Cryptography uses algorithms to transform data into unreadable ciphers for security. Symmetric encryption uses a single password for encryption and decryption, while asymmetric encryption uses two keys. Asymmetric encryption is considered more secure because the key that triggers decryption is not shared. Passphrases should be unique and alphanumeric to improve security.
Cryptography is a form of security that transforms information, images, programs or other data into unreadable ciphers by applying a series of complex algorithms to the source material. These algorithms transfer data in seemingly random streams or blocks of alphanumeric characters. An encryption key might encrypt, decrypt, or both, depending on the type of encryption software you use.
There are several types of encryption schemes, but not all of them are secure. Simple algorithms can be easily cracked using modern computer power, and another weakness lies in the decryption method. Even the most secure algorithms will decrypt for anyone who has the password or key.
Symmetric types of encryption schemes use a single password to act as both encryption and decryption. By supplying the encryption key, you can “mount” the drive and work in an unencrypted state, then return the drive to encryption when done.
The algorithms used are considered to be very secure, with one such being adopted as the Advanced Encryption Standard (AES) used by the US government for storing classified and top secret information. The only weakness of symmetric encryption programs is that the single key must necessarily be shared, providing an opportunity for it to be leaked or stolen. Part of key management involves changing the key often to improve security.
Public asymmetric encryption schemes also use highly secure algorithms with a different method of encryption and decryption. This software uses two keys, known as a key pair. One is the public key and it can be freely shared or given to anyone because its only job is to encrypt. The other key is the private key and is not shared. The private key is needed to decrypt everything encrypted by the public key.
Asymmetric encryption software is widely used to make emails and instant messaging private. Users can install one of the many encryption programs available, and the program generates a key pair for the user. The encryption key, or key pair public key, can be sent to others who are also running a compatible encryption program.
Once another person has the public key, they can send encrypted messages to the owner of the public key. Once a message is encrypted, even the author cannot decrypt it. In the encryption process, the algorithms rely on the key pair and only the private key of that specific key pair can reverse the encryption process. The mail or message is then sent to the owner of the public key.
Upon receipt of the mail, the private key will require a passphrase before being decrypted. For maximum security, this passphrase should be provided manually, but the software will allow the user to store the passphrase locally so messages can be decrypted automatically. Asymmetric encryption is considered more secure than symmetric encryption because the key that triggers decryption is not shared.
Regardless of the type of encryption, if someone gains access to a computer, the data is only as secure as the passphrase that protects the encryption key. The best passphrases are alphanumeric and random, although they are harder to remember. If someone is going to choose something recognizable, they should avoid easily decipherable addresses, license plates, names, pets, or other passwords, and include numbers plus characters that aren’t letters or numbers. More importantly, each password should be completely unique from all others in use, as adopting a single password or password “theme” greatly reduces security and increases vulnerability.
Protect your devices with Threat Protection by NordVPN