Why doesn't public key encryption stop hackers?

In summary, hackers are able to hack into systems through various means, such as sending malicious files, exploiting operating system bugs, or tricking users into giving away their passwords. However, high-profile systems may have additional layers of security to prevent hacking attempts. In the past, code breaking involved exploiting weaknesses in how encryption keys were distributed and used.
  • #1
nomadreid
Gold Member
1,670
204
This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for example, or more complex programs? (I am not trying to learn to be a hacker, no danger there, I am just trying to make sense out of the news.)
 
Technology news on Phys.org
  • #2
nomadreid said:
This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for example, or more complex programs? (I am not trying to learn to be a hacker, no danger there, I am just trying to make sense out of the news.)

Very little, if any, hacking involves breaking your PKI. In my experience the most common problems are: a) The trojan: a dodgy file gets sent to your computer in the hope you will open it; b) Operating system bugs: which can allow code to be smuggled onto your computer; and c) Simply conning someone into giving their password, or simply guessing it.

Virus checkers and firewalls are supposed to deal with a) and prevent malicious software reaching your computer. Keeping your o/s up to date with security patches should prevent b). And, security awareness should prevent c).

On high-profile systems, which potentially a foreign government might target, things gets a bit more complicated. E.g. two layers of firewalls from different manufacturers and suppression of error messages to prevent the hacker seeing how far they have got etc.
 
  • Like
Likes Ibix, FactChecker and nomadreid
  • #3
Thanks, PeroK
 
  • #4
I went on a tour round Bletchley Park, where they did code breaking during the Second World War.

The Germans changed their encryption keys daily. But because distributing keys was tricky back in the day, groups of units shared an encryption key. They weren't obvious groupings, so the senior commanders didn't share keys. But the high command did share a key with some unimportant base in Africa. The Allies left them alone. Every day, they reported in: "Nothing to report". And every day the Allies used that known plain text to crack their key and read the high command's messages.

Also, the problem with changing keys every day was that people didn't really change them - the equivalent of using password1 today and password2 tomorrow. Or else they cycled through half a dozen keys. So rules were introduced to make things more random. The guide's face when he said this was hilarious - I was there with about twenty maths/engineering/science types from work, and I suspect we looked like the National Synchronised Face Palming squad. Especially when he went on to say that there were so many restrictions on what changes had to be made that if we broke your key today there were only about half a dozen possibles for tomorrow instead of hundreds.

That's the anecdotal version of PeroK's response, basically. Sloppy usage by people who don't understand how catastrophic it can be is exploitable, no matter how good your encryption is.
 
Last edited:
  • Like
Likes nomadreid

1. Why is public key encryption not completely secure against hackers?

While public key encryption is considered to be a highly secure method of protecting data, it is not completely foolproof against hackers. This is because hackers can use various techniques such as brute force attacks, social engineering, or exploiting vulnerabilities in the encryption algorithms to try and break the encryption.

2. Can hackers intercept or steal public keys to decrypt my data?

Yes, it is possible for hackers to intercept or steal public keys in order to decrypt encrypted data. This is why it is important to properly secure and protect the public keys, such as using digital signatures and certificates.

3. Can hackers manipulate or modify the public key to gain access to my data?

Yes, hackers can manipulate or modify the public key in order to gain access to encrypted data. This can be done by altering the public key during transmission or by using a compromised public key from a trusted source.

4. What are some common weaknesses in public key encryption that hackers can exploit?

Some common weaknesses in public key encryption that hackers can exploit include weak encryption algorithms, predictable or reused key pairs, and human error in implementing the encryption system.

5. Is there any way to make public key encryption more secure against hackers?

Yes, there are ways to enhance the security of public key encryption against hackers. This includes regularly updating and using strong encryption algorithms, properly securing and managing public keys, and implementing additional layers of security such as multi-factor authentication.

Similar threads

  • Programming and Computer Science
Replies
1
Views
509
Replies
8
Views
3K
Replies
11
Views
5K
  • Engineering and Comp Sci Homework Help
Replies
5
Views
2K
  • General Math
Replies
1
Views
1K
  • Computing and Technology
Replies
19
Views
4K
Replies
2
Views
886
  • Programming and Computer Science
Replies
1
Views
1K
  • Computing and Technology
Replies
2
Views
4K
Back
Top