What is Encryption, and Why Are People Afraid of It?

With recent acts of terrorism in Paris and Lebanon, news media and government have been using the word encryption as if its somehow to blame. Nonsense. Encryption is easy to understand, and if youre not using it, you should be.

Like many technologies, encryption has the potential to be misused, but that does not make it dangerous. And it doesnt mean that people who use it are dangerous or bad. But since its so commonly misunderstood and currently a media boogeyman, a few minutes with How-To Geek will help get you caught up.

While computer scientists, developers, and cryptographers have created far smarter and complex methods for doing so, at its heart, encryption is simplytaking some information that makes sense and scrambling it so it become gibberish. Turning it back into real informationvideo files, images, or simple messagescan only be done by decrypting it back from gibberish using a method called a cipher, usually relying onimportant piece of information called a key.

Already there area lot of unusual words being thrown around. If youve ever written in a secret code when you were a child, youve encrypted a sentence.A cipher can be as simple as moving a letter down in the alphabet. For example, if we take the following sentence:

This is really geeky

With this simple encryption, A becomes B, and so on. This becomes:

Uijt jt sfbmmz hfflz

If you want to make it more difficult to understand, you can easily represent letters as numbers, when A is represented by a 1, and Z by 26. With our cipher, we simply add one to our number:

208919 919 1851121225 7551125

And then when we move our letters position with our A-becomes-B-method, our encrypted message now looks like this:

2191020 1020 1962131326 8661226

In our example, our method, or cipher, is to change letters to certain numbers and add to that number to encrypt. If we wanted to, we could call ourkeythe actual information that A = 2, Y = 26, and Z = 1.

With a code this simple, sharing keys isnt necessary as any codebreaker could decipher ourcode and figure out themessage. Thankfully, comparing modern encryption methods to this is like comparingan abacus to an iPad. Intheorythere are alot of similarities, but the methods used haveyears of study and genius applied to making them richer and more challenging to decrypt without the proper keysthat is, by the users who are doing the encrypting. Its almost impossible to decrypt using brute force methods or by reassembling data back into something that looks useful, so hackers and bad guys look to humans for the weak link in encryption, not the encryption methods themselves.

Its no secret that plenty of governments get the willies when they think aboutstrong encryption. Modern computers can encrypt text messaging, images, data files, even whole partitions on hard drives and the operating systems that run them, effectively locking out anyone with the keys needed to decrypt the information on them. These could contain anything, and when it could theoretically beanything, imaginations tend to run wild. They contain stolen nuclear codes, child pornography, all kinds of stolen government secrets or, more likely, your tax documents, bank transactions, kids pictures, and other personal information you dont want others to have access to.

A lot of attention was recently drawn to the ISIL-associated terrorism suspects using encrypted methods of communication with the popular messaging service WhatsApp. The boogeyman here is strong encryption allows spooky people to communicate about who-knows-what and many prominent government and intelligence officials are taking advantage of the situation, shaping narrative to say encryption is for bad people, terrorists, and hackers. Never waste a good crisis, as the saying goes.

Many government powers have approached the Googles and Apples of the world, asking them to create encryption with secret backdoor decryption methodsclosed-source methods of encryption that hide somethingnefariousor have master keys to cipher and decrypt anything using thatparticular method.

The current CEO of Apple, Tim Cook, was quoted as saying You cant have a backdoor thats only for the good guys. Because, basically, an intentionally engineered flaw like a backdoor encryption method totally weakens the integrity of a technology we use in many aspects of our lives. Theres absolutely no guarantee that simply because something isdesigned for the good guys to use, that bad guys wont figure out how to use it. It goes without saying once this happens, all data using these methods is no longer secure.

Without putting on our tinfoil hats and getting super political, historically, governments have a tendency of being afraid of their people, and do whatever they think they can get away with to maintain control. So, unsurprisingly, the idea of these little informational black boxes created by strong encryption makes them nervous.

Its probablypretty clear to you faster than you can say the terrorists have won putting a backdoor in an infrastructure as basic as encryption would make life for us much worse, since strong encryption standards are used in web browsers, email, banking, credit card transactions, and password storage. Making those less secure for all of us just isnt a good idea.

