Secure Private Email from Cyber-Rights.net


Sign Up Free
About
Privacy Policy
Press Releases
Contact

Home
An overview of the process of sending a Cyber-Rights.Net Message

(taken from the HushMail website):

1. The Hush user (or the Cyber-Rights.Net user) downloads the Hush applet via the World Wide Web, having entered his or her address name.

2. The Hush applet, running on the client machine, requests the user's passphrase.

3. The passphrase is entered. Then, it is securely hashed. Part of this hash is sent to the HushMail server for user validation.

4. Only if the partial hash is valid, will the HushMail server send the client Hush applet the Hush user's public key and encrypted private key.

5. The Hush applet symmetrically decrypts the encrypted private key into its plaintext form.

6. The Hush user enters the system and can view email, create address aliases, compose email, and utilize other features of the HushMail service (Cyber-Rights.Net service).

7. When the Hush and/or Cyber-Rights.Net user composes and sends a message, the Hush applet contacts the HushMail server and downloads the recipient's public key.

8. If the recipient is in the sending Hush user's address book, it compares the public key values against an electronic fingerprint for extra security.

9. The body of the email message being sent is symmetrically encrypted with a randomly generated session key.

10. Using the recipient's public key, the random session key is asymmetrically encrypted and added to the message that is sent to the recipient.

11. The entire message is sent to the HushMail server, which sends the message out to the Internet using SMTP.

12. When the recipient reads the message, the recipient's private key will decrypt the session key, which will yield access to the plaintext message itself.

Some finer clarifications:

1a. Refer to 1a under the "Address Creation Process" section of this document. Please note a different applet is used in this example.

2a. The passphrase is never transmitted from the client machine.

3a. The HushMail server only releases encrypted private keys to strongly validated users. This limits possible risk of high-speed, brute force attacks trying to recover either the Hush user's passphrase or plaintext private keys. If the HushMail server detects multiple tries in a short period, such as someone trying to guess a user passphrase, it will notify a system administrator and/or temporarily stop accepting requests from that address name and/or IP address.

4a. This operation is the same as 5a, except in the reverse.

5a. All public keys of HushMail users are available. They are retrieved during the encryption process, prior to transmission of the encrypted message

6a. If a sending Hush user distrusts the HushMail server itself, the sender may put the recipient address in his or her address book. By doing so, the sender can view the hash (or "fingerprint") of the recipient's public key before sending the message. Both sender and recipient may exchange fingerprint information at any time, any way they wish.

7a. The randomly generated Blowfish algorithm is 128-bits long. It is created by differences in keystroke timing from the Hush user after being securely hashed with SHA multiple times.

8a. The HushMail message format is a hybrid symmetric encryption/public system, created for speed and efficiency. Once messages have been read, they are stored via symmetric encryption. The session key is stored in the email header. Messages sent to oneself are symmetrically encrypted only.


Powered by Cyber-Rights
Powered by HushMail Private Label