ENCRYPTION AND QUANTUM COMPUTING
Data
encryption is frequently thought to be the most secure way to protect your
electronic data. During the encryption process, human readable plaintext is
converted into encrypted, unreadable text known as cipher text. When encryption is used, both the sender and receiver use a cryptographic
key that is made up of a set of mathematical values. The recipient uses the key to
decrypt and read the data, this ensures that only authorized parties can read
or access the encrypted data. There are three things that determine the
effectiveness of the encryption: the strength of the algorithm, the length of
the cryptographic key, and the appropriateness of the selected encryption
system (Go Anywhere, 2021).
There
are two different types of cryptographic systems: symmetric and asymmetric. The
symmetric key system is used when both the send and receiver of the data have
the same key and use it to encrypt and decrypt their data (Go Anywhere, 2021). With
asymmetric encryption, also known as public/private key systems, two separate keys
are used, a public key and a private key. The private key is kept secret and
the public key is widely distributed, these two keys are mathematically related
and the public key can only be decrypted with the assistance of the private
key.
Contrary
to popular belief, encrypted data can also be hacked by a number of different ways.
For starters, the data can be stolen before it is encrypted, or after it is
decrypted. Also, hackers can gain full access to encrypted data by simply stealing
the encryption key. While attempting to steal symmetrically encrypted data, the
hackers have been known to launch a cypher-text attack and try to crack the
code by using brute force (IT Foundations, 2021). Asymmetrically encrypted data
is more vulnerable to attack but can be strengthened to keep hackers from mathematically
solving their algorithms. Also, quantum computers pose a big threat to today’s
encryption. Quantum computers are machines that harness the technology of
quantum physics to both store data and perform extremely advanced computations (Lu,
n.d.). When the quantum computer technology matures enough, it will be possible
to hack most of today’s encryption; this of course is a big fear and introduces
the need to develop post-quantum cryptography (Shankland, 2021).
Until
then, there are a few ways to help keep encrypted data safe from hackers:
·
Always
run the latest updates on your system to fix possible bugs in the code.
·
Always
use a virtual private network (VPN) to provide an additional layer of security
to your data.
·
Securely
store the decryption key to keep it away from hackers.
·
Use
a cyber security specialist to help provide advice and tools to keep your data
safe.
It
is important to apply multiple different layers of security to your data. Each layer
of security provides a different tactic that a hacker would have to break
through. Most of the times, hackers will go after the easiest target, if it
proves too much work, they might move on to a less guarded system. By applying
many layers of security, you make your data a much smaller and less desirable target
for hackers. Cyber-criminals are opportunistic in nature and tend to exploit
the easiest vulnerability, rather than waste their time trying to compromise a
highly secured system.
References
How encryption works:
Everything you need to know. www.goanywhere.com. (2021, December 14). Retrieved
February 15, 2022, from https://www.goanywhere.com/blog/how-encryption-works-everything-you-need-to-know#:~:text=Encryption%20is%20a%20method%20of,the%20originator%20of%20the%20message.
IT Services Edinburgh. (2021,
April 19). Can encrypted data be hacked? IT Foundations: IT Support Edinburgh.
Retrieved February 15, 2022, from
https://itfoundations.com/can-encrypted-data-be-hacked/
Kaspersky. (2021, August 23).
What is Data Encryption? usa.kaspersky.com. Retrieved February 15, 2022, from
https://usa.kaspersky.com/resource-center/definitions/encryption
Loshin, P., & Cobb, M.
(2020, April 16). What is encryption and how does it work? SearchSecurity.
Retrieved February 15, 2022, from
https://www.techtarget.com/searchsecurity/definition/encryption
Lu, D. (n.d.). What is a
quantum computer? New Scientist. Retrieved February 15, 2022, from
https://www.newscientist.com/question/what-is-a-quantum-computer/
Shankland, S. (2021, May 24).
Quantum computers could crack today's encrypted messages. CNET. Retrieved
February 15, 2022, from https://www.cnet.com/tech/computing/quantum-computers-could-crack-todays-encrypted-messages-thats-a-problem/
Comments
Post a Comment