Encryption, thankfully, is becoming the default. If youve ever noticed that little lock icon in your web browsercongratulations! Youre using encryption to send and receive data from that website. You dontfeel like a bad guy, doyou?

Basically, by establishing a secure connection, your computer uses a public key to send scrambled information to the remote system, which it then decodes using a private key (since the public key can be downloaded by anyone, but only decrypted using the private key). Since it can be difficult to ensure that nobody can intercept your messages, emails, or banking data, but encryption can turn your information into gibberish that they cant use, so your transactions remain safe. Chances are, youre already doing lots of encrypted message and data transmission and you didnt even realize it.

Nearly everyone in tech is awareit needs to simply be standard and is pushing the idea of encryption by default. Simply because you dont have anything to hide doesnt mean you shouldnt value your privacy, particularly in these days when preventing cybercrime, data theft, and hacking scandals isbecoming more and more critical to our safety and financial well-being.

Speaking simply, computers and the Internet have allowed us to open ourselves up and become more vulnerable than ever before to these privacy concerns, and encryption is one of the only methods of keeping yourself safe. Many years ago, if you were speaking to someone face to face and saw nobody around, you could feel reasonably secure that nobody was eavesdropping on you. Now, without encryption, theres basically no privacy in any kind of communication, at all, ever.

When should a normal user incorporate encryption into their digital life? Certainly, if any of your messaging services or accounts offer HTTPS (HTTP over SSL, an encryption standard) you should opt-in. In this day and age, you shouldnt even have to opt-in; it should be on by default! If a service does not allow for encrypted connections and it allows you to send any kind of sensitive data (credit card numbers, family members names, phone numbers, Social Security numbers, etc.) simply opt not to usethat website. But realistically, any modern website with a login will most likely create a secure, encrypted connection.

Should you keep thepictures, documents and other important files on your PC in an encrypted container or disk? Perhaps. You can do thisby using encrypted file containers or by lockingwhole disks using software. Some years back,popular cross-platform encryption software TrueCrypt suddenly and mysteriously asked users to stop using their software, insisting their product was insecure, and shutdown all development.In a final message to their users,TrueCrypturged them to migrate their data tothe Microsoft product, Bitlocker,now part of some versions of Windows. TrueCrypt was a standard tool for whole disk encryption, along with other software like bcrypt or Filevault. Whole disk encryption is also possible using BitLocker, or, if you prefer open-source methods, by using LUKS onLinux systems, or the successor to TrueCrypt, VeraCrypt.

You very likely do not need to encrypt the files that are actually onyour PC to stop hackers and data thieves from taking them. It is not a bad idea to do so to keep important files in a crypt to keep them out of the hands of other people who may get a chance to use your computer. Encryption doesnt need to be spooky or dangerous; it can simply be thought of as a digital privacy fence, and a way to keep honest people honest. Simply because you like your neighbors doesnt mean you always want them to be able to watch you!

The same can be said for all digital messaging services, whether theyre on your phone, tablet, or on your PC. If youre not using encryption, you have little to no guarantee that your messages arent being intercepted by others, nefarious or not. If this matters to youand perhaps it should matter to all of usyou have an increasing number of options. It is worth noting that some services like iMessage from Apple send encrypted messages by default, but communicate through Apple servers, and they could conceivably be read and stored there.

Hopefully weve helped to dispel some of the misinformation surrounding this misunderstood technology. Simply because someone chooses to keep their information private doesnt mean that they are doing somethingsinister. Allowing the conversation about encryption to be entirely about terrorism and not about basic privacy and prevention of identity theft is fundamentally bad for all of us. Its not a thing to be feared or misunderstood, but rather a tool that all of us should use as we see fit, without the stigma of being used only for evil purposes.

If youre interested in learning more about encryption methods, here are some How-To Geek classics, as well as some software that we recommend to start incorporating encryption into your digital life.

How to Set Up BitLocker Encryption on Windows

3 Alternatives to the Now-Defunct TrueCrypt for Your Encryption Needs

HTG Explains: When Should You Use Encryption?

Image Credits:Christiaan Colen,Mark Fischer,Intel Free Press,Sarah(Flickr),Valery Marchive,Walt Jabsco.

Read the original post:
What is Encryption, and Why Are People Afraid of It?

Related Post

Comments are closed.