A Brief Guide to Encryption

A Brief Guide to Encryption

Over the last few months, the public has been sitting on the sidelines watching as the debate on encryption unfolds. It’s an emotionally charged subject that has the public divided.

Despite your stance on the issue, though, some people are confused, because they aren’t entirely sure how encryption works or what it even is. So, here’s a little background for you.

Encryption turns your 'stuff' into other 'stuff.'

When you make a purchase online, send a text message, or email another person, this data is considered to be ‘in transit.’ During this period, a hacker can drop in and swoop your data up for themselves. Encryption takes your ‘data in transit’ and scrambles it with a sophisticated mathematical algorithm to prevent this swooping from occurring. This algorithm creates an unintelligible combination of your data that can be incredibly difficult and near impossible to unscramble. HowToGeek provides a few good examples here.

There are levels of encryption.

There are different types of encryption, namely asymmetric and symmetric. Symmetric encryption involves a single key to encrypt and decrypt information while asymmetric encryption involves both a public and private key. Asymmetric encryption is often used for messaging, and the decryption process only takes place after the private key gives permission to the public key.

It isn't meant to hide bad things.

One of the main reasons encryption exists, and continues to exist, is to protect and preserve your privacy. It’s not designed to hide illegal activities. In fact, quite the opposite. It is partially intended to hide your life from people attempting to carry out illegal activities against you—like identity theft, stalking, and fraud. But, that’s not all it’s meant for. It is also intended to keep your conversations and daily activities as private as you want them to be. Just because you aren’t doing anything worth hiding, doesn’t mean people should be able to watch or hear you live your life.

New Call-to-action

May 26, 2016 | Blog | 0 Comments

Recent Posts