PGP Encryption Cell Phones
As mentioned, Public Keys of Recipients you send a Message to are retrieved automatically by PGP Universal unless you have previously messaged with them in which case their Public Key is cached (stored) on your Smartphone. This is why anytime you have your keys remade, any users you previously messaged with must Clear their Cache because they would be encrypting to your old Public key when sending you a message, which your new private key will not be able to decrypt.
A Message Encrypted to your Public Key can only ever be Decrypted with your Private key because they are mathematically related. It is however impossible to derive the Private Key from having only the Public Key.
The infrastructure Systems are certified as using GKM (Guarded Key Mode) – This means that the Users have an additional Passphrase on the system to protect their Private Keys. The User defined Secret Password on their device is also Encrypted to their Private Key for security and is required to unlock the private key for use in decrypting messages. A user can access the system at the point of sale and enter their own personalized Passphrase if desired.
Servers automatically delete Encrypted Messages held every 6 hours to allow for users whose devices are off due to travel time etc to be able to retrieve their messages. When a user deletes a message manually on their Smartphone it is deleted throughout the system automatically.
PGP Encryption Service for Mobile Devices
– Use Encrypted Wireless’ Encryption Service to Prevent Mobile Messages from being Read by Third Party Individuals.
– Information leaks cost Companies a fortune and Individuals their well being on a regular basis worldwide.
– Messages are Encrypted using Military Grade 4096 Bit PGP Encryption Technology.
– Messages are Encrypted on the Handheld, Sent through the Wireless Network and/or Internet and then Decrypted on the Recipients Handheld.
– Messages are Not Possible to Decrypt without Users Secret Private Key Only Accessible by their Private Password.
– Messages are Automatically Deleted from the System when a User deletes them from their handheld.
– Users Can Remotely Delete All Data on the Blackberry if the Unit is Lost as a Security Measure.
– Unlimited World Wide Encrypted Email Service (Depends on Users Data Plan, however it’s Always Unlimited when Using Network Service sold by Encryption Service Provider)
– Use Wi-Fi In any Remote Area not Covered by a Mobile Carrier to Send Encrypted Messages.
Traditional Communication Vulnerabilities and Comparison:
– Regular Email Messages (Non Encrypted) – Are Easily and Routinely Intercepted and Read by Third Party Individuals.
– Voice Calls – Are Routinely Intercepted and Monitored by Third Parties.
– Text Messages – Are Not Encrypted, Intercepted by Third Parties and Logged by Carriers for 7 Years.
– Pin to Pin Messages – Are Not Encrypted and can Be Intercepted and Logged. There are Monitoring Software’s that identify Key words of “Interest” and then Log an Individuals PIN for Monitoring of what they Talk about and what other PINs they Talk with. A PIN is Physically Attached to the Blackberry Device like a serial number whereas an Email is Not and can be moved to another Device Anytime. Once someone has a PIN of “Interest” they could also track your device whereas with Encrypted Email there would be no “interest” in the first place because the messages are not possible to be Intercepted and Read.
Pretty Good Privacy
Every user has an unique private and public key pair. Sending a message requires the encryption of the Public Key of the recipient. This is retrieved from the PGP Universal Server infrastructure. If you have previously messaged your recipient, then it will be retrieved from your handset’s memory cache.
How does it work?
The sequence of events taking place in PGP encryption is as follows:
- The first task of PGP is to compress the plain text. Compressing data bolsters cryptographic security and saves valuable transmission time.
- A Session Key is then created by PGP. This is a single time secret key. The session key generated in a random manner from unique movements of your computer’s mouse and the keystrokes as the message is typed. The Session Key functions in tandem with an extremely secure encryption algorithm and the compressed text is encrypted.
- Once encryption is complete, Session Key is encrypted with the Public Key of the recipient. This Session Key is then transmitted to recipient with the previously compressed and encrypted message.
- When the recipient receives the message key, the PGP copy decrypts the temporarily generated Session Key by using the copy of the Private Key. The message after decryption and decompress can be read.
It is to be noted that recipients’ public keys are automatically retrieved if you have messaged them before. In such cases, Public Key of your recipient is stored or cached on smartphone. This is the reason when you remake your keys, any user whom you have messaged previously must clear his or her phone’s cache. If this is not done, the user will be encrypting bases on the old Public Key when sending you a message. In this case, it will not be possible for you to decrypt the message.
Any message encrypted to the Public Key used by you can exclusively be decrypted with the Private Key used by you. However, it is not possible to create the Private Key after getting access to the Public Key.
Guarded Key Mode (GKM) certified infrastructure means that users have access to an extra pass-phrase to protect their respective Private Keys. The password defined by the user on his or her device is encrypted to the Private Key for purposes of security and must be available to unlock Private Key for decrypting the messages. An user could input their own pass-phrase if he or she wants to do so to enter the system.
Encrypted messages are automatically deleted by the servers at six-hour intervals. This is done to permit users whose handsets are turned off for purposes of travel and other necessities to retrieve messages. If a message is deleted manually by a user on a smartphone, then it automatically gets deleted all over the system.
The location of the infrastructure data center can be found out by visiting any website, which does a “trace route”. The search terminates in the infrastructure hosting country.
Mobile or cell phone device specific encryption services
- Use the PGP encryption service offered by BlackBerry Secure to stop the unauthorized reading of messages by third parties.
- Leak of sensitive information leads to companies losing substantial amounts of money.
- Military standard 4096 Bit encryption is used to secure messages.
- A message is encrypted on the handheld device itself and transmitted via internet or wireless network. It is then subjected to decryption on the device of the recipient
- It is not possible to decrypt the messages without utilizing the secret private key of the user. This key can only be accessed by inputting a private password.
- When an user deletes messages in the handheld device, it automatically gets erased from the system.
- An user can delete all data on the BlackBerry by remote means if the handheld device is lost. This is an excellent security measure.
- Unlimited world coverage is possible on the encrypted service. It is to be remembered that this convenience is dependent on the data plan chosen by the user.
- Wi-Fi can be accessed in any remote location not covered by the mobile carrier. This can be used to transmit encrypted messages
EncryptYourMobile is a well-known firm specializing in PGP encryption. We offer the latest technology to meet all your communication needs. Our encrypted handsets are available in USA, Canada, Thailand, Spain, UK , Mexico, Panama, Dominican Republic and Australia.