|If you have received encrypted material from the ABS, you need to read this Help page.|
How To Decrypt ABS Confidential Information
Disclaimer, Copyright and License
The ABS uses a secure method to e-mail confidential information to you and will let you know when this happens. A software tool is used to unlock the ABS confidential information when you have received it.
You do not need this software tool if the ABS has not sent encrypted information to you.
You will need Java Runtime Environment (JRE) 1.4.2 or higher installed on your computer. You can receive help, find out more about Java or freely download the latest version of Java Runtime Environment (JRE) from Sun Microsystems at www.java.com/getjava/.
Installing the Java software allows you to run applications called "applets" that are written in the Java programming language that are frequently used by internet web sites.
The ABS decryption tool has been developed using Java software.
HOW TO DECRYPT CONFIDENTIAL INFORMATION
Save the encrypted file you received from the ABS in a folder on your computer.
Download the ABS Decryption Service tool (if you haven’t already done so).
ABS Decryption tool
Right click on the ABS Decryption icon above and select "Save Target As . . ." from the context menu that appears.
Note: Ensure that the file is saved as ABSDecryption.Jar not ABSDecryption.zip which many internet browsers will try to default to.
You can then save this file in a suitable location on your computer.
Start up the ABS Decryption Service tool.
Figure 1: ABS Decryption Service
Enter the decryption key you were given into the 'Key' field
Click on the first 'Browse' button and select the encrypted file you saved in Step 1. (The filename should appear in the 'Encrypted Source File' field, and a suggested 'decrypted' filename should appear in the 'Save As' field.)
If you wish to save the decrypted file to a different location, change the details in the 'Save As' field. Ensure that .zip is added to the end of the file name.
Click on the Start Decryption button.
The file will now be decrypted, and you will see a description of what happened in the 'Log' field.
If you have any concerns or enquiries about the security models used by the ABS, send an email to: firstname.lastname@example.org with the subject titled, 'IT Security'.
The encryption algorithms used in this tool have been obtained from "The Legion Of The Bouncy Castle". The copyright and license agreement for the use of this software are reproduced and linked below.
DISCLAIMER, COPYRIGHT AND LICENCE
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Copyright (c) 2000 - 2006 The Legion Of The Bouncy Castle http://www.bouncycastle.org
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sub license, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.