate information. Instead, give<br />
fictitious information (name, address, date of birth, gender, etc).<br />
4. Do not log into your private email directly from your machine. A proxy must be used to reach your private<br />
email so that even if your email is being monitored, the IP address that you use to check your email will be<br />
one far away from your location. That is because every IP address in the world is registered in global<br />
databases and knowing the [IP] number used by your computer is like knowing your address. The [IP]<br />
number leads to the internet service provider and the company leads those inquiring about you, to you.<br />
2. About E-mail encryption<br />
The following is a primer on how e-mail encryption works. This encryption is based on a Public Key cryptography<br />
algorithm that requires two keys, Public and Private. The Public key is used for encrypting the data while the<br />
Private key is used for the recipient to decrypt the encrypted message. The two keys work together in what is called<br />
key-ring. Both keys are required to complete the ring.<br />
2.1 Encryption Strength:<br />
One of the main features of a strong encryption is the key length in bits. In Symmetric encryption, some countries<br />
allow only 128 bits encryption. The Unites States and Canada allow up to 256 bit encryption which is very<br />
uncommon. In Asymmetric encryption, serious information security requires a key of at least 1024 bit in length.<br />
Until now, messages encrypted with long keys are impossible to crack. A 1024 bit long RSA key, which is a key<br />
based on 309 long decimal numbers, are up to now impossible to crack based on the most recent research in<br />
computer science and prime numbers.<br />
[pg 52]<br />
A 512 bit long key required five months of continuous parallel processing of 292 powerful computers in 2000. A<br />
2048 bit key is billions of times stronger than 1024 bit key. The strength of the key also depends on an authentic<br />
key generation; this is why using foreign made software programs for key generation is very risky. Foreign<br />
companies that create programs for encryption key generation can access the private key using the public key.<br />
2.2 Public Key:<br />
After generating a public key and a private key, and protecting the private key with a "Passphrase" which we will<br />
explain later, you then need to publish the public key in a public area such as the forums, Internet websites, or<br />
servers especially provided for this purpose. Anyone interested in sending you an encrypted message is then able to<br />
simply take your public key to encrypt and send you the message. The message cannot be decrypted without the<br />
private key which is secret and only you have it. This means that you must first send your public key to any person<br />
wanting to send you an important message.<br />
2.3 Private Key