1. Technology

How Does Public Key Encryption Work?

publickey-pkeFor many, security remains a mystery that is better left to the professionals. It has been seen as too complex for the layperson to explore or fully understand. While diving into the math of some of the most complex algorithms can be a daunting task, the essence of what makes all of these algorithms work isn’t necessarily out of anyone’s reach. Instead of looking at the minute details of cryptography that most people find either boring or overwhelming, we can look at the concepts that make up public key encryption so that we may understand completely what exactly is protecting us from hackers.

What is public key encryption?

Public key encryption, a concept of public-key cryptography, is a means of exchanging data privately that involves a public and a private key. The public key is seen by everyone (hence the name “public”). However, the private key is only visible to the endpoints that are transmitting the data. Public key encryption is known as an “asynchronous” algorithm.

What is a synchronous/asynchronous algorithm?

If we had to label PKE as an “asynchronous” algorithm, it was done in order to distinguish it from synchronous algorithms. All cryptography uses a key-based system to approach the issue of privacy. The terms “synchronous” and “asynchronous” refer to the ways in which these keys are shared.

Let’s say that you’re trying to send a letter to someone that’s encrypted. The person receiving your letter needs to know how to decipher the entire text to understand what’s in it. How are you going to teach that person to decipher it? You’ll need to meet in secret to get that person the key. This is essentially how synchronous algorithms work. That “meeting in secret” part is a little difficult, because eyes and ears are everywhere. The internet is no different, since snoopers are also able to listen (“sniff”) on your transmissions.

Asynchronous algorithms work differently. There are two components to the formula: public and private. In an asynchronous scenario, you have a box with a lock instead. You send that box to the person you want to send the letter to and with a key that locks it, but doesn’t unlock it. This is known as the public key. Anyone can lock the box. Unlocking it is another story.

publickey-lock

You’d only be able to unlock your box with your private key, and each of you have your own that can unlock it. You don’t have to meet in secret or anything, and this eliminates the possibility of someone prying.

What if someone finds out your private key?

“If asynchronous encryption is being used to store passwords on most modern databases, why do people still get hacked?” That’s a bit of a mess, isn’t it? This is because hackers still use dastardly methods to get into major databases, either through internal sabotage, social engineering, or outwitting the security behind an employee’s account. Since most companies store private keys on their own servers, they still run the risk of compromising all of their users’ accounts. Some algorithms are also very easy to figure out and unlock regardless of whether the hacker has a private key or not (lock picking, anyone?). This is where public key encryption has its flaw.

There are a few companies out there that try to do something about this issue, including storing private keys across many different servers. But nothing works better than giving someone the ability to create their own private key (given that the private key is strong enough not to be guessed on its own). At this moment, PerfectCloud is the only company employing that solution. It has to since it’s providing a service that deals with very sensitive data from its customers. Unfortunately, I can’t say the same of other alternative services.

How would you approach the private key issue?

What advice would you have for people concerned about their privacy? Let’s hear from you in the comments section below!

The post How Does Public Key Encryption Work? appeared first on Make Tech Easier.



No Comments
Comments to: How Does Public Key Encryption Work?

Recent Articles

Good Reads

Losing weight can be⁣ a ​challenge for women going through menopause. With ‌all ‌the changes happening in your body, it may seem like an impossible task. However, it is important to focus on managing your weight during this time to avoid obesity in ⁣the future. Understanding Weight Gain During Menopause Before we dive into tips […]
Imagine if treating gum disease could be less‍ painful and more like a futuristic ⁣adventure. That’s where laser gum⁣ surgery comes⁤ in – ⁣the high-tech solution that’s transforming dental treatments into something straight out of a sci-fi movie. No scalpels or‍ bleeding gums here, just lasers and the promise of healthier gums. If ‍you’re tired […]

Worlwide

Overview VipsPM – Project Management Suite is a Powerful web-based Application. VipsPM is a perfect tool to fulfill all your project management needs like managing Projects, Tasks, Defects, Incidents, Timesheets, Meetings, Appointments, Files, Documents, Users, Clients, Departments, ToDos, Project Planning, Holidays and Reports. It has simple yet efficient layout will make managing projects easier than […]
Losing weight can be⁣ a ​challenge for women going through menopause. With ‌all ‌the changes happening in your body, it may seem like an impossible task. However, it is important to focus on managing your weight during this time to avoid obesity in ⁣the future. Understanding Weight Gain During Menopause Before we dive into tips […]
Imagine if treating gum disease could be less‍ painful and more like a futuristic ⁣adventure. That’s where laser gum⁣ surgery comes⁤ in – ⁣the high-tech solution that’s transforming dental treatments into something straight out of a sci-fi movie. No scalpels or‍ bleeding gums here, just lasers and the promise of healthier gums. If ‍you’re tired […]
The festive season is a time for businesses to express their gratitude towards‌ their clients, employees, and partners who have contributed to a​ successful year. While corporate gifting has always ‍been‍ a tradition, companies are now looking for unique and ⁢personalized gifts that reflect their appreciation. Instead of settling for generic mass-produced items, why not […]

Trending

Turquoise Jewelry is one of the ancient healing stones used for personal adornment and astrological benefits. The rare greenish blue-colored pectolite is celebrated for its enchanting powers among many crystal lovers. It is a hydrated phosphate of copper and aluminum that ranks 5 to 6 on the Mohs hardness scale. It is deemed a protective […]
Singapore is recognised globally as a prime destination for foreign investors. Its business structure is well-developed, and its tax system is favourable to business owners. The government has a strong support system for entrepreneurs and provides legal protection for intellectual property rights. All of these conditions create an environment that is ideal for Singapore company […]
2020 has been a year that represents aggressive and sustained volatility with a confluence of unexpected situations, including economic shifts and market disturbance confluence. The COVID-19 pandemic forces businesses to adjust their methods of operations to ensure survival. These adjustments become the trajectory and guidance of what 2021 should look like and what companies should […]
COVID-19 pandemic has affected Thailand’s economy and labor market. World Bank’s Thailand Economic Monitor predicted that it would take Thailand over two years to return to its pre-COVID-19 growth and domestic product output levels. Although the country has successfully curbed the pandemic tide over the last few months, the economy remains severely hit. Nevertheless, heavily […]