Back to Blog
Encryption

Encryption 101: Protecting Your Online Privacy In Simple Steps


Encryption 101: Protecting Your Online Privacy In Simple Steps

We live at a time when there’s never been so much at stake regarding our personal online privacy. One of the best ways to keep sensitive information safe from unauthorized access is to use encryption. No matter how casual you may be about surfing the web — or if you have a job requiring you to deal regularly with sensitive information — learning how encryption works will greatly enhance your online security. Here we provide a step-by-step guide covering the basics.

What is Encryption?

Encryption takes what would normally be legible text (plaintext), converts it into unintelligible code (ciphertext) via some type of mathematical algorithm, and uses a secret “key” to do so. Using the proper decryption key enables a user to convert ciphertext back into plaintext. In other words, if a third-party intercepts encrypted data during transmission, the interception will appear to be nothing more than garbled nonsense to the interceptor.

Why Does Encryption Matter?

Types of Encryption

Symmetric Encryption

Both encryption and decryption are performed using the exact same secret key within symmetric encryption. Because both parties (the sender and receiver) require access to this secret key prior to exchanging encrypted data, this method requires each party to securely transmit the secret key before sending any encrypted messages. As symmetric encryption algorithms are typically very fast and capable of processing large amounts of data, they’re usually preferred for encrypting large quantities of data.

Asymmetric Encryption (Public-Key Cryptography)

With asymmetric encryption, a user creates pairs of mathematically-related keys. Each key is related mathematically to one another – a public key for encryption purposes and a private key for decryption purposes. Thus, there is no requirement for each party involved in communication to securely exchange a shared secret prior to exchanging data.

Using Them Together

In real-world implementations of symmetric and asymmetric encryption methods are often employed together. An example of this is how HTTPS employs asymmetric encryption (via TLS) to securely exchange a symmetric session key that is then used for symmetrically encrypting the actual content transferred during the data transfer. This hybrid model utilizes the identity-verifying aspects of asymmetric encryption along with the rapid execution capabilities of symmetric encryption.

Steps for Encrypting Your Online Data

Encryption is the process of encoding information. This is the primary method used to protect online data. There are several methods of encryption. These include:

Encrypted Email

Proton Mail and Tutanota both offer “end-to-end” encryption. This means that only you, and the person receiving the e-mail, will be able to view the contents of the email. Neither your e-mail service provider nor government agencies will be able to read your emails.

End-to-end encryption also includes a mechanism called “forward secrecy”. Forward secrecy ensures that if a hacker is able to intercept communications in real-time, he/she will not be able to decrypt those communications later.

Encrypted Messaging

Signal is generally considered the gold standard for private communication. Signal uses the “Signal protocol”, which offers end-to-end encryption, forward secrecy, and “post-compromise security.” Post-compromise security refers to the ability to keep communications secret even after someone has gained unauthorized access to your phone/computer/etc.

WhatsApp uses the Signal protocol for its message content. However, Meta collects metadata on who you send messages to, how often you communicate with that individual and how long ago you last communicated with that individual.

Use a VPN

A Virtual Private Network (VPN) creates a safe tunnel through which your internet connection travels. Your internet Service Provider (ISP) cannot see what you do online while you are connected to the VPN because all of your traffic is encrypted.

Choose a reputable VPN company, check their audit logs and make sure they have a no log policy. Do not think a VPN makes you completely anonymous. Think of a VPN as just shifting trust from your ISP to the VPN company.

HTTPS Everywhere

Always check if a website is using HTTPS (padlock symbol). If a website is using HTTPS then that means the data being transferred between your browser and the website’s server is encrypted. The majority of modern browsers alert users when a website is missing HTTPS.

Full-Disk Encryption

Full-disk encryption (BitLocker on Windows; FileVault on Mac; LUKS on Linux) is another form of encryption. Full-disk encryption encrypts all of the information stored on your computer’s hard drive(s). So, if your computer gets stolen and the thief attempts to access the information stored on your computer’s hard drive(s), they will not be able to since it is fully encrypted. You will need to enter your login credentials/password/PIN to decrypt the information.

All modern smart phones (Android/Apple etc.) enable full-disk encryption by default when a user enables a screen lock.

