Encryption, as we know it today, is embedded in everything. Any data exchanged between two terminals on the internet must be encrypted from your WhatsApp messages to your bank account.
What is encryption? When was it born? How does it work, and why is there such a dire need for it? Read on to find out.
History of Encryption
Cryptography, the art of using codes to communicate, has existed for thousands of years. In computers, however, it only evolved in the early 20th century.
During World War II, various countries came up with different technologies to encrypt their communications to avoid them being intercepted and read by the enemy.
In modern times, we use stronger, more reliable digital encryption algorithms to protect our data on the internet. The mid-1970s saw two significant public advances.
Number one is a draft of the Data Encryption Standard published in the U.S Federal Register on 17th March 1975. This was a DES cypher proposed by a team of researchers working at IBM. These researchers were trying to develop secure data communication facilities for large financial organisations such as banks.
The second development was another publication in 1976. This paper was named ‘New Directions in Cryptography’ by Whitfield Diffie and Martin Hellman. This paper fundamentally changed how cryptosystems work by introducing a new method of distributing cryptographic keys.
It revolutionised the way cryptographic keys were distributed, solving an age-old cryptography problem – key distribution.
This article also caused an almost immediate and completely public development of a new class of data encryption algorithms, now known as asymmetric algorithms. Before the release of this paper, all encryption systems were based on symmetric key systems, making them easier to crack.
Also read: Why is Cyber Security important? 5 tips to protect yourself
How does modern encryption work?
Encryption, in a nutshell, is a technology that converts a message or a file into an unreadable entity so that it cannot be read or accessed by any third party.
This is done using computer algorithms that generate keys to encrypt and decrypt data. The size of these keys, usually measured in bits, determines how secure the encryption is. The most common encryption algorithms offer somewhere between 128 to 256-bit key encryption.
Types of Encryption
The main purpose of encryption is to protect digital data confidentiality as it travels from one device to another on the internet. Encryption is mainly classified as Symmetric Encryption, Asymmetric Encryption and Hashing.
The major difference between symmetric and asymmetric key ciphers is that symmetric key ciphers use one unique key to encrypt or decrypt the file, whereas asymmetric ciphers use a unique public key for encrypting and another private key for decrypting data.
Hashing, however, refers to converting a string of characters into fixed-length values or keys that represent the original string.
To achieve this, various data encryption algorithms are used. Each one has its unique characteristics and applications. Here we go over five of the most commonly used ones recently.
Triple DES
Triple DES was designed to replace the original DES encryption algorithm after hackers could crack the latter with ease. It was the recommended standard and the most commonly symmetric key algorithm during its time of relevance.
Triple DES works using three individual keys, which are 56 bits each. This makes the total key length a total of 168 bits. However, experts say that you should expect only about 112-bit encryption.
While triple DES is still a reliable hardware encryption system for some institutions, it’s being phased out in favour of more advanced algorithms.
RSA
RSA (Rivest–Shamir–Adleman) is a public-key encryption algorithm and has become the standard for encrypting data sent over the internet. It is also widely used in PGP and GPG programs. It usually offers a 1024-bit key.
RSA is an asymmetric algorithm as it uses a pair of keys. This means that there is a public key, which we use to encrypt our data and a private key to decrypt it. Anyone can encrypt data, but only one authority can decrypt it.
RSA essentially creates a huge unreadable mess of the file you’ve encrypted. Hackers face a lot of trouble decrypting it as it needs a lot of computing power and time to crack.
Don’t be fooled by the 1024-bit key size, though, as it can be cracked relatively easily. RSA claims that 2048-bit keys should be sufficient until 2030. An RSA key length of 3072 bits is suggested if security is required beyond 2030.
Also read: If Google says a website isn’t secure, what does it really mean?
MD5 Hashing
The MD5 message-digest algorithm is a widely used hash function. It produces a 128-bit hash value.
It was initially designed to be used as a cryptographic hash function. After being put to use in the field, it was found to have serious security issues.
When using MD5, finding the common hash between two encrypted files takes much less computational power. You could even decrypt it on your home computer!
That’s why MD5 is now used to check file integrity but only against unintentional corruption.
Twofish
Twofish was built as the successor to another encryption algorithm known as Blowfish. It uses keys up to 256-bit in strength and is an asymmetric technique.
Twofish is considered one of the fastest among its class. It is also viable for both software and hardware environments. It is also freely available to everyone. This is why you’ll see quite a lot of freeware using this.
The best part about it? There are no known attacks on it. The closest thing to decrypting the algorithm is a couple of theoretical attacks, and even they haven’t gone too far.
AES
The Advanced Encryption Standard (AES) is the algorithm used as a standard by the U.S. government and various other organisations.
It is a very efficient encrypting algorithm with keys that are usually 128-bit. For heavy-duty applications, 192 and 256-bit keys are also used.
Like Twofish, AES has no known attacks that can crack it. The sole exception is brute-force attacks. These attacks attempt all possible key combinations of 128,192 and 256 bits until they find the right key.
Keep in mind, though, that this requires a substantial amount of computing power and not to mention patience.
Also read: What is a VPN? FAQs