Encryption 101 | Protect Yourself

Data Encryption in 2022

This is an extensive guide on the massive world of encryption and keeping your files safe.

Disclaimer: I am by no means an expert on computer science or the inner workings of encryption. This guide is meant for those looking to gain a better understanding of what encryption is and how they can use it.

What is encryption? Why is it used?:

Encryption is the process of encoding information, converting it from its basic form, also known as plaintext, to a more advanced form, also known as ciphertext, not understood by humans. After the plaintext is turned into ciphertext, the ciphertext can then be reverted into plaintext once the recipient uses their key. Encryption is used for one reason - to enhance the security of a message or file. Encryption can be used for malicious and benevolent reasons. One can use it to keep their private banking info safe from hackers, or someone could use it to hide their illicit activities from the police.

Symmetric Encryption:

This is the most basic form of encryption. Symmetric-key encryption or just symmetric encryption is a type of encryption that uses the same key to encrypt and to decrypt data - sort of like a physical key. You can unlock something with the same key that you locked it with. Both the sender and receiver have a copy of the key. The reason that symmetric encryption is less used online, is because it’s hard to share the key with the receiver safely. The entire purpose of encryption is bypassed by sending the key unencrypted through the internet. The only safe way to share a symmetric key is to share it in-person. That’s where asymmetric encryption comes in.

Asymmetric Encryption:

This form of encryption is a little more difficult to understand, but it’s used virtually everywhere on the internet. Everybody from your email provider to Amazon uses this form to keep things like your debit card information safe. How does it work? Well, this form of encryption uses two keys instead of one. There is a public key and a private key. Think of it like a mail dropbox. Anybody that wants to can use their public key and drop information in, but only one person can use their private key that they don’t have to share with anyone to unlock the dropbox and see what other information people dropped in. The public key has no access to opening the information that was dropped in by other people. In more advanced terms, the public key can only be used to encrypt data and the private key can only be used to decrypt data. This next scenario can help you to better understand how this form of encryption works. Sally wants to send a private message to Todd but doesn’t want anyone else seeing. So, Todd shares his public key that anyone can have access to, with Sally. Sally takes this key and encrypts her message. Sally then shares her encrypted message with Todd. Then Todd uses his private key to decrypt the message that Sally encrypted with her public key. Get it?

Strongest Data Encryption Types:

Whether you use encryption to secure your personal information or to avoid the police, here are a few of the very strongest encryption algorithms in existence.

  1. Triple Data Encryption Standard (TripleDES) - This form of data encryption algorithm applies block cipher algorithms thrice to all the data blocks individually.

  2. Advanced Encryption Standard (AES) - This form is by far the most used type of encryption in today. Compared with TripleDES, AES is more than six times faster. A single key is used for encryption and decryption. AES is made up of 3 block ciphers where each block cipher uses cryptographic keys to perform encryption and decryption in a 128-bit block.

  3. Rivest, Shamir, and Adleman (RSA) Security - Named after it’s three creators, this form of data encryption offers protection against cyber-attacks by detecting and responding to threats, preventing online fraud, management identification, and more. It’s data encryption is separated into two keys, a private and a public key. When you are on a secure website, the protocol generates a public key. Additionally, the encrypted text is decrypted using the private key. Sender identification is done with the public key.

  4. A Good Key - The best way to keep your encryption as secure as possible is to create a long key (20+ characters & symbols). An example of a great key: “*G-KaPdSgVkYp3s6v8y/B?E(H+MbQeTh”.

How You Can Get Started With Encryption:

The quickest and easiest way that the average person can get started with encryption is by downloading and using a program called "VeraCrypt’’. This program is pretty much the gold-standard when it comes to encrypting files on your computer. The NSA uses the exact same type of encryption that is most common on VeraCrypt (AES-256). Using AES-256 means that if your files got into the wrong hands, they would need to use brute-force methods for billions of years with current computing technology to crack your encrypted file. This is the official download for VeraCrypt: https://www.veracryp…/Downloads.html . I found this tutorial on how to set up VeraCrypt the right way, VERY useful: https://www.youtube…h?v=C25VWAGl7Tw .

~Written by Jinxx

That’s all I’ve got for now. If you weren’t familiar with encryption before, hopefully this guide has helped solve that problem. If you were familiar with encryption, hopefully this guide helped to deepen your understanding. Thank you for reading!

Happy learning!

11 Likes

thanks for the info mate, will try this