Sunday 19 June 2022

ENCRYPTION: WHY ENCRYPTION MATTERS TO ME?

 

By: Vincent Mwando

1.1.Background

The world today evolves every minute with disruption in the human way of life. This has exacted pressure on human to develop ways of protecting and safeguarding their information in the digital space. Before the era “one click away”, we used to lock pieces of stuff in enclosed cubicles with padlocks or even safes. This hindered unauthorized users from accessing the components inside the safes, granaries and even the lockers. Evolution in information, communication and technology has brought out a beast termed us The Digital World which required the same approach but now through coding and decoding.

Currently, there is advancement in communication through the messaging platforms for instance WhatsApp and signal and in online banking such as mobile and internet banking. This has initiated a way such that prying eyes can access the information in the process of transmitting it to the end-users without even the knowledge of the sender and receiver. In other instances, access the credit data.

Thus, the wide use of emerging trends in communication, information and technology calls for encrypting data by encoding and the receiver having the special key that can decrypt it.

1.2.Introduction

Encryption is the art of encoding (coding and decoding) information. This involves scrambling or enciphering data so that only the target user gets the information hence the term end-to-end encryption.

In our daily life, we rely on encryption in many aspects in achieving privacy in the digital Space. It is applied in almost all sectors in the digital space from that of banking, cloud computing (iCloud, google drive, amazon etc.), communication-messaging (WhatsApp, Signal etc.), online shopping (Amazon, Alibaba, Jumia), normal daily browsing and even that of online streaming services.

Encryption has been under several threats; attacks from the data exfiltration, government, zero-day, malware and ransomware, rogue sites and spear-phishing hence the need to in protection of encryption and privacy in the digital space.

According to the United Nations Human Rights Council, ‘privacy online is important for the realization of the right to freedom of expression and to hold opinions without interference, and the right to freedom of peaceful assembly and association’.[2]

1.3.How encryption works.

Symmetrical, asymmetrical and hybrid encryption are the main types of encryption.

Once the message is composed by the sender majorly as plaintext, it is converted to ciphertext using a special unique key thereby scrambling the data then sending it to the receiver. The receiver has a key that decrypts the ciphertext into special readable text termed plaintext. The two special keys are required to encrypt and decrypt and once encrypted, only the decryption key can enable the receiver to comprehend the message.




      


 





                       


1.4.Threats to encryption

Threats to encryption is an attack on privacy and a violation of human rights. The threats come from all angles; the private sector, governments, businesses and individuals. The threats are Ghost proposals, Key escrow and “Machine in the Middle” (MITM) attack.

1.4.1. Quantum Threat (Post-quantum)[4]

The world currently runs on quantum technology i.e., quantum entanglement, quantum mechanics and quantum superposition. Currently, data and information across the digital space are controlled using a public key encryption algorithm which includes:

a.     Rivest–Shamir–Adleman (RSA). This is an asymmetric cryptographic algorithm i.e., has two keys (Public Key and Private Key) and is used in modern computers to encrypt and decrypt data.

b.     ElGamal. This is an asymmetric cryptographic algorithm that relies on the difficulty of obtaining discrete logarithm in a cyclic group[5].

c.     Elliptic Curve. This is an algebraic structure that offers encryption through public-key cryptography over finite fields.

Advancement in technology has brought by Quantum computers which can break public-key encryption enabling anyone with the manpower and skill to obtain the keys hence able to decrypt the data. This brings the need to come up with the next generation of cryptography other than the RSA, ElGamal and Elliptical curve ones.

1.5.Pros of encryption

a.     It enables a near bulletproof barrier from accessing data by all unauthorized intrusions.

b.     It enables private communication as only intended parties by the sender access the content.

c.     Fosters personal security by keeping your identity safe and hinders people from impersonating you and getting private data.

d.     It’s the cornerstone of national security, by protecting the secrets of countries and organizations.

1.6.Encryption best practices

This entails,

      i.         Understanding the need for strong encryption by staying informed, informing and sharing information with others and finally taking actions through joining hands and keeping it safe.

     ii.         Use of strong encryption across all platforms.

   iii.         Restricting third-party applications from the amount of data and access they have.

   iv.         Government policies to safeguard encryption.

     v.         White hackers will protect and manage the constant changes and advancement in technology.

1.7.How to keep safe in the digital space.

a)     Only using end-to-end encrypted messaging applications such as WhatsApp and Signal. Setting encryption default before using devices and various online and offline services.

b)    Using strong and unique passwords and codes and always having additional security features such as two-factor verification (2FA) and erase-data options turned on to avoid prying eyes and black hat hackers accessing the data.

c)     Updating security features and universal updates to be up to date. Software and application developers once realize britches and bugs in the system, tend to develop a solution and roll them through updates. This help safeguard privacy.

To conclude, encryption is part and parcel of our daily life. Achieving it requires a collective effort from individuals, government and more so the policies makers to come together and ensure strong encryption.



[1] Isuru Jayathilake, ‘Introduction to encryption’ Medium, 2 August 2018 <https://medium.com/@isuruj/introduction-to-encryption-4b810996a871>.

[2] United Nations Human Rights Council, Agenda Item 3: The promotion, protection and enjoyment of human rights on the Internet.

[3] Lina Gong, Li Zhang, Wei Zhang, Xuhong Li, Xia Wang and Wenwen Pan, ‘The application of data encryption technology in computer network communication security’ 2017, 5th International Conference on Computer-Aided Design, Manufacturing, Modeling and Simulation (CDMMS 2017).

[4] The Quantum Threat, < https://www.post-quantum.com/the-quantum-threat/#:~:text=Quantum%20computers%20can%20break%20current,one%20requiring%20mitigation%20strategies%20today.>

[5]ElGamal Encryption Algorithm, 16 Nov, 2018, <https://www.geeksforgeeks.org/elgamal-encryption-algorithm/>

No comments:

Post a Comment