client. Even secure, self-contained extranet systems may seem vulnerable.

Encryption Software

How may lawyers maintain the confidential nature of e-mail exchanges with
clients? One simple solution is to encrypt or encode your messages.

Today, encryption is no longer limited to government agencies with three-
letter names and supercomputers. Thanks to Philip Zimmermann, an academic and
commercial cryptographer/software engineer with a passion for civil rights and
privacy, anyone with access to the Internet may now download free, for personal
use, the latest version of PGP, the most widely used e-mail encryption software in
the world. The following description of PGP and its operation is taken from PGP
for Personal Privacy—Version 5.5, User’s Guide
(“PGP Guide”) and “Frequently
Asked Questions” at multiple locations on the Web.

PGP or Pretty Good Privacy™ is a high-security, cryptographic software
application that allows people to exchange messages, with both privacy and
authentication. Privacy means that only those intended to receive a message can
read it. In the law office context, messages are to be read only by the lawyer and
the client or, increasingly, the lawyer and a court or regulatory agency. By
providing the ability to encrypt messages, PGP provides protection against anyone
reading the message as it passes along the transmission network. Even if a packet
is intercepted, it will be unreadable to the snooper.

Sample Encrypted Message

-----Here is an example of an encrypted message—actually the next paragraph:

-----BEGIN PGP MESSAGE-----

Version: PGPfreeware 7.0.3 for non-commercial use < http://www.pgp.com>

qANQR1DBwE4DnN4Q2+NuhcwQA/94FrmSWdzzjg3UCOvWzlcOUSHmZatJab
DnWy+6LcGKOtVAGjwbmlUz26b7X6mWxlH/NSIu35Px1wYAMlm9YOpgwxC
cEdKPoLVn+SG2jYWAjHAbxlZUFfHdDMuVQiK3Dg2w0S+oNQJ9ogpmPUo3
neCrDTeHmOTTIMrTiso/bscxbwP8CvXcvM8QZbgoSErklggMSuSXGG8BV4KJ
luhatXt0QQ7IXeaajCn0wo8IvMIgTrvTOC2+92aMoA/vRa3SB38jlhGOZFWVm/
bjLs4irg8EESA50bpU3B+LdzjxV3PTulogkMWRFhIsq5kyw1D0+vKe3q04mHvb
zHUz46oeWO3dh5vJwqCn/WCJOtXv4oqbk51dN6oB8RBPA26MAPoZvmK98m
8YZSXwZsM44xjKHWZsobrfcJMOy/1M6oahxxvYAon8u2sJ8DxTOEocqImiuqv
dQ7hronEfQURODEz+KJW5hwQoxc/6LT42Lb3PfDj9KChCIqn1mbBU7HlW5X
VXZh4XyleZyhl4c/yGAKlfESpRqucbeSmv457kFk0Nortmo0VKVI+cExARyPN
GwX+QEWB3eZY9AEsFtNW3zknJC8zbtItVkW7PAC+jmUvRFD3bddITSLJRZ
0j+13Dzl0bb2TcRDNFBXYosAPtYbxH+FSlnvJhceAUQpLWypVaoku3TaDHlw
pJM7f0cbn/pQNh+PNM1+LzHoNd899coEOGyM0e+VppQbmkDPaLFxBZOtfjR
SgZW2urf0LrlmH7EArqpAA3dG+92A4lslOPEf80vkRMU9oouFdd6aepFn6jiluus
mzeGqF7QcFCahcfE9s6zcHDWBHxtEgMbTcJZLR8+O3a2/JXghdgwll+2TXrzM
dmi9W5OGBD6oI5mSRdcvNJepmfWy54R37i7GhMxtI6WboSQaLTa7Zq3biRZn
ZF8JE2q9Zmqo3tj+vfX1w3kfhEBBH6j+YMI70XtORi1h97mESPrmdTZYeAUS
S/8H9KISr/uExO7cThCF+MNq4FV7/Wopfjt3Dt8DRqxyWXMbDPY+sQ+YSA
WFq6dD0njqerT2Px7yvGPI9+/CarUKZ9tswmhTE2/QrfaCqY3ud5TMkcGkWuw
Ng62y2PFBxrt2bw6
r0kr10Hs3nDS8xhJqHsmrK1nezBXgtb7cCqnF2/3ws1tgFPfZaARE0Wku8Wt2oW
C2IqPUQL85GOAlhaSqEnhK7r+0YMCTVcfzt/DGTJjj3OmqhUshrsmCr73oW53
045NziY9FRDdRBKfoGItpF8f/9aZt3A/g6DOZkDut/G2YTpIBQ8H6dFH7rzj/Abl
ArKmKg2tFU2iTN+GT8bfYUw6QPH8abpHJ5g5kbUV1DS4e291Xjm/Ek9GDVe
HoYS30FUKcKL5oEHwGaM4t3sUoWRInD9dAbXhldP//FuhFQcfqF1HBj0Ez3q
eZSivqZGLfUQgBlwL36Hc6aiaYGCowXJ1tT/mK33ZhLqrFTXZw0XJDmw2lR
xzhydUkjg==pLj4

-----END PGP MESSAGE-----

internet guide for new york lawyers

Authentication of Messages

Authentication ensures that a message that appears to be from a particular
person is really from that person and has not been altered along the way. In
addition to keeping messages private, PGP also enables you to safeguard files
stored on your computer by encrypting them. It matters not if someone breaks
into your computer through your Internet connection, penetrates your security
with a "Trojan horse" or "Worm" designed to call home with your secrets or
merely turns on your computer when you’re not there and looks through your
files. All they can read is the incomprehensible gibberish of the scrambled file.

In the real world, privacy is more meaningful and immediate to some than
to others. To human rights organizations abroad, security may mean life or death
to those involved. (See “letters From Human Rights Groups” that Zimmerman has
received http://web.mit.edu/prz/letters.shtml)

To get the freeware version of PGP (versions 7.0.3 and earlier, including
source code) inside the US, see the MIT PGP web page at
http://web.mit.edu/network/pgp.html. PGP, in its latest versions for Windows
95/98/NT/2000, Macintosh, Linux, and Solaris, can be found there and
downloaded free for personal, noncommercial use. This distribution is done in
cooperation with Philip Zimmermann, Network Associates, and with RSA
Security, which licenses patents and software for one of the public-key encryption
technologies which PGP utilizes.

Public and Private Keyrings

PGP depends on an encryption technology known as "dual key" or "public
key" cryptography. (PGP Guide, p. 35.) We are not talking about actual physical
keys, but blocks of text generated by your computer using the PGP program. Two
complementary computer files, called a key pair, are used to maintain secure
communications. One of the keys is designated as your private key, to which only
you have access, and the other is your public key that you freely exchange with
other PGP users. Both your private and your public keys are stored in files on
your computer called “key rings,” which are accessible from the PGPkeys

[made with GoClick]