Multiple encryption: Difference between revisions

Content deleted Content added
mNo edit summary
Worstbull (talk | contribs)
Removed unverifiable audit content based on non-notable, self-published PDF used only by this user (9 edits total, all on 18 July 2016), systematically promoting this source across multiple articles, using misleading edit summaries. Content was of extremely low quality and promotional tone.
Line 43:
 
The principle is practiced in the NSA's secure mobile phone called Fishbowl.<ref name=":0" /> The phones use two layers of encryption protocols, [[IPsec]] and [[Secure Real-time Transport Protocol]] (SRTP), to protect voice communications. The Samsung [[Galaxy S9]] Tactical Edition is also an approved CSfC Component.
 
==Examples==
The figure shows from inside to outside the process of how the encrypted capsule is formed in the context of Echo Protocol, used by the Software Application GoldBug Messenger.<ref>{{cite web |url=https://goldbug.sourceforge.net |title = GoldBug – Secure E-Mail-Client & Instant Messenger}}</ref> GoldBug has implemented a hybrid system for authenticity and confidentiality.<ref name=":0">Adams, David / Maier, Ann-Kathrin (2016): BIG SEVEN Study, open source crypto-messengers to be compared – or: Comprehensive Confidentiality Review & Audit of GoldBug, Encrypting E-Mail-Client & Secure Instant Messenger, Descriptions, tests and analysis reviews of 20 functions of the application GoldBug based on the essential fields and methods of evaluation of the 8 major international audit manuals for IT security investigations including 38 figures and 87 tables, URL: https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf – English / German Language, Version 1.1, 305 pages, June 2016 (ISBN: 110368003X – DNB: 2016B14779)</ref>
 
'''<u>First layer of the encryption:</u>'''
The ciphertext of the original readable message is hashed, and subsequently the symmetric keys are encrypted via the asymmetric key – e.g. deploying the algorithm RSA.
In an intermediate step the ciphertext, and the hash digest of the ciphertext are combined into a capsule, and packed together.
It follows the approach: [[w:Authenticated encryption#Encrypt-then-MAC|Encrypt-then-MAC]]. In order for the receiver to verify that the ciphertext has not been tampered with, the digest is computed before the ciphertext is decrypted.
 
'''<u>Second layer of encryption:</u>'''
Optionally it is still possible, therefore to encrypt the capsule of the first layer in addition with an [[w:Advanced Encryption Standard|AES-256]], – comparable to a commonly shared, 32-character long symmetric password. Hybrid Encryption is then added to multiple encryption.{{Citation needed|date=September 2022}}
 
'''<u>Third layer of the encryption:</u>'''
Then, this capsule is transmitted via a secure [[w:Transport Layer Security|SSL/TLS]] connection to the communication partner.
 
==References==