Encryption: How It Works, Types, and the Quantum Future | eSP – eSecurity Planet
Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats.
While cryptology is thousands of years old, modern cryptography took off in the 1970s with the help of the Diffie-Hellman-Merkle and RSA encryption algorithms. As networks evolved and organizations adopted internet communications for critical business processes, these cryptographic systems became essential for protecting data.
Through public and commercial development of advanced encryption methods, organizations from sensitive government agencies to enterprise companies can ensure protected communications between personnel, devices, and global offices. Financial institutions in the 1990s and 2000s were some of the first to incorporate encryption to protect online transactions, particularly as backup tapes were lost in transit.
The race continues for cryptographers to keep encryption systems ahead of cryptanalysts and hackers. Quantum computing attacks already present a real threat to existing standards, making the continued development of encryption pivotal for years to come.
This article looks at encryption, how it fits into cryptology, how cryptographic algorithms work, types, use cases, and more.
Encryption is the act of translating data into secret code (ciphertext) and back again (plaintext) for secure access between multiple parties. With shared protocols and encryption algorithms, users can encode files or messages only accessible to other select clients.
To no ones surprise, the study of cryptography and advancements in encryption are essential to developing cybersecurity. Individuals, small businesses, and enterprise organizations all rely on encryption to securely store and transfer sensitive data across wide-area networks (WAN) like the internet.
Application developers managing sensitive user data must especially beware of increasing regulatory action surrounding data privacy.
Cryptology is the overarching field of study related to writing and solving codes, whereas encryption and decryption are the central processes driving the computer science discipline.
As seen below, cryptography is the methodology and applications for managing encryption schemes, and cryptanalysis is the methodology of testing and decrypting these messages.
Cryptographers versed in the latest encryption methods help cybersecurity companies, software developers, and national security agencies secure assets. Cryptanalysts are the individuals and groups responsible for breaking encryption algorithms for good, bad, and ugly reasons.
Penetration testing and red teamers are critical for remaining vigilant in an ever-changing threat environment and catching the vulnerabilities otherwise missed. Alternatively, advanced persistent threats (APT) are always around the corner trying to do the same.
While there are several encryption schemes, they all share the ability to encrypt and decrypt data through a cryptographic key. This unique key is a random string specifically produced to complete the encryption transaction and the more bits in length and complex a process, the better.
Brute force attacks are among the most common cryptanalytic methods, and the time it takes to break an encrypted message is a recognized indicator of the encryption strength.
For users familiar with password management and the value of complex passwords, this makes sense. The longer and more complex the encrypted message is, the longer itll take to decrypt.
Without encryption, data from users and organizations alike would be widely available for all to see on public networks. Individuals and application developers hold responsibility for using and implementing services secured by a good encryption algorithm.
Not every application or network requires military-grade encryption however, enterprise organizations cant go wrong with the services offering the most strength.
A visible example of the role encryption plays with everyday web traffic is the transition from HTTP to HTTPS protocols witnessed in the last decade. Short for the Hypertext Transfer Protocol, HTTP was central to the World Wide Web development in the 1990s and remains a popular application layer protocol connecting users to internet content through a web browser.
In 1994, Secure Sockets Layer (SSL) emerged to give clients an encrypted method to surf the web. By 1999, its successor the Transport Layer Security (TLS) protocol offered a more robust cryptographic protocol across technical components like cipher suites, record protocol, message authentication, and handshake process. HTTP over SSL or HTTP over TLS, dubbed HTTPS, wasnt immediately adopted by the masses.
Thanks to an industry campaign led by the Electronic Frontier Foundation (EFF) for users, website owners, and hosting providers to prioritize secure web traffic, HTTPS has overcome its less secure older sibling. In 2016, only 40% of websites protected their web pages and visiting users with HTTPS. Five years later, that number is more than 90% of websites, protecting users en masse from web attacks.