Encrypt External Storage

It is highly recommended that you encrypt any external storage media (USB drives etc.). VeraCrypt and other cross platform programs allow you to create encrypted USB drives and external hard drives. If you lose an unencrypted USB drive, there is a high chance you will never see it again.

Use a Password Manager

You should always use a password manager to generate and store strong, complex passwords for each of your online accounts. Password managers have the option of generating random and very complex passwords for each account. Each of these generated passwords will be stored securely within the password manager’s database, which itself is protected with a master password that you will need to remember.

For example, instead of having one password for multiple sites, you could have ten or twenty strong passwords.

Enable Two-Factor Authentication (2FA)

The second step in protecting yourself online is to enable two factor authentication (2FA) on all accounts that allow it. Two factor authentication requires something you know (your username and password), along with something you have (a physical token, an app on your phone etc.).

Using hardware security tokens (FIDO/WebAuthn) or authenticator apps (TOTP) provide much better security against phishing and SIM swap attacks compared to sending 2FA via SMS/text message.

Encrypt Individual Files

Encrypt any files that contain personal/sensitive information using 7-Zip/VeraCrypt/GPG etc.

Tools like 7-Zip, VeraCrypt and GPG allow you to create encrypted archives and/or containers that will require a password/key to open/access.

Cloud Storage

Most cloud storage services (Google Drive/Dropbox/iCloud etc.) encrypt data both in-transit AND at-rest. However, this still leaves room for error because the cloud storage provider retains the decryption keys, allowing them/law enforcement with a court order/warrant to view/access your files.

Therefore, if you want to ensure that your data remains private and secure, you should consider using client-side encryption layers like Cryptomator/Trezor/Cryptomate etc., or find a zero-knowledge provider like Tresorit.

Keep Software Up to Date

Keeping software up to date helps prevent hackers from finding vulnerabilities in encryption algorithms and taking advantage of them. Even if an algorithm appears to be incredibly secure, it will fail if there are bugs in the application software that implements it.

Common Challenges

Managing Keys

Losing an encryption key will result in permanent loss of access to the encrypted data it protects. Make sure you back up critical keys securely and look into key management solutions for organizations.

Performance Overhead

Encryption takes some processing power however most devices today (especially laptops/desktops/CPUs with AES-NI instructions) handle it with almost no performance impact.

The Future of Encryption

Post-Quantum Cryptography

The development of quantum computers would create massive changes in the world of cryptography. Specifically, if quantum computers were developed to the appropriate level, they would be able to “break” both RSA and ECC by being capable of quickly breaking the two specific mathematical problems they rely on (integer factorization and discrete logarithms, respectively).

On the other hand, symmetric ciphers, such as AES, have much less of a problem - doubling the size of the key (for example going from AES-128 to AES-256) appears to be sufficient to protect against any potential threat created by quantum computers.

As a result, NIST has recently finalized their first set of post-quantum cryptographic standards. Those standards include ML-KEM (previously known as CRYSTALS-Kyber) for key encapsulation, and ML-DSA (previously known as CRYSTALS-Dilithium) for digital signatures. Use of those standards is beginning to appear in use today in both TLS and SSH, as well as in message transmission protocols.

New Techniques Being Developed

There are many researchers who are developing new forms of cryptographic techniques, such as fully-homomorphic encryption (the ability to perform computations on data which is still encrypted without needing to decrypt the data), and zero-knowledge proof systems (a mechanism allowing you to prove that a certain piece of information is true without having to reveal what that information is), and also mechanisms for performing secure multi-party computations. What is interesting about these developments is that they are transitioning from theoretical constructs into actual usable implementations.

Increased Government Regulation

On top of this, numerous governments around the globe are increasing regulation around how companies handle user data. This includes GDPR in Europe (General Data Protection Regulation), CCPA in California (California Consumer Privacy Act), and DPDPA in India (Data Protection Personal Data Bill).

However, while governments are regulating data handling practices, some governments want to add an encryption backdoor for law enforcement purposes. That creates an obvious conflict between users’ desire for privacy and their need for security. Ultimately, the way these conflicts resolve themselves will determine the future direction of encryption policy.

Can Encrypted Data Be Broken?

In theory, any encryption method can be broken if an attacker has enough time and computing resources. In reality, modern encryption methods are designed so that brute-force attacks cannot occur: