Featured

Published on March 5th, 2021 📆 | 4199 Views ⚑

0

What is end-to-end encryption & how does it work?


https://www.ispeech.org

This blog provides overview of end-to-end encryption and how it protects the enterprise.

Over the past few years, the vulnerability of social networks like Facebook or messaging apps like Chat has given rise to using end-to-end encrypted platforms to protect communications. Today, platforms like WhatsApp, Signal and PreVeil use end-to-end encryption to protect the exchanges of usersā€™ data. Yet what is end-to-end encryption and how does it work? How does it differ from other forms of data protection and how does end-to-end encryption ensure the protection of data?
Ā 
This piece will focus on providing answers to these questions.
Ā 

Ā 

An example of how end-to-end encryption works
End-to-end encryption: What it is and how it works

End-to-end encryption provides the gold-standard for protecting communication. In an end-to-end encrypted system, the only people who can access the data are the sender and the intended recipient(s) ā€“ and no one else. Neither ackers nor unwanted third parties can access the encrypted data on the server.
Ā 
In true end-to-end encryption, encryption occurs at the device level. That is, messages and files are encrypted before it leaves the phone or computer and isnā€™t decrypted until it reaches its destination. As a result, hackers cannot access data on the server because they do not have the private keys to decrypt the data. Instead, secret keys are stored with the individual user on their device which makes it much harder to access an individualā€™s data.
Ā 
The security behind end-to-end encryption is enabled by the creation of a public-private key pair. This process, also known as asymmetric cryptography, employs separate cryptographic keys for securing and decrypting the message. Public keys are widely disseminated and are used to lock or encrypt a message. Private keys are only known by the owner and are used to unlock or decrypt the message.
Ā 
In end-to-end encryption, the system creates public and private cryptographic keys for each person who joins.

An example

Letā€™s say Alice and Bob create accounts on the system. The end-to-end encrypted system provides each with a public-private key pair, whereby their public keys are stored on the server and their private keys are stored on their device.
Ā 
Alice wants to send Bob an encrypted message. She uses Bobā€™s public key and encrypts her message to him with it. Then, when Bob receives the message, he uses his private key on his device to decrypt the message from Alice.
Ā 
When Bob wants to reply, he simply repeats the process, encrypting his message to Alice using Aliceā€™s public key.
Ā 
description of end-to-end encryption

Can end-to-end encryption be hacked?

Security practitioners often point out that security is a chain that is only as strong as the weakest link. Bad guys will attack the weakest parts of your system because they are the parts most likely to be easily broken. Given that data is most vulnerable when stored on a server, hackersā€™ techniques are focused on gaining access to servers.
Ā 
As the Department of Homeland Security has written:
Ā 
Given that attackers will go after low hanging fruit like where the data is stored, a solution that does not protect stored data will leave information extremely vulnerable.
Ā 
End-to-end encryption however does protect stored data. In fact it secures and protects data throughout its journey. As such, end-to-end encryption is the safest option for data security available.
Ā 
As the DHS goes on to state in its report:
Ā 
Attacking the data while encrypted is just too much work [for attackers].
Ā 

Why end-to-end encryption is important and what it protects against

End-to-end encryption is important because it provides users and recipients security for their email and files from the moment the data is created by the user until the moment it is received by the recipient. It also ensures that no third party can read the exchanged messages.
Ā 
Services like Gmail, Yahoo or Microsoft enable the provider to access the content of usersā€™ data on its servers because these providers hold copies to the decryption keys. As such, these providers can read usersā€™ email and files. In Googleā€™s case, its possession of decryption keys has enabled them in the past to provide the Google account holder with targeted ads.
Ā 
By contrast, in well-constructed end-to-end encrypted systems, the system providers never have access to the decryption keys.
Ā 

What are the advantages of end-to-end encryption

The NSA recently issued guidelines for using collaboration services. At the top of the NSAā€™s list was the recommendation that collaboration services employ end-to-end encryption.End-to-endā€™s inclusion in the NSAā€™s list highlights its shift to the mainstream by an organization known to seek the highest levels of security for themselves and their technologies. The NSA notes that by following the guidelines it defines, users can reduce their risk exposure and become harder targets for bad actors.





The advantages of end-to-end encryption
Ā 

  1. Ensures your data is secure from hacks: With end to end encryption, you are the only one who has the private key to unlock your data. Data on the server canā€™t be read by hackers because they do not have the private keys to decrypt the information.
    Ā 
  2. Protects your privacy: Providers like Google and Microsoft can read your data. When you use their service, data is decrypted on their servers. If data is decrypted on their servers, then hackers and unwanted third parties can read it, too.
  3. Ā 

  4. Protects admins: Since admins donā€™t hold the decryption keys to decrypt the data, any attack that targets administrators will come up short.

Ā 
The U.S. State Department has also wised up to the benefits of end-to-end encryption with their ITAR Carve out for Encrypted Technical data . The carve out establishes that defense companies can now share unclassified technical data outside the U.S. with authorized persons. This exchange can be done without requiring an export license so long as the data is properly secured with end-to-end encryption. If the data is end-to-end encrypted, the exchange is not considered an export.
Ā 
The NSAā€™s and State Departmentā€™s statements acknowledge that end-to-end encryption provides a significant advantage to users over traditional forms of encryption. End-to-end encryption secures data on the userā€™s device and only ever decrypts it on the recipientā€™s device. This means, the data can never be decrypted on the server nor in transit nor on the userā€™s device.

PreVeil and end-to-end encryption

At PreVeil, end-to-end encryption is at the core of how we usersā€™ protect email and files. Today, hundreds of companies rely on PreVeil to protect their customersā€™ most sensitive data.
Ā 
Learn more about how PreVeil uses end-to-end encryption to protect your data. Download our architectural whitepaper today.

The post What is end-to-end encryption & how does it work? appeared first on PreVeil.

*** This is a Security Bloggers Network syndicated blog from Blog ā€“ PreVeil authored by Orlee Berlove. Read the original post at: https://www.preveil.com/blog/end-to-end-encryption/

Source link

Tagged with: ā€¢ ā€¢



Comments are closed.