How Does Encryption Work? Explained

  • Thread starter Thread starter physics kiddy
  • Start date Start date
  • Tags Tags
    Encryption Works
Click For Summary
SUMMARY

This discussion focuses on the necessity and functionality of encryption, particularly in protecting personal data from unauthorized access. It highlights the Compress or Encrypt attributes found in folder properties and emphasizes the importance of encryption in scenarios such as laptop theft. The conversation also distinguishes between asymmetric and symmetric encryption, explaining their roles in secure communications, particularly in HTTPS connections. TrueCrypt is recommended as a reliable tool for encrypting personal files and entire hard drives.

PREREQUISITES
  • Understanding of asymmetric and symmetric encryption
  • Familiarity with HTTPS and secure communications
  • Knowledge of file encryption tools, specifically TrueCrypt
  • Basic concepts of key exchange in encryption
NEXT STEPS
  • Research the principles of asymmetric encryption and its applications
  • Explore the functionality and features of TrueCrypt for file encryption
  • Learn about key exchange methods and their importance in secure communications
  • Investigate other encryption tools and their effectiveness in data protection
USEFUL FOR

This discussion is beneficial for cybersecurity enthusiasts, IT professionals, and anyone interested in safeguarding personal data through encryption methods.

physics kiddy
Messages
135
Reaction score
1
I read about methods of encryption and I guess that they work only when you are online. But, I was astonished to see Compress or Encrypt attributes in Properties --> General --> Advanced. Please explain what's the need of encrypting any folder and what happens when a folder is encrypted. Frankly saying, I could see nothing except the name of the folder written in green text when I try to encrypt any folder.
 
Computer science news on Phys.org
Encryption is a huge subject. In addition, you seem to be asking why bother with encryption rather than how it works. As for why, the reason is simply to prevent others from viewing your data. A common example would be if someone steals your laptop. If your files are unencrypted then the thief will have access to a variety of personal data, some of which could be very valuable.

You mention online, which implies totally different types of encryption. In the case of online communications, the encryption is used to protect communications from eavesdropping. In general you should assume that your internet connection can be monitored by anyone with sufficient motivation to do so. By encrypting your data you ensure that even if they can see the communications that can't actually read the contents.

An interesting question is how can you communicate securely with someone you've never met, or exchanged a password with, while a hostile third party watches all your communications. At first this may seem impossible, but it is not. Every time you connect to a secure website (one that starts with https) you and that site are exchanging keys in a way that a eavesdropper can't see. This is done by asymmetric encryption (aka public key encryption), and is generally slower and less secure than symmetric (aka normal encryption). Therefore, the asymmetric encryption is used only to exchange a random key so that symmetric encryption can then be used. This is called key exchange, and is quite interesting (at least to me):
http://en.wikipedia.org/wiki/Key_exchange"

If you are interested in learning more about how encryption works, I highly recommend this guide:
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html"

It is split into 4 sections, starting quite basic, and finally going into quite a bit of detail.

If you are interested in encrypting your personal files a program called Truecrypt is free/open source, and quite good. You can encrypt your entire hard drive so that you need to enter a password to access it. If you use a strong passphrase the encryption will hold up against the strongest known attacks (that is, even if a government wants your files they will be unlikely to crack it, of course there are http://xkcd.com/538/" ).
http://www.truecrypt.org/"
 
Last edited by a moderator:

Similar threads

  • · Replies 27 ·
Replies
27
Views
3K
  • · Replies 52 ·
2
Replies
52
Views
7K
Replies
7
Views
3K
  • · Replies 2 ·
Replies
2
Views
3K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 1 ·
Replies
1
Views
3K
  • · Replies 41 ·
2
Replies
41
Views
4K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K