|
Helpful Definitions
The following is a list of words that appear in the StealthMessaging
Web site. StealthMessaging's definitions are derived from a variety
of resources, people, and internal discussions. They are intended
as a resource for StealthMessaging users or other interested parties.
This list will grow and change as needed.
Beta Testing- |
Beta Testing is the
second stage in testing new software. A company makes
new software available to selected users, who try out
the software under normal operating conditions in the
kind of environment in which it will be used. |
Blowfish Algorithm- |
The name, "Blowfish
Algorithm", is simply a name for a type of 128-bit encryption
method. The more technical definition of a Blowfish Algorithm
adds that this particular algorithm is a symmetric block
cipher with a 128-bit key. When combined mathematically
with a user's StealthMessaging passphrase, the Blowfish
algorithm encrypts the user's private key. This occurs
before the key is stored on StealthMessaging's secure
key server. The only thing that can decrypt the private
key is a StealthMessaging user's passphrase combined with
the Blowfish algorithm. |
Encryption- |
Encryption is a mechanism
designed to protect sensitive information. Encryption
that protects digital information, i.e. StealthMessaging,
works by scrambling and encoding information so that the
proper recipient is the only party who reads an email
message. |
1024-bit Encryption- |
1,024 refers to the
length in bits of the StealthMessaging user's private
key in the StealthMessaging public/private key cryptosystem.
This private key is created from the random numbers generated
with a StealthMessaging user's mouse during address creation.
The longer the private key is, the harder it is to guess,
and so, the more secure the message. In public/private
key encryption, 1,024-bit keys are considered unbreakable
with current technology.
(Technical Note: In strictest terms, the strength of
the ElGamal cipher is actually determined by the length
of the modulus, but since that directly affects the
length of the private key, we refer to the private key
for simplicity.)
|
Java Applet- |
In the simplest terms,
a Java applet is a mini-program that exists inside a Web
browser, like Netscape ™ or Internet Explorer ™.
The Java applet that StealthMessaging uses allows email
messages to be decrypted and encrypted before being sent
to the Internet. |
SSL (Secure
Sockets Layer)- |
A protocol from Netscape
Communications Corporation ™, which is designed
to provide secure communications on the Internet. SSL
is a protocol that encrypts data during its transfer from
one point to another. Data is encrypted at point A, sent
across a network, and decrypted at point B. If you send
a message over SSL, it will arrive at the designated server,
be decrypted, and remain there unprotected until taken
off of the server. |
Public/Private Key Encryption- |
Public/private key encryption
is an encryption system in which a public key is used
to encrypt data and a private key is required to decrypt
the data. In public/private key encryption, keys must
be long to protect against mathematical attacks. So, 1,024-bit
keys protect StealthMessaging users. The public and private
keys of StealthMessaging users are both stored on the
StealthMessaging servers. However, before the private
key is stored on the StealthMessaging servers, the private
key is first encrypted on the individual user's machine
by his or her passphrase, so even StealthMessaging employees
cannot access user passphrases. |
Symmetric Encryption - |
Symmetric encryption
is a type of encryption, in which a single key is used
for both encryption and decryption. In symmetric encryption,
a 128-bit key is considered unbreakable with current technology.
|
Last modified -
21 July 2000
|
|