Encryption makes the modern world go round. Every time you make a mobile phone call, buy something with a credit card in a shop or on the web, or even get cash from an ATM, encryption bestows upon that transaction the confidentiality and security to make it possible and safe. – BBC Tech News
1. Looking into the history
During World War II, the Allies scored some notable victories against the German by recreating the machine used for encrypting the messages. Alternately, secret keys were used by sharing them among those who needed to communicate securely. These are known as symmetric encryption systems and have a weakness, in that everyone involved must possess the same set of secret (symmetric) keys like password.
In the modern era, a need has arisen to communicate securely with people and organisations we do not know and with whom we cannot easily share secret keys, said Dr Manulis. This need has given rise to public-key cryptography i.e asymmetric encryption. Public-key cryptography involves a pair of keys known as public key and private key. The owner of keys can be individual person, Brand, entity, website, or gadget. The message encrypted with one key can be opened – decrypted- by other corresponding key of the pair.
Modern systems use the hybrid combination of symmetric and asymmetric in various creative ways based on the magnitude of security level required. Well established encryption scheme cannot be broken by even supercomputers for years of work - unless the key compromised-.
Most popular two asymmetric encryption algorithms are
- RSA - Rivest, Shamir and Adlema
- ECC – Elliptic Curve Cryptography
Once encrypted can not be decrypted without the right other key of the pair, hence the information is as secure as the key protected (private key). There are various key protection schemes such that a group of people can represent single key hence no single person can force the system to compromise.
Cryptography has transformed the world information system
Cryptography has transformed the world information system and give trust to users and institutions. Here are few to name, which would have not existed without Cryptography evolution.
- Safe internet
- Digital banking
- e-Commerce
- Digital signatures
- Blockchain
- Smartphones applications and what not.
There is enormous potential cryptography can deliver, what is being used is small portion of the capacity. Scientists at NIST expect the next leap with quantum computing.