Before computer science, two individuals could use an identical key to unlock a shared mailbox or gate. Today, symmetric encryption via block ciphers or stream ciphers works much the same way, offering two or more users the ability to encrypt and decrypt messages with a single, shared key between stakeholders.
Users can establish a symmetric key to share private messages through a secure channel like a password manager. Unfortunately, while symmetric encryption is a faster method, it also is less secure.
Symmetric models rely on the integrity of the private key, and sharing it in plaintext over text or email leaves users vulnerable. Phishing and social engineering are common ways threat actors can obtain a symmetric key, but cryptanalysis and brute force attempts can also break symmetric key ciphers.
In the 1970s, the demand for more secure cryptographic systems was met with computer scientists from Stanford and MIT developing the first examples of asymmetric encryption.
Unlike symmetric cryptography, asymmetric encryption is a complex mathematical process in which two users exchange public and private components to create a shared, unique key. Though more complicated and expensive to implement, asymmetric encryption uses thousands of bits and a robust key generation process to ensure secure communications over distributed networks.
Software developers and organizations increasingly use symmetric and asymmetric encryption methods to give users speed and security in communication.
Also known as hybrid encryption, the bundle of the two methods usually starts with a handshake between users through asymmetric cryptography to establish security. Within the asymmetric connection, parties then use symmetric algorithms for the faster processing of messages.
Cryptography challenges have been met by leading computer scientists, universities, and national security and intelligence agencies. The below section looks at the most substantial standards in the evolution of encryption.
The need for a government-wide standard to encrypt sensitive information was evident in 1973, when the U.S. National Bureau of Standards, nowadays the NIST, made a public request for potential ciphers. The algorithm dubbed the Data Encryption Standard (DES) was developed and proposed by IBM and lead cryptographer Horst Feistel.
By the 1990s, DES received wide criticism for its vulnerability to brute force attacks and its short key size. Triple DES, wherein the DES cipher algorithm ran over data blocks three times, proved to be more secure but insufficient for the online ecosystem and universe of data coming.
Shortly after the release of DES, three computer scientists Whitfield Diffie, Martin Hellman, and Ralph Merkle published their research on public-private key cryptography in 1976. As it came to be known, the Diffie-Hellman-Merkle (DHM) key exchange set a precedent for asymmetric encryption before the global networking boom.
Unlike symmetric encryption methods, which previously used few bits, the DHM key exchange provided for encryption supporting key lengths of 2,048 bits to 4,096 bits.
A year after DHMs findings, three cryptographers Ron Rivest, Adi Shamir, and Leonard Adleman developed the RSA public-key cryptosystem.
The three innovators and MIT patented the RSA algorithm, a proprietary system available through RSA Security until its public release in 2000. Standing the test of time, the RSA algorithm remains the most popular public key cryptographic system today and introduced the concept of digital signatures for authentication.
In 1997, the NIST renewed its call to the public cryptography community for the successor to DES. Two Dutch cryptographers Joan Daemen and Vincent Rijmen submitted the eventual pick known as Rijndael. By 2001, the NIST dubbed it the Advanced Encryption Standard (AES) and officially replaced the use of DES.
AES offered larger and different key sizes with a family of ciphers to choose from and remains one of the most popular standards over 20 years later.
While both DES and AES use symmetric block ciphers, AES uses a substitution-permutation network wherein plaintext goes through multiple rounds of substitution (S-box) and permutation (P-box) before finalizing the ciphertext block. Similarly, a client or application can decrypt the AES message by reversing these S-box and P-box transformations.
Professors at the University of Washington and Columbia University independently published research in 1985 on elliptic curve cryptography (ECC), but it didnt come into widespread implementation until the mid-2000s.
Like RSA, ECC is an encryption algorithm for public key cryptography, but instead of prime numbers for generating key pairs, ECC uses elliptic curves. ECC is faster than RSA with a smaller key size while maintaining its security with the mathematics behind elliptic curves over finite fields.
