Encryption

The encryption of data or online conversations serves to prevent third parties from spying on the contents. In the digital age, not only the amount of data is increasing, but also the exchange of data via networks and the Internet. Data security and data protection play an important role here. In our article we explain the importance of encryption and which encryption methods are used for this purpose.

What is encryption?

Encryption refers to an algorithmic process in which data is changed into a form that can no longer be read. The data is encrypted using electronic or digital keys. Synonyms for the term encryption are coding or ciphering. Encryption is used when two or more people communicate with each other. Encryption procedures are also used when confidential and sensitive data is exchanged or stored. The everyday areas of application of encryption are therefore diverse. The following list summarizes the most important examples of encrypted online communication:

  • communication by e-mail or via smart terminals

  • encrypted connections through Virtual Private Networks (VPN)

  • encryption of chats in messengers or telephone calls via Voice over IP (VoIP)

  • safe surfing in a browser

  • data exchange and data storage in clouds, online banking or personal data

The advantage of digital encryption is that unauthorized persons cannot view the contents of the transmission. Only when the data has been decrypted is it possible to read it. A defined code or an algorithmic key is required for decryption.

In the past, Indians used smoke signals to send a message to other tribes. This worked at first because only they could interpret the hidden signals correctly. Later, however, these secret signs were decoded by other people, so that this kind of encryption no longer worked. Today we use encryption to protect personal data on a shared computer from other users. On mobile devices, we encrypt our data so that it does not fall into the wrong hands if lost or stolen. E-mail encryption has also become an important aspect of online communication.

How does encoding work?

The conversion of freely accessible data to encrypted content is based on the principle of cryptography. Mathematical algorithms are used here. An encryption process is used to encode messages into an unchangeable character string.

Strong encryption of sensitive content using cryptography and complex algorithms pursues certain goals. First and foremost, it is a matter of handling confidential data securely so that strangers cannot access it. Only the authorized recipient is allowed to decrypt the files or mails intended for him with the appropriate key and read the contents.

In addition, the coding of data ensures that they are not changed or manipulated. The recipient must always be able to recognize the integrity of the sent files. In addition, data security is a feature that ensures that data comes from a trustworthy source and is therefore authentic. This means that the encrypted message actually originates from that particular sender. It is equally important that it is binding so that a sender cannot deny that the message came from him.

What types of encryption are there?

Various encryption methods are used to encrypt data. These encryption methods can be divided into three types:

  • symmetrical encryption methods

  • asymmetric encryption methods

  • hybrid encryption methods

The symmetrical encryption method uses only one key to encrypt or decrypt data. This principle requires that both sender and receiver have the same code. The disadvantage of symmetric encryption is the danger that if the secret key is lost, the data is no longer secure. This problem occurs when the code is distributed or stored or exchanged without protection.

Modern symmetrical encryption methods use block encryption or stream encryption. The second method involves encrypting codes one after the other and individually. In the block variant of encryption, the code is encoded in blocks, which are then encrypted in a defined fixed sequence. Symmetric encryption methods include AES, MARS and Serpent.

Unlike symmetric encryption, asymmetric procedures use two different keys. These codes are divided into a public key and a private key. The public key is used to encrypt the data and can be accessed by any person. The private key, on the other hand, is a personal code with which data can be decrypted again. The private key is only useful here if the data has been previously encrypted with the corresponding public key. Asymmetrical encryption methods include public key methods such as Pretty Good Privacy (PGP).

The asymmetric encryption is based on complex mathematical functions. Encrypting and decrypting these codes often takes longer than with symmetric encryption variants. The reason for this is the higher computing power required for asymmetric encryption. Therefore, hybrid encryption methods exist which combine symmetrical and asymmetrical keys and their advantages. Hybrid encryption thus offers on the one hand a fast encryption by symmetric methods. The following transmission is done with ciphers from an asymmetric method.

Encryption technologies at a glance

In cryptography, the distinction between symmetric keys, asymmetric encryption and hybrid encrypted data is initially of a fundamental nature. In addition, there are further components of a coding, which together result in a complex encryption procedure. The following overview lists known and frequently used encryption methods:

  • HTTPS and FTPS: These are network protocols. HTTP is the common transport protocol on the Internet. Most Internet sites and cloud systems are accessed via it. FTP is the transport protocol for pure data and is used for file sharing. To ensure that data transfer is secure, both network protocols are available in HTTPS and FTPS variants. The additional letter S stands for the term secure.

  • SSL and TLS: The abbreviations stand for Secure Sockets Layer and Transport Layer Security. SSL is the predecessor of TLS. The encryption protocol is used for secure data transmission on the Internet.

  • AES: AES is the abbreviation for Advanced Encryption Standard, an advanced encryption standard that provides the actual encryption. Usually, AES-128 bit encryption is used. The number 128 refers to the length of the key that is used as the code for encryption and decryption. This is typical for symmetric encryption. There are also variants of AES encryption with 192 characters (AES 192) and 256 characters (AES 256). In the USA, they encrypt government files with the highest level of secrecy.

