Why doesn't public key encryption stop hackers?

Click For Summary
Public key encryption is theoretically secure, but hackers often exploit vulnerabilities unrelated to breaking encryption itself. Common methods include using trojans to trick users into opening malicious files, exploiting operating system bugs to introduce harmful code, and social engineering to obtain passwords. Effective security measures like virus checkers, firewalls, and regular operating system updates can mitigate these risks. In high-profile cases, additional security layers are employed to protect sensitive information. Historical examples illustrate that even with strong encryption, poor key management and user practices can lead to significant security breaches. Ultimately, human error and inadequate security awareness are critical factors that hackers exploit, regardless of the strength of encryption methods.
nomadreid
Gold Member
Messages
1,762
Reaction score
248
This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for example, or more complex programs? (I am not trying to learn to be a hacker, no danger there, I am just trying to make sense out of the news.)
 
Technology news on Phys.org
nomadreid said:
This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for example, or more complex programs? (I am not trying to learn to be a hacker, no danger there, I am just trying to make sense out of the news.)

Very little, if any, hacking involves breaking your PKI. In my experience the most common problems are: a) The trojan: a dodgy file gets sent to your computer in the hope you will open it; b) Operating system bugs: which can allow code to be smuggled onto your computer; and c) Simply conning someone into giving their password, or simply guessing it.

Virus checkers and firewalls are supposed to deal with a) and prevent malicious software reaching your computer. Keeping your o/s up to date with security patches should prevent b). And, security awareness should prevent c).

On high-profile systems, which potentially a foreign government might target, things gets a bit more complicated. E.g. two layers of firewalls from different manufacturers and suppression of error messages to prevent the hacker seeing how far they have got etc.
 
  • Like
Likes Ibix, FactChecker and nomadreid
Thanks, PeroK
 
I went on a tour round Bletchley Park, where they did code breaking during the Second World War.

The Germans changed their encryption keys daily. But because distributing keys was tricky back in the day, groups of units shared an encryption key. They weren't obvious groupings, so the senior commanders didn't share keys. But the high command did share a key with some unimportant base in Africa. The Allies left them alone. Every day, they reported in: "Nothing to report". And every day the Allies used that known plain text to crack their key and read the high command's messages.

Also, the problem with changing keys every day was that people didn't really change them - the equivalent of using password1 today and password2 tomorrow. Or else they cycled through half a dozen keys. So rules were introduced to make things more random. The guide's face when he said this was hilarious - I was there with about twenty maths/engineering/science types from work, and I suspect we looked like the National Synchronised Face Palming squad. Especially when he went on to say that there were so many restrictions on what changes had to be made that if we broke your key today there were only about half a dozen possibles for tomorrow instead of hundreds.

That's the anecdotal version of PeroK's response, basically. Sloppy usage by people who don't understand how catastrophic it can be is exploitable, no matter how good your encryption is.
 
Last edited:
  • Like
Likes nomadreid
Learn If you want to write code for Python Machine learning, AI Statistics/data analysis Scientific research Web application servers Some microcontrollers JavaScript/Node JS/TypeScript Web sites Web application servers C# Games (Unity) Consumer applications (Windows) Business applications C++ Games (Unreal Engine) Operating systems, device drivers Microcontrollers/embedded systems Consumer applications (Linux) Some more tips: Do not learn C++ (or any other dialect of C) as a...

Similar threads

Replies
8
Views
3K
Replies
11
Views
6K
  • · Replies 22 ·
Replies
22
Views
2K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 19 ·
Replies
19
Views
4K
  • · Replies 1 ·
Replies
1
Views
5K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 13 ·
Replies
13
Views
4K
Replies
2
Views
3K