The Role of Encryption in Cybersecurity

The Role of Encryption in Cybersecurity

·

5 min read

A lot of things happen when we share stuff online, whether we're communicating on social media, making transactions, uploading and storing files on the cloud, or simply connecting to a Wi-Fi network.

In all of these scenarios data is used and exchanged, which means that like any other process on the internet threat actors can take advantage of it and users are vulnerable.

Encryption ensures the safety of your data whether at rest or in transit, and makes it difficult for threat actors to get their hands on your private business.

In this article you'll learn about encryption, encryption protocols, and the role encryption plays in securing data and communications over the internet.

What is Encryption ?

Encryption is a cybersecurity measure that converts data like plain text to a seemingly unintelligible form to others as a way to secure said information from outside threats.

There are various encryption methods and techniques such as Advanced Encryption Standard)(AES), Data Encryption Standard(DES), and Secure Sockets Layer(SSL) to name a few, you'll learn a bit more these terms mean in a bit.

They specify how the information is converted or 'encrypted' and also allows for said information to be returned to its original form 'decryption'.

There are two main types of encryption.

Types of encryption

  1. Symmetric encryption;

    is encrypting a piece of information with a 'key', which is a passphrase/password that holds the encryption technique used for the specified piece of information. An example will be exchange of messages over social media.

    The problem with this type of encryption is that it was too basic and once an attacker has access to the key, they will be able to decrypt all pieces of information involved in that transaction

    Example of symmetric encryption algorithms are AES and DES.

  2. Asymmetric encryption

    Which is also called public key cryptography, here there are two pair of keys used in the encryption and decryption process opposed to symmetric encryption.

    The public key and a private key. Each side involved in communication will have this pair of keys, where the public key encrypt data which can only be decrypted by the matching private key.

    So, the good news is that even if your public key is known for example, your data is still secure as this doesn't mean your private key has also been breached though both keys are linked. Here' a link if you'd like to better understand how this work

    Examples of asymetric encryption algorithms are RSA and ECC.

What are Encryption Protocols

encryption protocols are the methods or algorithms that perform specific cryptographic operations using the encryption key on the plaintext data. Some of the most popular encryption protocols are

  • HTTPS (HyperText Transfer Protocol Secure): an extension of HTTP(HyperText Transfer Protocol) that utilises utilizes encryption protocols to secure communications over a computer network.

  • SSL/TSS(Secure Socket Layer/ Transport Layer Security): which secure communication over a computer network.

  • SSH(secure shell) : Used for securely logging into a remote computer and executing commands. It provides encrypted communication sessions over an insecure network.

Roles of Encryption

  • Data protection

    At rest, which is when data is stored on a device, encryption ensures that even if someone gains access to the device through illegal means, the information stored on the device cannot be accessed, at least not without the decryption key. Here, encryption algorithms like the AES, encryption keys, and access controls help.

    In transit, which is when data is being transmitted over a network, encryption ensures that the process can not be intercepted and thereby accessed by unwelcome parties. It uses encryption Protocols like the SSL/TLS and digital certificates.

  • Securing communications

    In apps like email apps and messaging apps, there is End-to-End Encryption which protects the confidentiality of the messages and attachments. With the use if key exchange to establish a secure channel, session keys and message encryption it is made possible.

    It also makes use of technologies like Forward secrecy, which implement short lived session keys, and authentication mechanisms such as digital signatures and certificates.

  • Online Transactions

    In the case of E-commerce where payments are made over the internet, encryption helps to ensure that your financial information and transactions are safe and tamper proof.

    It does this by securing payment gateways, applying tokenisation, encryption standards and secure authentication.

    We can therefore see how essential encryption is to technology and the internet as a whole.

    There has been a lot of talk about post quantum cryptography nowadays, so here is a bit about what this is about.

Post Quantum Cryptogaphy

Quantum computers are the new rage and Quantum computing is a field that uses quantum mechanics to solve complex problems that classical computers are not capable of solving.

post quantum cryptography also known as quantum proof or quantum safe cryptography is a new from of encryption. It is made to be able to withstand cryptographic attacks by quantum computers.

You can check out this article to learn more about quantum computing.

Conclusion

In this article you've learnt about encryption, encryption protocols, and how encryption works. You now understand how important encryption is in our world today and the discoveries being made in the field.


make sure to follow this blog (CryptiqChronicles) for more interesting articles on cybersecurity, and be sure to drop a like or comment if this article was helpful to you.

->Iqma