Secure email Preserving confidentiality in your office

SCOT Computer Laboratory 27 Oct 2000

Doug Stetson, MD FAAP dstetson@aapscot.org

 

Why

Communicate with colleagues (confidentially)

Communicate with patient (confidentially)

Protect messages on your hard drive

Necessary (in 2 years or so)

Ethical obligation

HIPAA

Security

Obligation to protect commensurate with risk

Encryption likely adequate

Real risk: unauthorized use by authorized users

Available now

Common email programs support

Cost is minimal

Technology is simple

Two sources for secure email

Email based – S/MIME

Web-based – SSL

S/MIME – vocabulary (the techy stuff)

Certificate = id card with expiration date and source

Certificate Authority = fiduciary, like a bank

Key pair = public and private key pair (long numbers)

Hash = compact, unreadable representation of a document created using a key

Technology: extremely hard to guess one number, knowing the other

Symmetrical Key Encryption

Standard protocol

Long number "key"

Scrambles the information

Recover with same key

Impractical to decypher

Public Key Encryption

Asymmetical

Related keys

Use one to encrypt

Use other to encrypt or decrypt

Digital Signature

Create hash with private key

Recreate hash with public key

Match means

LEGALLY BINDING

S/MIME – Secure Multipurpose Internet Mail Extensions

Built into recent email programs

No expense

– signing documents

Create a document (email)

Sign with private key (mouse click)

Document sent with attachment: hash made with private key, public key, details of the certificate, and identification of the certificate authority

– reading a signed document

Open document

Assertion of writer identity

Assurance that document has not been altered

Capturing the public key (mouse click)

– encrypting a document

Create the document

Encrypt with a key (mouse click)

Optionally, sign

– reading an encrypted document

Open document with your private key (automatic)

Optionally, examine certificate of the signer

– getting keys

Certificate Authorities

Examples

Web based secure email -- SSL

Secure communication between computers and servers

Automatic handling of keys and certificates

Mail stays within a particular server

Same security as for web commerce credit cards

Web based secure email – examples

Medical

Commercial

Security Alert

For S/MIME, all security rests at the windows logon password!