Here is what takes place as you type and send a message:
- PGP first compresses the plaintext. Data compression saves transmission time and strengthens the cryptographic security.
- PGP then creates a SessionKey, which is a one-time-only secret key. This key is randomly generated from the unique movements of your mouse and the keystrokes as you type the message. This Session Key works with a very secure encryption algorithm to Encrypt the Compressed Text.
- Once the Compressed Text is Encrypted with the Session key as described, the Session Key is then Encrypted to the Recipient’s Public Key. This Public Key encrypted Session Key is transmitted along with the Compressed Encrypted Message to the Recipient.
- When the message is received by the Recipient their copy of PGP uses their Private Key to Decrypt the temporary Session Key, which PGP then uses to decrypt and decompress the Encrypted Message soitcanberead.
As mentioned, Public Keys of Recipients you send a Message to are retrieved automatically by PGP Universal unless you have previously messaged with them in which case their Public Key is cached (stored) on your Smartphone. This is why anytime you have your keys remade, any users you previously messaged with must Clear their Cache because they would been crypting to your old Public key when sending you a message, which your new private key will not be able to decrypt. A Message Encrypted to your Public Key can only ever be Decrypted with your Private key because they are mathematically related. It is however impossible to derive the Private Key from having only the Public Key. The infrastructure Systems are certified as using GKM (GuardedKey Mode) – This means that the Users have an additional Passphrase on the system to protect their Private Keys. The User defined Secret Password on their device is also Encrypted to their Private Key for security and is required to unlock the private key for use in decrypting messages. A user can access the system at the point of sale and enter their own personalized Passphrase if desired. Servers automatically delete Encrypted Messages held every 6 hours to allow for users whose devices are off due to travel time etc to be able to retrieve their messages. When a user deletes a message manually on their Smartphone it is deleted throughout the system automatically.
Encryption Service for Mobile Devices
– Use Encrypted Wireless’ Encryption Service to Prevent Mobile Messages from being Read byThird Party Individuals.
– Information leaks cost Companies a fortune and Individuals their well being on a regular basis worldwide.
– Messages are Encrypted using Military Grade 4096 Bit PGP Encryption Technology.
– Messages are Encrypted on the Handheld, Sent through the Wireless Network and/or Internet and then Decrypted on the Recipients Handheld.
– Messages are Not Possible to Decrypt without Users Secret Private Key OnlyAccessible by their Private Password.
– Messages are Automatically Deleted from the System when a User deletes them from their handheld.
– Users Can Remotely Delete All Data on the Blackberry if the Unit is Lost as a Security Measure. – Unlimited World Wide Encrypted Email Service (Depends on Users Data Plan, however it’s Always Unlimited when Using Network Service sold by Encryption Service Provider)
– Use Wi-Fi In any Remote Area not Covered by a Mobile Carrier to Send Encrypted Messages. Traditional Communication Vulnerabilities and Comparison:
– Regular Email Messages (Non Encrypted) – Are Easily and Routinely Intercepted and Read by Third Party Individuals.
– Voice Calls – Are Routinely Intercepted and Monitored by Third Parties.
– Text Messages – Are Not Encrypted, Intercepted by Third Parties and Logged by Carriers for 7 Years.
– Pin to Pin Messages – Are Not Encrypted and can Be Intercepted and Logged. There are Monitoring Software’s that identify Keywords of “Interest” and then Log an Individuals PIN for Monitoring of what they Talk about and what other PINs they Talk with. A PIN is Physically Attached to the Blackberry Device like a serial number whereas an Email is Not and can be moved to another Device Anytime. Once someone has a PIN of “Interest” they could also track your device whereas with Encrypted Email there would be no “interest” in the first place because the messages are not possible to be Intercepted and Read.