Setup

 

Before you can start using the PRISM Break Secure Email application, you need to set it up by choosing a password and creating asymmetric keys (one public key and one private key). You can also create backup of both keys or restore them from a secure backup file.

All these steps are performed with a setup wizard in four basic steps.

Step 1: Welcome Screen

Before starting setup, please read the privacy policy and the end-user’s license agreement.

If you agree with both, you can move to the next step by tapping on the Next action.

w1

Step 2: Password Set Screen

Your first action is to set a password that will be used in the PRISM Break Secure Email application. It must contain at least 6 characters and must be re-typed correctly. Keep in mind that the more characters you have, the harder it is to crack the password. You can always change the password later. The password is also used to decrease the pseudo-random generator’s vulnerability and to prevent regeneration of both keys.

You can move to the next step by tapping on the Next action.

w2

Step 3: Asymmetric Keys Generation Screen

On the next screen, you need to generate your 1024-bit asymmetric keys: one public key and one private key. The public key is used for encrypting messages. You always use recipients’ public keys to do that. To decrypt the messages, you need to use your own private key.

The keys are created with a pseudo-random generator which is proven to be rather vulnerable, since the process of the key creation can be determined. This threat is eliminated by combining pseudo-random generator with your password and a virtual image that you draw on the screen. The password and the drawn image together decrease the pseudo-random generator’s vulnerability and prevent regeneration of both keys.

To start generating the asymmetric keys, tap somewhere on the screen and drag your finger drawing a virtual image until the progress meter shows movement. A randomly drawn virtual image generates an additional set of initial values for the key generation which is crucial for the security of your keys.

You can move to the last step by tapping on the Next action.

w3

Step 4: Keys Backup or Restore Screen

The last screen offers an option to backup or restore your asymmetric keys.

If you are seting up the PRISM Break Secure Email application for the first time, it is advisable to backup your keys to your local drive, SD memory card or remotely on cloud (DropBox or Box). You need to set another password which is used as an AES-256 key for the symmetric encryption of the backup file.

If you have already backed-up your keys, you can restore them from your password-protected file on your local drive, SD memory card or remotely on cloud (DropBox or Box) to be able to read your older messages that use the old keys. This way there is no need to reshare your public key.

The keys are stored in a file called prism.keys which are encrypted with the AES-256 symmetric encryption using its own backup password as a secure key. Keep in mind that the backup password is not the same as the password used in the PRISM Break Secure Email application (although it could be). The password is recommended to be at least 32 characters long to fill all 256 bytes of your key. Note: the longer the password, the more secure your backup file.

Tap on the Complete action to finalize the setup steps.

w4