For many, security remains a mystery that is better left to the professionals. It has been seen as too complex for the layperson to explore or fully understand. While diving into the math of some of the most complex algorithms can be a daunting task, the essence of what makes all of these algorithms work isn’t necessarily out of anyone’s reach. Instead of looking at the minute details of cryptography that most people find either boring or overwhelming, we can look at the concepts that make up public key encryption so that we may understand completely what exactly is protecting us from hackers.

What is public key encryption?

Public key encryption, a concept of public-key cryptography, is a means of exchanging data privately that involves a public and a private key. The public key is seen by everyone (hence the name “public”). However, the private key is only visible to the endpoints that are transmitting the data. Public key encryption is known as an “asynchronous” algorithm.

What is a synchronous/asynchronous algorithm?

If we had to label PKE as an “asynchronous” algorithm, it was done in order to distinguish it from synchronous algorithms. All cryptography uses a key-based system to approach the issue of privacy. The terms “synchronous” and “asynchronous” refer to the ways in which these keys are shared.

Let’s say that you’re trying to send a letter to someone that’s encrypted. The person receiving your letter needs to know how to decipher the entire text to understand what’s in it. How are you going to teach that person to decipher it? You’ll need to meet in secret to get that person the key. This is essentially how synchronous algorithms work. That “meeting in secret” part is a little difficult, because eyes and ears are everywhere. The internet is no different, since snoopers are also able to listen (“sniff”) on your transmissions.

Asynchronous algorithms work differently. There are two components to the formula: public and private. In an asynchronous scenario, you have a box with a lock instead. You send that box to the person you want to send the letter to and with a key that locks it, but doesn’t unlock it. This is known as the public key. Anyone can lock the box. Unlocking it is another story.

publickey-lock

You’d only be able to unlock your box with your private key, and each of you have your own that can unlock it. You don’t have to meet in secret or anything, and this eliminates the possibility of someone prying.

What if someone finds out your private key?

“If asynchronous encryption is being used to store passwords on most modern databases, why do people still get hacked?” That’s a bit of a mess, isn’t it? This is because hackers still use dastardly methods to get into major databases, either through internal sabotage, social engineering, or outwitting the security behind an employee’s account. Since most companies store private keys on their own servers, they still run the risk of compromising all of their users’ accounts. Some algorithms are also very easy to figure out and unlock regardless of whether the hacker has a private key or not (lock picking, anyone?). This is where public key encryption has its flaw.

There are a few companies out there that try to do something about this issue, including storing private keys across many different servers. But nothing works better than giving someone the ability to create their own private key (given that the private key is strong enough not to be guessed on its own). At this moment, PerfectCloud is the only company employing that solution. It has to since it’s providing a service that deals with very sensitive data from its customers. Unfortunately, I can’t say the same of other alternative services.

How would you approach the private key issue?

What advice would you have for people concerned about their privacy? Let’s hear from you in the comments section below!

What is Bitcoin And How You Can Utilize It Online

Do you know that the Internet actually has its own currency. Since 2009, we can pay and get paid using Internet’s own currency – Bitcoin.

How to Encrypt Your Gmail Message and Protect Your Privacy

If you are really concern about the privacy of your email, you should really consider encrypt your Gmail message so even Google can’t view it.

Save and Restore Groups of Tabs in Chrome with This Quick Trick

Looking for a way to overcome having too many tabs open? Use this quick trick to save and restore groups of tabs in Chrome without installing an extension.

Is Your Email Provider Leaking Your IP Address to Recipients? Here’s How to Find Out

If you care about your privacy, you need to make sure that your email provider is not leaking your IP address to recipients. Here’s the tool for the job!

Clef: Log In to WordPress Without Any Password

Tired of typing your username and password everytime you want to login to a site? Clef is a password replacement app that allows you to login without password.

How To Share Web Content Fast With Cortex for Chrome

If you want to try a faster way to share web content online, you might want to try an extension for Google Chrome called Cortex.

Stop Gmail from Showing You Targeted Ads

Google has been scanning your emails so as to serve you targeted ads. Here is how you can opt out of the system and stop Gmail from showing you targeted ads.

What’s New in WordPress 4.0 – Features Round Up

WordPress released the beta version of WordPress 4.0 that includes some new and improved features to improve back-end user experience. Let’s check out what’s new in this WordPress 4.0 Beta 1 Release.

How to Perform Search and Replace in WordPress

WordPress doesn’t come with a search and replace function. Luckily, there are several plugins that you can use. Let check them out.

Should You Back Up Physically or On The Cloud?

Between backing up your files physically in external hard disk and the cloud, which one is better? Let’s find out in this article.

4 Must-Have Chrome Extensions for YouTube Enthusiasts

If you are a Youtube enthusiasts, as well as a Chrome user, here are some of the best Chrome extensions for YouTube to improve your video watching experience.

Easily Download Torrents to the Cloud with Bitport

Are you having difficulty downloading torrents with your current Internet connection? Bitport allows you to download torrents remotely and access them online.