Helpful Definitions

The following is a list of words that appear in the StealthMessaging Web site. StealthMessaging's definitions are derived from a variety of resources, people, and internal discussions. They are intended as a resource for StealthMessaging users or other interested parties. This list will grow and change as needed.

Beta Testing- Beta Testing is the second stage in testing new software. A company makes new software available to selected users, who try out the software under normal operating conditions in the kind of environment in which it will be used.
Blowfish Algorithm- The name, "Blowfish Algorithm", is simply a name for a type of 128-bit encryption method. The more technical definition of a Blowfish Algorithm adds that this particular algorithm is a symmetric block cipher with a 128-bit key. When combined mathematically with a user's StealthMessaging passphrase, the Blowfish algorithm encrypts the user's private key. This occurs before the key is stored on StealthMessaging's secure key server. The only thing that can decrypt the private key is a StealthMessaging user's passphrase combined with the Blowfish algorithm.
Encryption- Encryption is a mechanism designed to protect sensitive information. Encryption that protects digital information, i.e. StealthMessaging, works by scrambling and encoding information so that the proper recipient is the only party who reads an email message.
1024-bit Encryption- 1,024 refers to the length in bits of the StealthMessaging user's private key in the StealthMessaging public/private key cryptosystem. This private key is created from the random numbers generated with a StealthMessaging user's mouse during address creation. The longer the private key is, the harder it is to guess, and so, the more secure the message. In public/private key encryption, 1,024-bit keys are considered unbreakable with current technology.

(Technical Note: In strictest terms, the strength of the ElGamal cipher is actually determined by the length of the modulus, but since that directly affects the length of the private key, we refer to the private key for simplicity.)

Java Applet- In the simplest terms, a Java applet is a mini-program that exists inside a Web browser, like Netscape ™ or Internet Explorer ™. The Java applet that StealthMessaging uses allows email messages to be decrypted and encrypted before being sent to the Internet.
SSL (Secure
Sockets Layer)-
A protocol from Netscape Communications Corporation ™, which is designed to provide secure communications on the Internet. SSL is a protocol that encrypts data during its transfer from one point to another. Data is encrypted at point A, sent across a network, and decrypted at point B. If you send a message over SSL, it will arrive at the designated server, be decrypted, and remain there unprotected until taken off of the server.
Public/Private Key Encryption- Public/private key encryption is an encryption system in which a public key is used to encrypt data and a private key is required to decrypt the data. In public/private key encryption, keys must be long to protect against mathematical attacks. So, 1,024-bit keys protect StealthMessaging users. The public and private keys of StealthMessaging users are both stored on the StealthMessaging servers. However, before the private key is stored on the StealthMessaging servers, the private key is first encrypted on the individual user's machine by his or her passphrase, so even StealthMessaging employees cannot access user passphrases.
Symmetric Encryption - Symmetric encryption is a type of encryption, in which a single key is used for both encryption and decryption. In symmetric encryption, a 128-bit key is considered unbreakable with current technology.

 

Last modified - 21 July 2000