  • RSA: In contrast to AES, the RSA method is asymmetric cryptography. This means that there are two different codes for encryption and decryption. This special feature makes it possible to use RSA encryption to provide documents with a digital signature. Such signatures are used in order to sign a PDF or to clearly prove the sender of an e-mail.

  • WPA and WPA2: This encryption method describes a method to encode data streams via WLAN. WPA2 is the successor of WPA. The underlying standard is based on AES.

  • End-to-end encryption: This term (English: End-to-End-Encryption or E2EE) only came to the fore a few years ago. The secure encryption method was massively promoted by the messenger service WhatsApp.

What is the most secure method of encryption?

When it comes to encryption, the question always arises as to which encryption method is the best and offers the highest IT security. Complete end-to-end encryption is at the forefront. In principle, security increases with the length and number of ciphers. A secure coding uses well-known and already extensively analyzed procedures. However, there is no absolute guarantee of security for many encryption methods used in practice. Certain variants of encryption, which are currently considered secure, could be ignored in the future. All that remains is the prospect of making the circumvention of encryption procedures as costly as possible. In general, the encryption of content is always a balancing act between security and user convenience.

A sticking point for the security of encryption variants is often not the procedure but the key. With it, strangers can easily circumvent any coding if the key falls into their hands. The choice of the right key always depends a little on who data is to be protected against. The human being plays an important role in the level of security. In many cases, a data system creates a password automatically, but users often formulate their access data themselves. The risk of unauthorized decryption increases enormously when users carelessly enter their login details. Passwords are easy to decrypt if they are too simple and too short. Therefore, complexity and secrecy of passwords are the most important basics for encryption to fulfill the desired purpose.

Why is encryption important?

Encryption reduces the risk of unauthorized access and misuse. Anyone who processes and manages data or surfs the Internet can effectively ensure secure data exchange with simple rules. In the age of global cloud systems and smart technology, networks or any mobile device are a potential security risk if data is not protected.

  • Surf in the web browser only with HTTPS

  • Exchange data only with FTPS

  • Encrypt networks only with WPA2

  • Use passwords with longer character strings

  • Regularly update passwords

  • Update operating systems and software

  • Avoid open networks

  • Login to networks via VPN tunnels

  • Use cloud systems with E2E encryption

  • Have terminals blocked immediately if lost

Is there a threat of a ban on secure encryption?

Encrypted communication via online services guarantees the protection of sensitive data. The provisions of the basic data protection regulation strengthen the security of data. However, the encryption of conversation content is still a recurring topic for authorities and state bodies. This concerns access to messages in encrypted networks, messengers or cloud systems.

The intention behind this is to prevent planned crimes or to solve them more quickly. The European Union is already thinking about this and has already drawn up the first draft resolutions. Although the ministers responsible for security issues stress the importance of data protection, they see the need for more surveillance. This includes legal possibilities for intelligence services to access encrypted content through the back door.

However, many members of the Council of Europe oppose the installation of such backdoors. Some member states such as the Netherlands or Finland are also strongly opposed. Experience in recent years has clearly shown that existing trust in digital services declines when privacy is secretly compromised.

Further knowledge from the topic of encyrption

Encryption

In the digital age, data protection and data security play an outstanding role.

To ensure that electronic data cannot be viewed by third parties and to prevent data misuse, it must be encrypted. This applies both to their storage and, above all, to their transport via the public Internet.

You can get deeper insights into the topic of encryption here.

Further knowledge in the areas of data transfer and data storage

Cloud Computing

In the beginning, cloud computing was primarily understood to mean the provision of storage volumes via central data centers. Instead of buying storage, you could rent storage flexibly and as needed.

This continues to happen today in varying degrees, but the offering has been expanded to include numerous other interesting services from cloud providers.

Backup

A backup is a backup copy of data that can be used to restore data if the original data is damaged, deleted or encrypted.

In the best case scenario, a backup should be stored in a different location than the original data itself - ideally in a cloud. You can find out why this is the case and what this has to do with ransomware attacks here.

GDPR, ePrivacy

With the introduction of the General Data Protection Regulation, DSGVO for short, extended requirements came into effect, especially with regard to personal data protection - including sensitive sanctions for violations of the law.

Read here what effects the GDPR has on you and your company.

The ePrivacy Regulation, which is still a work in progress at the moment, will also be discussed, but will in future formulate binding data protection rules that will apply within the EU.

GoBD

According to the Principles of Proper Accounting (GoBD), data and documents that are to be recognized by the tax authorities for tax evidence must be handled in a special way.

We will explain to you the most important facts about archiving and storing electronic documents.

Ransomware

Ransomware attacks have increased significantly in recent years. After a successful attack, all data on your computer is encrypted. From this moment on you no longer have any access options. The economic damage to companies is often enormous.

Find out here how you can protect yourself against digital blackmail.

Security by Design

Especially with software that is intended to protect your users' data from unauthorized access by third parties, software and data security must be taken into account and integrated into the entire software life cycle.

You can find out why this is very important and how you as a user benefit from it here.