From ancient Roman ciphers to modern computer-generated encryption keys with trillions of combinations, cryptography has been a fundamental part of human life for millennia. Now, as technology marches on, cryptography methods are becoming ever more sophisticated.
Encrypted emails and hashed passwords have long been a part of everyday life for those who prioritize their online security. But how exactly does modern cryptography work? And what are the advantages and disadvantages of relying on these security techniques?
Cryptography refers to the creation of a secure means of communication through use of an algorithm and a decryption key. In most cases, that involves scrambling text until it is unreadable, while still being able to reverse that process if you or someone you trust needs to see it. The vital aspects of cryptography are the complexity of the algorithm used in the scrambling process, and the key needed to decode the message. The more complex the algorithm, the stronger the encryption.
The algorithms used thousands of years ago would been involved rearranging or shifting letters within the original alphabet. But modern algorithms aren’t limited by a 26-character alphabet, so the strength and complexity of today’s digital cryptography can be practically unbreakable.
Before a written message is encrypted, it’s referred to as plaintext. After encryption, the remaining gibberish is called ciphertext.
There are three main types of cryptographic algorithms, each with a specific purpose.
Secret Key cryptography is often used when bulk encryption is needed. Encrypting entire databases would normally be the work of symmetric encryption. Asymmetric encryption, though more secure, is a far slower and power intensive method. Most banking systems will use symmetric encryption, too.
Symmetric encryption protocols: AES, Triple DES, Blowfish.
Public key encryption, or asymmetric encryption, is often found in blockchains for cryptocurrencies. This highly robust form of protection is stronger than symmetric encryption and used to authorize crypto transactions. The nature of the encryption process also makes it perfect for digital signatures.
Asymmetric encryption protocols: RSA, Diffie-Hellman key exchange.
Hashing is a cryptographic tool meant for checking the authenticity of a file or message, due to the unique nature of the hash value. Technically, it is possible for 2 files to have the same hash value but it took Google devoting two years of resources to make the concept a reality. It’s possible, but incredibly improbable it would ever happen.
Hashing encryption protocols: SHA-1, SHA-2, Tiger.
Encryption is also used in public key infrastructure (PKI) technology, which refers to secure online communications and safeguarding digital asset sharing on the public internet or company networks.
Symmetric encryption only requires the use of one key, so the encryption and decryption process is a lot quicker than it would be for asymmetric cryptography.
However, the disadvantage of symmetric encryption lies in the singular key. There is one copy of each key, at either end of the process. The act of keeping the key safe and secure from prying eyes is a risk in itself, especially if you’re constantly updating and changing the secret key needed. The exchanging of the key between two parties is often where most errors occur.
Asymmetric encryption is often regarded as the safer form of cryptography techniques, due to the need for two different keys. There is no need to transfer keys, either. The public key is always available to anyone looking for it, and only the recipient has access to the private decryption key.
The disadvantage of asymmetric encryption is that it’s slow. Every form of symmetric encryption will be faster. It takes a lot of power and time to secure files and messages asymmetrically.
Hashing has a limited number of uses, but can be very effective in certain circumstances. Providing a file with a barcode-like identifier can be a foolproof technique for authenticating a message.
Cryptography and network security go hand in hand. NordVPN employs symmetric and asymmetric encryption protocols to ensure your safety online. AES-256, a symmetric protocol, has more combinations than there are atoms in the universe.
NordLynx, NordVPN’s fastest VPN protocol, uses an asymmetric encryption called ECC. ECC can create smaller and more efficient encryption keys, and has gained the praise and recognition of cybersecurity experts everywhere.
A VPN is the perfect tool to provide peace of mind while browsing online. One account with NordVPN will cover up to six devices: that’s an entire household protected with next-level encryption. NordVPN is dedicated to giving you the fastest, safest experience possible.
Online security starts with a click.
Stay safe with the world’s leading VPN
We value your privacy