Encryption Wizzard Manual
Encryption Wizzard Manual
2 User Guide
Table of Contents
1. 2. 3. 4. 5. General Information .................................................................................................... 3 System Requirements.................................................................................................. 3 Recommended Use ..................................................................................................... 3 Installation and Setup .................................................................................................. 3 Using Encryption Wizard ........................................................................................... 4 5.1. Launching Encryption Wizard ............................................................................. 4 From a Windows Explorer window ............................................................................ 4 From a Windows or Linux command prompt............................................................. 4 5.2. Encrypting a File .................................................................................................. 4 Selecting a File to Encrypt .......................................................................................... 4 Selecting the Key Type ............................................................................................... 5 Encrypting with a Passphrase ..................................................................................... 5 Encrypting with PKI Certificate(s) ............................................................................. 6 Adding File Metadata ................................................................................................. 7 5.3. Decrypting a File .................................................................................................. 7 5.4. Encryption Wizard Archives ................................................................................ 8 Selecting Files for an Archive..................................................................................... 8 Creating an Archive .................................................................................................... 8 Selecting the Keying Material for an Archive ............................................................ 9 Expanding the Archive ............................................................................................... 9 6. Additional Features and Options .............................................................................. 10 6.1. Hotkeys............................................................................................................... 10 6.2. Command Line Options ..................................................................................... 11 6.3. Associating the .wzd and .wza file extensions ................................................... 11 6.4. Selectable Options .............................................................................................. 12 6.4.1. Selecting the default encryption/decryption behavior .................................... 12 6.4.2. Selecting the default file deletion behavior .................................................... 13 6.4.3. Disabling the metadata request dialog ............................................................ 13 6.5. Optional Key Escrow ......................................................................................... 13 7. Licensing ................................................................................................................... 13 8. Obtaining Support ..................................................................................................... 13
1. General Information
Encryption Wizard is a Java-based file encryption program that can be used to quickly and easily encrypt sensitive files. It is an easy to use tool for protecting sensitive (but not classified) documents1, and for protecting files before transmission via email. It allows a user to encrypt files using a 128-bit implementation of the Advanced Encryption Standard (AES) with simple drag-and-drop efficiency. Encryption Wizard can significantly increase an organizations security posture at little to no cost to protect sensitive data in transit (E-mail, FTP, or shared web folders) or at rest on a removable storage device. The primary version for government users utilizes a FIPS 140-2 validated encryption engine licensed from RSA Security.
2. System Requirements
Any operating system capable of running the Oracle Java Runtime Environment (e.g.: Windows, Linux, MacOS). Oracle Java Runtime Environment (JRE) 1.5 or greater. Encryption Wizard is often distributed on a CD-ROM that contains a copy of the most current version of the JRE, which can also be downloaded from http://www.java.com. Oracle does not currently support smart cards via the PKCS#11 interface on 64-bit Microsoft Windows systems; this means that EW does not currently support CAC/PIV on PLEASE Windows x64 editions. See section 2.1 of the following for details: NOTE: http://download.oracle.com/javase/6/docs/technotes/guides/security/p11guide.html#Requi rements
3. Recommended Use
The AFRL/RY ATSPI Technology Office recommends the use of this tool for the protection of all sensitive data when in transit or at rest.
Encryption Wizard is approved for use on some classified networks for enforcing need-to-know within the network. EW has not been certified to render classified materials as unclassified when encrypted. ATSPI Technology Office Encryption Wizard User Guide
5.2.
Encrypting a File
When using the DoD CAC, always use the Encryption Certificate this is the only certificate that is kept in escrow by DISA for later retrieval. If you NOTE: encrypt your data with any other certificate, you may not be able to decrypt the file if you have been issued a new CAC. If the file is encrypted with only a third partys PKI certificate, then only the holder of that PKI certificate will be able to decrypt the file. For example: If NOTE: a file is encrypted with only the PKI certificate of the Secretary of Defense, then only the Secretary of Defense can decrypt the files. If you want to be able to decrypt the file, you will need to add your own public key.
The original file will be decrypted and restored to the original filename and extension.
Creating an Archive
Name the archive by entering a filename; a user may also optionally select a path for the archive using the Browse button. Compression is enabled by selecting the Compress checkbox (see Figure 6). The encrypted archive file is given a .wza file extension (e.g.: filename.wza).
Figure 7: Choosing an Encryption Wizard Archive to Expand ATSPI Technology Office Encryption Wizard User Guide
Next, specify the directory in which to expand the archive (see Figure 8). Selecting Next >> expands the archive to the specified directory.
Key material selection is the same as for an encrypted file, see Section 5.3.
6.1.
Hotkeys
Hotkeys provide a quick way to access the main features of Encryption Wizard. To use a hotkey, simply type the hotkey while the Encryption Wizard window is the active window: a r e d c l Del F1 Ctrl-A Esc Add files to the file list Refresh files in the file list Encrypt selected unencrypted files in the file list Decrypt selected encrypted files in the file list Archive the selected files in the list Access the Encryption Wizard log Remove selected file(s) from the file list Access the help system Select all the files in the file list Deselect all files in the file list
ATSPI Technology Office Encryption Wizard User Guide
10
6.2.
Encryption Wizard has command line counterparts for most GUI operations. The command line interface may be used to encrypt files, decrypt files, and to create archives. The general command line format is as follows. All operations and options must start with a '-' (hyphen).
h e d a ARCHIVE_NAME x DEST_PATH s
Print a help message that lists available options and operations Encrypt files Decrypt files Create an archive named ARCHIVE_NAME Expand an archive to the path DEST_PATH Let Encryption Wizard guess what to do based on the input file types
c p PASSPHRASE v
The user may select one of the following operations to perform: encryption, decryption, archive creation, or archive expansion. The archive functions require a path argument to tell Encryption Wizard either what the name of the archive file should be, or where to store files that are expanded from an archive.
6.3.
(The following features are limited to Microsoft Windows.) A user can associate the .wzd and .wza extensions with Encryption Wizard. This will allow Windows Explorer to display a special icon for Encryption Wizard files, and allow Encryption Wizard to be executed when a .wzd or .wza file is double-clicked. This feature also adds Encryption Wizard as a Send To destination (access Send To by right-clicking on a file in Explorer).
11
To associate Encryption Wizard to its file types and add it to the list of Send To destinations: From the toolbar, select Tools Select Install This feature does not currently work with the FDCC/SDC unless the user is an administrator. However, the registry changes needed to achieve these effects could easily be pushed out across an enterprise. Please contact the ATSPI Technology Office for details.
NOTE:
6.4.
Selectable Options
Encryption Wizard includes a number of configuration options that will be stored in the users application preferences directory. Figure 9 illustrates these options.
12
6.5.
Encryption Wizard also supports optional key escrow. The key escrow feature permits enterprises to embed a PKI key of their choosing into every file created by Encryption Wizard in their organization. This would permit the organization to recover encrypted data in the event that the original passphrase and/or PKI keys were lost or otherwise unavailable. This capability is referred to as Encryption Wizard Enterprise Edition. As of this writing, this feature must be enabled by the ATSPI Technology Office, see contact info in Section 8.
7. Licensing
Encryption Wizard is available in two forms: one that includes a FIPS 140-2 validated encryption engine (EW-Govt) and another that relies on the encryption capabilities native to a users Java Runtime Environment (EW-Public). The FIPS 140-2 validated version of Encryption Wizard contains a cryptographic module licensed from RSA. The FIPS version may only be executed by US Government employees or contractors under contract with the US Government and is for use on data for official government use. It may only be distributed by ATSPI and by designated ATSPI distribution authorities. Users may NOT examine code contained in the RSA licensed cryptographic module contained in the FIPS version. Information regarding RSAs FIPS 140-2 validation may be found here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#820
8. Obtaining Support
Encryption Wizard support is available by contacting the ATSPI Outreach office. AFRL/RY ATSPI Technology Office [email protected] http://spi.dod.mil
13
Appendix A Obtaining copies of your old (escrowed) CAC certificates to decrypt old files
NOTE: This documentation is supplementary and is not fully tested across the DoD This document describes how to obtain expired or retired personal DoD PKI certificates from the escrow facilities at DISA, and use them to open files encrypted with the older PKI certificates with Encryption Wizard.
Summary of steps: 1. Obtain older PKI key from escrow 2. Prepare key for use with Encryption Wizard 3. Use with Encryption Wizard 1. Obtaining personal DoD PKI certificates There is both an automated and manual process. Full instructions and assistance can be received from your agency/service PKI helpdesk. Follow directions here2: https://afpki.lackland.af.mil/html/keyrecovery.cfm 2. Preparing an escrow certificate for use with Encryption Wizard Due to a bug either in Encryption Wizard or with the escrow certificates, you must first import the escrow key into Internet Explorer, and then export it into PKFX format to use it with Encryption Wizard. 2.1. Follow these instructions provided by the Air Force PKI Office to import the certificate into Internet Explorer (steps 12-22 of https://afpki.lackland.af.mil/assets/files/CI-07-02-002_Automated_Email_Encryption_Key_Recovery_QRG_V1100.doc) 2.2. Export the Certificate from Internet Explorer to PFX format 2.2.1. Open IE; Select Tools->Internet Options; click Content tab; click Certificates; Select escrowed certificate; Select export
Since AFRL is an Air Force unit, the following instructions reference instructions from the Air Force PKI office. They are provided in the hope that they will be of assistance to you.
ATSPI Technology Office Encryption Wizard User Guide
15
2.2.4. Choose a password it can be the same as the 16-character one from DISA or a unique one
16
2.2.7. Next, use the passphrase you used back in Step 19 of the AF PKI guide to import the DISA certificate into Internet Explorer
17
3. Use exported PFX key with Encryption Wizard 3.1. Open the file encrypted with the old PKI key in Encryption Wizard
18
3.3. Select the PFX file exported in step 2.2.5 (NOTE: you will need to expand the file selection filter to all files not just .p12 files)
19
20