ENCRYPTION AND QUANTUM COMPUTING

 


Data encryption is frequently thought to be the most secure way to protect your electronic data. During the encryption process, human readable plaintext is converted into encrypted, unreadable text known as cipher text. When encryption is used, both the sender and receiver use a cryptographic key that is made up of a set of mathematical values. The recipient uses the key to decrypt and read the data, this ensures that only authorized parties can read or access the encrypted data. There are three things that determine the effectiveness of the encryption: the strength of the algorithm, the length of the cryptographic key, and the appropriateness of the selected encryption system (Go Anywhere, 2021).

There are two different types of cryptographic systems: symmetric and asymmetric. The symmetric key system is used when both the send and receiver of the data have the same key and use it to encrypt and decrypt their data (Go Anywhere, 2021). With asymmetric encryption, also known as public/private key systems, two separate keys are used, a public key and a private key. The private key is kept secret and the public key is widely distributed, these two keys are mathematically related and the public key can only be decrypted with the assistance of the private key.

Contrary to popular belief, encrypted data can also be hacked by a number of different ways. For starters, the data can be stolen before it is encrypted, or after it is decrypted. Also, hackers can gain full access to encrypted data by simply stealing the encryption key. While attempting to steal symmetrically encrypted data, the hackers have been known to launch a cypher-text attack and try to crack the code by using brute force (IT Foundations, 2021). Asymmetrically encrypted data is more vulnerable to attack but can be strengthened to keep hackers from mathematically solving their algorithms. Also, quantum computers pose a big threat to today’s encryption. Quantum computers are machines that harness the technology of quantum physics to both store data and perform extremely advanced computations (Lu, n.d.). When the quantum computer technology matures enough, it will be possible to hack most of today’s encryption; this of course is a big fear and introduces the need to develop post-quantum cryptography (Shankland, 2021).

Until then, there are a few ways to help keep encrypted data safe from hackers:

·        Always run the latest updates on your system to fix possible bugs in the code.

·        Always use a virtual private network (VPN) to provide an additional layer of security to your data.

·        Securely store the decryption key to keep it away from hackers.

·        Use a cyber security specialist to help provide advice and tools to keep your data safe.

It is important to apply multiple different layers of security to your data. Each layer of security provides a different tactic that a hacker would have to break through. Most of the times, hackers will go after the easiest target, if it proves too much work, they might move on to a less guarded system. By applying many layers of security, you make your data a much smaller and less desirable target for hackers. Cyber-criminals are opportunistic in nature and tend to exploit the easiest vulnerability, rather than waste their time trying to compromise a highly secured system. 

 

References

How encryption works: Everything you need to know. www.goanywhere.com. (2021, December 14). Retrieved February 15, 2022, from https://www.goanywhere.com/blog/how-encryption-works-everything-you-need-to-know#:~:text=Encryption%20is%20a%20method%20of,the%20originator%20of%20the%20message.

IT Services Edinburgh. (2021, April 19). Can encrypted data be hacked? IT Foundations: IT Support Edinburgh. Retrieved February 15, 2022, from https://itfoundations.com/can-encrypted-data-be-hacked/

Kaspersky. (2021, August 23). What is Data Encryption? usa.kaspersky.com. Retrieved February 15, 2022, from https://usa.kaspersky.com/resource-center/definitions/encryption

Loshin, P., & Cobb, M. (2020, April 16). What is encryption and how does it work? SearchSecurity. Retrieved February 15, 2022, from https://www.techtarget.com/searchsecurity/definition/encryption

Lu, D. (n.d.). What is a quantum computer? New Scientist. Retrieved February 15, 2022, from https://www.newscientist.com/question/what-is-a-quantum-computer/

Shankland, S. (2021, May 24). Quantum computers could crack today's encrypted messages. CNET. Retrieved February 15, 2022, from https://www.cnet.com/tech/computing/quantum-computers-could-crack-todays-encrypted-messages-thats-a-problem/

Comments