How Cryptography Works In 2020

Out of all the topics in IT Security, none are as intimidating as Cryptography or at least to me.  It is a concept that is integrated and weaved into all aspects of technology but fundamentally one of the toughest concepts to grasp.  When I reflect as to why, I surmise that it’s due to the vast amount of history and my lack of understanding the relevance of some of the defunct applications.

To begin to understand why we use Cryptography, we must first understand what it is and how it is implemented today.

What Is Cryptography?

If someone were to ask me what Cryptography is, I would simply tell them that it is encryption algorithms that are used to enforce data privacy when you are sending and receiving messages.  Oversimplification, I know but does the average person really want to know the inner workings of Cryptography? Probably not, then again, if you are finding this blog, I wouldn’t consider you the average person.

Jokes aside, cryptography is an important part of data security.  It helps us protect digital communications transmitted over a network by taking the original message and converting it into an alpha-numeric message called ciphertext.  Think of a ciphertext as a transformation of your original communication into a secret code which requires encryption keys to reveal the message (decryption).

These keys are often referred to as Public and Private Keys.  More on that later.

What Is Symmetric Key Encryption?

Cryptography is typically lumped into two categories, Symmetric and Asymmetric.  

Symmetric Key Encryption is when you use the same key, often called a public key, to encrypt and decrypt communications.  The ciphers used to protect messaging are called Stream and Block-ciphers. Here’s how it works:

Let’s say that Asuka wants to send a message to Britt by email. Without encryption, it is typically sent in clear or plaintext format.  If an unauthorized person like Chris were to intercept the email, it would be easy for him to see the contents of the message.

Symmetric Key Encryption

If Asuka were to enable Symmetric Key Encryption before sending a message, her key would modify the message into ciphertext.  When she sends the message over the internet, even if it gets intercepted by Chris, the only thing viewable is the ciphertext.  Practically useless for him. As the message reaches Chris, he can decrypt the message and review the true content.

The main advantage to Symmetric Key Encryption is that it can encrypt large volumes of data relatively quickly.  Consequently, the drawback is that if the public key is ever discovered by an unauthorized actor, data can be compromised.  It is mainly for this reason an alternative key encryption was necessary.

What Is Asymmetric Encryption?

Asymmetric Key Encryption addresses the main drawback of Symmetric Key Encryption by deploying a Public and Private Key Infrastructure.  The important thing to remember is both the Public and Private Key have their own function.  

The Public Key is used to encrypt messages whereas the Private Key is used to decrypt messages.  This added layer of security enforces privacy in the event that the public key is discovered. Another example, anyone?

Asuka wants to send her itinerary to Britt which contains sensitive information she doesn’t want to get out.  So she decides to compose her email and encrypts the message with Britt’s Public Key. When the message arrives, Britt uses her Private Key to decrypt the message.  It’s important to know that even if Chris intercepted the message and Britt’s Public Key, the message is still safe as Chris would only see the ciphertext. This is the beauty of Asymmetric Key Encryption.

Asymmetric Key Encryption Explained; Sage Knows IT. All Rights Reserved.
Asymmetric Key Encryption (Public Key Infrastructure)

Now you may be wondering, if Asymmetric Key Encryption is so great, why are we still using Symmetric Key Encryption today? Like any good technology Asymmetric Key Encryption is not without its drawbacks.  

This technology uses discrete logarithms or factorization when converting to ciphertext which means it uses a lot of computing power to get the job done.  Ideally, it is best used with a point to point connection or when sending small amounts of data through a network.

How are they used today?

Sometimes the best technologies are used together.  When you are connecting to a website in 2020, the connection is likely using Asymmetric Key Encryption.  In theory the connection between your browser and the website is encrypted preventing people like Chris from seeing what is transmitted.  From there you can use Symmetric Key Encryption to encrypt the actual data being transmitted.

Many operating systems today use a combination of both encryption technology to secure computing devices.  This is especially useful when a device has been physically compromised or stolen.

When choosing between the two think of what you are ultimately trying to accomplish.  If performance is the goal, Symmetric Encryption is likely the best route. If privacy is the goal, Asymmetric encryption is the way to go.  

Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Delete Me Not: How One API Call Could Wipe Accounts Clean

Bug bounty programs continue to prove their value by helping organizations uncover security flaws that would otherwise slip through the cracks. For those of us in cybersecurity,…

Title Image: AI Security Realities: Rethinking PII as the Sole Indicator

AI Security Realities: Rethinking PII as the Sole Risk Indicator

During a client meeting, I addressed misconceptions about cybersecurity, especially the notion that absence of PII equates to no risk. I discussed how cyber threats extend beyond data theft to include system vulnerabilities that could disrupt operations and impact users, citing the SolarWinds and New York Times attacks as examples. I explained that comprehensive assessments are crucial for understanding broader cybersecurity risks, not just those involving PII. Additionally, I highlighted the importance of protecting AI models from poisoning, underscoring the need for robust security measures in AI development.

10 Ways to Improve Your Math Skills for Cybersecurity

10 Ways to Improve Your Math Skills for Cybersecurity

As highlighted in our earlier discussion, The Intersection of Math and Cybersecurity, a solid grasp of mathematics is indispensable within the realm of cybersecurity. The specific demands…

The Intersection of Math and Cybersecurity - Does Cybersecurity Require Math?

The Intersection of Math and Cybersecurity

During my weekend exploration of a renowned Q&A platform, I unexpectedly encountered a question that left me intrigued. I couldn’t help but wonder if the original poster (OP) was playfully jesting or sincerely seeking knowledge. This curious moment brought forth a reminiscent smile as I recalled the age-old adage we all encountered during our early school years: “Math is fundamental to all endeavors.” However, an interesting twist emerged: Does this axiom extend its influence into the intricate realm of Cybersecurity?

Client Confidence Crisis: How Neglecting Security Practices Can Drive Customers Away

In today’s digital landscape, establishing an Information Systems Security Program (ISSP) is no longer optional but a crucial necessity for organizations. This blog post explores the vital importance of implementing an ISSP early on and understanding the factors that influence its establishment and modification. Senior management’s role in championing ISSPs is emphasized, as their buy-in and recognition of its significance set the tone for organizational security practices.

However, misconceptions and flawed reasoning often hinder the adoption of robust security measures. From the belief that “it will never happen to us” to relying solely on insurance coverage, these notions can prove detrimental to an organization’s security posture. Furthermore, assumptions that clients don’t care about security or that the cloud provides ultimate protection are debunked, shedding light on the evolving expectations and regulations surrounding data protection.

The ugly truth emerges as we delve into the constant threat of internet vulnerability scans and the risks organizations face when vulnerabilities are discovered. This post aims to dismantle these flawed mindsets, highlighting the need for a comprehensive security approach beyond insurance coverage and the importance of addressing vulnerabilities proactively.

Stay tuned for the upcoming parts of this conversation, where we will explore additional influential factors and provide insights into developing effective ISSPs. Together, let’s navigate the complex world of system security and ensure the protection of your organization’s invaluable assets.

RSS302
Twitter638
YouTube0
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20