Pages

Thursday, November 22, 2012

What is an Encryption Key?

Encryption is a form of security that turns information, images, programs or other data into an unreadable cipher by applying a set of complex algorithms to the original material. These algorithms transfer the data into streams or blocks of seemingly random alphanumeric characters. An encryption key might encrypt, decrypt, or perform both functions, depending on the type of encryption software being used.

There are several types of encryption schemes, but not all are secure. Simple algorithms can be easily broken using modern computer power, and yet another point of weakness lies in the decryption method. Even the most secure algorithms will decrypt for anyone who holds the password or encryption key.

Symmetric types of encryption schemes use a single password to serve as both encryptor and decryptor. Rijndael, Twofish, and Serpent are examples of this type of encryption software, often used to secure data or drives. Supplying the encryption key, one can “mount” the drive and work in an unencrypted state, then return the drive to cipher when finished.

The algorithms used are considered very secure, with Rijndael adopted as the Advanced Encryption Standard (AES) used by the U.S. Government for storing classified and top secret information. The one weakness of symmetric encryption programs is that the single key must necessarily be shared, presenting an opportunity for it to be leaked or stolen. Part of key management involves changing the encryption key often to improve security.

Public asymmetric encryption schemes also use highly secure algorithms with a different method of encrypting and decrypting. This software utilizes two keys, known as a key pair. One encryption key is the public key and can be freely shared or given to anyone because its only job is to encrypt. The other key is the private key and is not shared. The private key is required to decrypt anything that has been encrypted by the public key.

Asymmetric encryption software is widely used for making email and instant messaging private. Install one of many available encryption programs including choices like Pretty Good Privacy® (PGP) or the open-source version GnuPG, and the program generates a key pair for the user. The encryption key or public key of the key pair can be sent to others who are also running a compatible encryption program.

Once another person has the public key, he or she can send encrypted messages to the owner of the public key. After a message has been encrypted using the public encryption key, even the author cannot decrypt it. In the encryption process, the algorithms are based on the key pair, and only the private key of that specific key pair can reverse the encryption process. The mail or message is then sent to the owner of the public key.

Upon receipt of the mail, the private key will request a passphrase before decrypting. For maximum security, this passphrase should be supplied manually, but the software will allow a user to store the passphrase locally so that messages can be decrypted automatically. Asymmetric encryption is considered more secure than symmetric encryption because the encryption key that triggers decryption is a separate key that is not shared.

Regardless of the type of encryption, if someone gains access to a computer the data is only as secure as the passphrase that protects the encryption key. The best passphrases are alphanumeric and random, though these are harder to remember. If one must pick something recognizable, avoid addresses, license plate numbers, names, pets, or other easily cracked passwords, and include numbers plus characters that are neither letters nor numbers. Most importantly, each password should be completely unique from all others in use, as adopting a single password or a ‘theme’ on passwords vastly reduces security and increases vulnerability.

Which is the most secured form of encryption technique
Determining the "most secure" encryption technique depends on various factors, including the specific use case, the cryptographic algorithms and protocols involved, and the implementation details. However, some encryption techniques are widely recognized for their strong security properties and widespread adoption in practice:

1. **AES (Advanced Encryption Standard)**: AES is a symmetric encryption algorithm widely used for securing data and communications. It has been adopted as a standard encryption algorithm by governments and organizations worldwide due to its strong security properties and efficiency.

2. **RSA (Rivest-Shamir-Adleman)**: RSA is an asymmetric encryption algorithm used for encrypting and decrypting data and for digital signatures. It is commonly employed in securing communications, digital certificates, and key exchange protocols such as SSL/TLS.

3. **ECC (Elliptic Curve Cryptography)**: ECC is an asymmetric encryption technique that offers strong security with smaller key sizes compared to RSA. It is widely used in applications where resource constraints are a concern, such as mobile devices and IoT (Internet of Things) devices.

4. **Diffie-Hellman Key Exchange**: Diffie-Hellman is a key exchange algorithm used to establish secure communication channels over insecure networks. It is commonly employed in protocols such as SSL/TLS and IPSec for securely negotiating cryptographic keys between parties.

5. **SHA-256 (Secure Hash Algorithm 256)**: SHA-256 is a cryptographic hash function commonly used for generating message digests and ensuring data integrity. It is widely employed in digital signatures, certificate authorities, and blockchain technologies.

6. **E2E Encryption (End-to-End Encryption)**: End-to-end encryption techniques, such as those used in messaging applications like Signal and WhatsApp, ensure that only the communicating parties can decrypt and read messages, providing strong confidentiality and privacy guarantees.

It's important to note that the security of an encryption technique depends not only on the algorithm itself but also on factors such as key management, implementation security, and potential vulnerabilities. Additionally, encryption techniques may have different strengths and weaknesses depending on the specific use case and threat model. Therefore, it is essential to carefully evaluate the security requirements and considerations of a particular application when selecting encryption techniques.

1 comment:

  1. Which is the most secured form of encryption technique ? This is the question that we all wanted to know. Is there any scheme which can't be cracked or compromised.
    electronic signature

    ReplyDelete