How Does Encryption Work? Explained

In summary: "In summary, encryption is used to protect data from being viewed by others. It is commonly used to secure personal data, such as on a stolen laptop, and to protect online communications from eavesdropping. Asymmetric encryption is used to exchange keys for symmetric encryption, which is faster and more secure. To learn more about encryption, a recommended resource is the "Stick Figure Guide to Advanced Encryption" available online. Truecrypt is a free and reliable program for encrypting personal files.
  • #1
physics kiddy
135
1
I read about methods of encryption and I guess that they work only when you are online. But, I was astonished to see Compress or Encrypt attributes in Properties --> General --> Advanced. Please explain what's the need of encrypting any folder and what happens when a folder is encrypted. Frankly saying, I could see nothing except the name of the folder written in green text when I try to encrypt any folder.
 
Computer science news on Phys.org
  • #2
Encryption is a huge subject. In addition, you seem to be asking why bother with encryption rather than how it works. As for why, the reason is simply to prevent others from viewing your data. A common example would be if someone steals your laptop. If your files are unencrypted then the thief will have access to a variety of personal data, some of which could be very valuable.

You mention online, which implies totally different types of encryption. In the case of online communications, the encryption is used to protect communications from eavesdropping. In general you should assume that your internet connection can be monitored by anyone with sufficient motivation to do so. By encrypting your data you ensure that even if they can see the communications that can't actually read the contents.

An interesting question is how can you communicate securely with someone you've never met, or exchanged a password with, while a hostile third party watches all your communications. At first this may seem impossible, but it is not. Every time you connect to a secure website (one that starts with https) you and that site are exchanging keys in a way that a eavesdropper can't see. This is done by asymmetric encryption (aka public key encryption), and is generally slower and less secure than symmetric (aka normal encryption). Therefore, the asymmetric encryption is used only to exchange a random key so that symmetric encryption can then be used. This is called key exchange, and is quite interesting (at least to me):
http://en.wikipedia.org/wiki/Key_exchange"

If you are interested in learning more about how encryption works, I highly recommend this guide:
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html"

It is split into 4 sections, starting quite basic, and finally going into quite a bit of detail.

If you are interested in encrypting your personal files a program called Truecrypt is free/open source, and quite good. You can encrypt your entire hard drive so that you need to enter a password to access it. If you use a strong passphrase the encryption will hold up against the strongest known attacks (that is, even if a government wants your files they will be unlikely to crack it, of course there are http://xkcd.com/538/" ).
http://www.truecrypt.org/"
 
Last edited by a moderator:

1. How does encryption work?

Encryption is a process of converting information or data into a code or cipher, making it unreadable to anyone without the proper decryption key. This ensures the security and confidentiality of the information being transmitted or stored.

2. What is the purpose of encryption?

The main purpose of encryption is to protect sensitive information from being accessed by unauthorized individuals. This includes personal data, financial information, and confidential communications.

3. What are the different types of encryption?

There are two main types of encryption: symmetric and asymmetric. Symmetric encryption uses a single key to encrypt and decrypt data, while asymmetric encryption uses a pair of keys (public and private) to encrypt and decrypt data.

4. How is encryption used in everyday life?

Encryption is used in many everyday activities, such as online banking, e-commerce transactions, and messaging apps. It also plays a crucial role in securing sensitive data in government and corporate communications.

5. Is encryption 100% secure?

While encryption is a highly effective method of protecting data, it is not 100% secure. As technology advances, so do the methods and techniques used to break encryption. It is important to regularly update and strengthen encryption methods to stay ahead of potential threats.

Similar threads

  • Computing and Technology
Replies
27
Views
1K
  • Computing and Technology
2
Replies
52
Views
3K
Replies
7
Views
2K
  • Computing and Technology
Replies
2
Views
2K
  • Engineering and Comp Sci Homework Help
Replies
2
Views
918
  • Quantum Interpretations and Foundations
Replies
3
Views
972
  • General Discussion
2
Replies
41
Views
2K
  • Programming and Computer Science
Replies
2
Views
1K
  • Programming and Computer Science
Replies
8
Views
1K
Replies
15
Views
4K
Back
Top