More than any other security topic, encryption seems to perplex a lot of people. Many may have seen it within their WhatsApp and view encryption as being infinitely complicated.
While it is certainly no small feat to create truly secure encryption algorithms, there are a lot of simple types of encryption that you might have implemented yourself without knowing it, says Carey van Vlaanderen, CEO at ESET South Africa.
Encryption has become highly topical, making the front pages of newspapers and websites all over the world
However, it is not a new concept. In fact, data encryption has been around for some time. Longer than a year, ten years, more than a hundred – even more than a thousand years.
Encryption was used by Julius Caeser during his reign over the Roman Empire, where he would change the first three letters of the alphabet to the last three, thereby encrypting the messages he sent to his generals. Similarly, the Germans invented the Enigma machine to send encrypted messages during World War 2, which mean the allies could not, at first, read the intercepted content.
Interestingly, the first prototype of the computer emerged from an investigation into figuring out how to decipher Enigma.
What are the benefits of encryption?
Encryption keeps sensitive and personal information secure and private.
This includes all online data such as bank details, e-mails, and social networks – as well as offline data, such as information stored on hard-drives that only you can access.
With this security technique, you will not only prevent identity theft, but in the case of losing a device such as a smartphone, tablet or computer, you can be confident that cybercriminals will still not be able to access your data.
With this security technique, you will not only prevent identity theft, but in the case of losing a device such as a smartphone, tablet or computer, you can be confident that cybercriminals will still not be able to access your data
What does it mean to encrypt a message and how does it work?
Although there are many encryption systems, the most common ones are the use of public and private keys.
In this system, all Internet users like you have two keys – a public one that everyone can see and use and a private one that only you can use. An alteration made by a mathematical algorithm transforms a message, or readable data into a non-readable one – when it is sent to a recipient, it is encrypted meaning to read it a key is needed to decrypt it.
All the major operating systems, and many popular software applications, give you the option of encrypting files or folders on your device.
When you use this option, you must choose a password that allows you (and anyone else you share the password with) to unlock and decrypt those files. As such, if a cybercriminal succeeds in intercepting one of the messages, he or she will not be able to read it without your private key, and your information remains secure.
Encryption is great for when data is in storage or in transit, but there is one other situation that bears discussion; when your encrypted document is in use: when you have opened that protected document and are looking at it or editing it.
This includes any time the encrypted file is open, even if it is minimised or visually covered up in some way.
Unlocking the file means that it has been decrypted in your device’s memory
If, for example, someone has opened a back door into your machine with malware, they can access that data if it is unlocked.
This does not mean encryption is ineffective, in fact, liberally using encryption can really limit the amount of damage someone can do and it can also shrink the window of time in which an attacker has access to your decrypted data.
Therefore, layers of defences are a good thing: one technology can help bolster the effectiveness of another as each shrinks the opportunity for an attacker to steal data.