In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals.
Previous technologies have failed in practice because they were too expensive or not user friendly enough. Fraunhofer has launched an open initiative called “Volksverschlüsselung” with the aim of bringing end-to-end encryption to the masses. Fraunhofer researchers will be presenting a prototype of their easy-to-use software and the infrastructure concept behind it at CeBIT 2015 (Hall 9, Booth E40).
Encryption is the most effective antidote to unwarranted, mass surveillance of people, companies and authorities. Although there are any number of computer programs designed to, say, make e-mail communication more secure, most people find them to be too much of a hassle. This is why the German government made establishing universal and easy-to-use encryption part of its Digital Agenda. A research team from the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt developed a public encryption concept that factors in user friendliness from the outset. The software automatically installs the cryptographic keys in the right places on your computer. The researchers are also working on an infrastructure that will be available to everyone and is compatible with existing encryption services.
“With this initiative and what it’s developing, Fraunhofer is supporting the German government’s efforts to better protect people and companies,” says Prof. Michael Waidner, Head of Fraunhofer SIT. This is why “Volksverschlüsselung“ is to be made available as open-source software.
Key allocation for beginners
The software is the centerpiece of the solution. It relieves the user of the previously difficult task of allocating keys by recognizing which applications – different e-mail programs, for example – on your computer, smartphone or tablet can use cryptography and automatically allocates the right key to each one. The software also generates cryptographic keys that can be used to encrypt e-mails or files.
If you want to send someone an encrypted e-mail, you need the public key. In the “Volksverschlüsselung“ model, you can obtain this from the central infrastructure. “It works like a phone book,” says project manager Michael Herfert. “Anyone can look up and download public keys. The central infrastructure also ensures that the keys actually belong to the person requesting them and helps prevent identity fraud.”
Read more: Encryption for everyone
The Latest on: Encryption
via Google News
The Latest on: Encryption
- Mobile Encryption Market Competitive Research And Precise Outlook 2019 To 2025on November 30, 2019 at 2:01 am
Nov 30, 2019 (Market Insight Reports via COMTEX) -- The Mobile Encryption Market Perspective, Comprehensive Analysis along with Major Segments and Forecast, 2019-2025. The Mobile Encryption Market ...
- NordVPN Black Friday deal: Save over £500 and get a free file encryption toolon November 29, 2019 at 8:04 am
To avail of it, you'll need to act quickly though because this flash sale won't last for long. With it, you won’t need to worry about owning a great VPN service or a robust file encryption service ...
- At 18% CAGR, Mobile Encryption Market Size is Expected to Exhibit 2590 million USD by 2024on November 28, 2019 at 8:57 pm
Nov 29, 2019 (AmericaNewsHour) -- Market Study Report has announced the launch of Mobile Encryption market, a comprehensive study enumerating the latest price trends and pivotal drivers rendering a ...
- Cherry Secure Board 1.0 with keystroke encryptionon November 28, 2019 at 1:56 am
If you would like to protect your keystroke privacy you may be interested in a new keyboard created by Cherry the form of the Secure Board 1.0 equipped with keystroke encryption. The security features ...
- Interpol group delays criticism of encryption after objectionson November 27, 2019 at 11:41 am
The international police organization Interpol put off plans to condemn the spread of strong encryption after objections by tech companies and civil liberties advocates, according to two people ...
- Some Fortinet products shipped with hardcoded encryption keyson November 25, 2019 at 2:40 pm
Fortinet, a vendor of cyber-security products, took between 10 and 18 months to remove a hardcoded encryption key from three products that were exposing customer data to passive interception. The ...
- Mike Stuart: Warrant-proof encryption threatens childrenon November 23, 2019 at 9:47 pm
Regrettably, politically unaccountable executives running big social media companies are making business decisions — like the decision to implement “warrant-proof” encryption — that could seriously ...
- Google Cloud sets out new encryption controls as it looks to grow in Europeon November 20, 2019 at 7:30 am
Several security announcements aimed to back this claim. Google's customers can already keep all the copies of their data stored in Europe; the information is encrypted by default, and users can also ...
- Google Cloud gets new security smarts across data encryption, network security, and moreon November 20, 2019 at 1:18 am
Google has announced a number of notable new tools and services as the internet giant doubles down on enterprise security across its cloud products. The announcements were made in London at the U.K.
- What Is End-to-End Encryption? Another Bull’s-Eye on Big Techon November 19, 2019 at 2:52 pm
While a department spokesman declined to discuss specifics, a speech Monday by the deputy attorney general, Jeffrey A. Rosen, pointed toward heightened interest in technology called end-to-end ...
via Bing News