ECC has proven to be a popular choice for web applications, blockchains, and mobile devices as a fast, lightweight yet secure alternative to RSA. ECC isnt immune to compromise, including threats like twist-security and side-channel attacks.
In 1978, Rivest and Adelman published additional research on a cryptographic method dubbed homomorphic encryption. However, it wasnt until 2009 that a graduate student published research on fully homomorphic encryption (FHE) and set off an exploration period.
Unlike conventional cryptography, homomorphic encryption allows for a set of limited operations on ciphertext without decrypting the message. Homomorphic models includes partial homomorphic (PHE) for a single operation, somewhat homomorphic (SHE) for two functions, and FHE for the broadest operational control over encrypted data.
More than a decade later, companies like Google, IBM, and Microsoft continue to explore FHE capabilities where an organization can process specific data within an encrypted message while maintaining the integrity of the data. FHE remains a maturing cryptographic system with little evidence to date of widespread adoption.
Based on quantum mechanics rather than mathematical operations, quantum computers utilizing Shors algorithm for finding prime factors can break asymmetric standards like DHM, RSA, and ECC within moments.
Post-quantum cryptography (PQC) describes the budding market working to address quantum attacks and secure the next generation of IT environments and data. Agencies like the NIST and NSA continue to release security guidelines against quantum threats, but theres still much to learn of quantum information science (QIS) and no official US standard.
Earlier this month, the White House released a national security memo outlining U.S. administrative objectives for adopting quantum-resistant cryptography. While initial standards are expected by 2024, a full mitigation architecture for federal agencies isnt expected until 2035.
The most common applications for cryptographic systems in IT environments include:
Cryptology long predates todays encryption algorithms for data stored in our pockets and moving across the web. From Julius Caesar to the Enigma code, cryptographic methods continue to become more complex to the benefit and detriment of various actors.
As cryptanalysts and threat actors poke holes in the latest implementations, its natural for the industry and users to upgrade to the most robust available algorithms. Outdated and inadequate cryptographic standards leave organizations and users vulnerable, giving those persistent or capable enough the ability to extract, sell, or ransom sensitive data.
The emergence of post-quantum cryptography is a reality stakeholders must grapple with sooner than later.
Read more:
Encryption: How It Works, Types, and the Quantum Future | eSP - eSecurity Planet
- Quantum Technologies Forum navigates present and future of quantum at USC - University of Southern California - November 16th, 2024 [November 16th, 2024]
- New 'gold-plated' superconductor could be the foundation for massively scaled-up quantum computers in the future - Livescience.com - November 16th, 2024 [November 16th, 2024]
- Quantum Technologies Could Have 8 Billion of Impact on UK Transport by 2035 - The Quantum Insider - November 16th, 2024 [November 16th, 2024]
- IBM launches R2 Heron processors that performs 5,000 two-qubit gate operations - Inceptive Mind - November 16th, 2024 [November 16th, 2024]
- Rigetti Computing Reports Third Quarter 2024 Financial Results and Business Updates - GlobeNewswire - November 16th, 2024 [November 16th, 2024]
- Qiskit Fall Fest brings the fun to quantum technology - The Lafayette - November 16th, 2024 [November 16th, 2024]
- Quantum computers touted as AI accelerator at Daesung Haegang Science Forum - The Korea JoongAng Daily - November 16th, 2024 [November 16th, 2024]
- IonQ Strengthens Technical Moat with its Latest Series of Issued Patents - Business Wire - November 16th, 2024 [November 16th, 2024]
- RIKEN, NTT, and Amplify Inc. Introduce General-Purpose Optical Quantum Computer - The Quantum Insider - November 12th, 2024 [November 12th, 2024]
- The Incredible Power of Quantum Memory - WIRED - November 10th, 2024 [November 10th, 2024]
- What Is Quantum AI? Everything to Know About This Far-Out Twist - CNET - November 10th, 2024 [November 10th, 2024]
- IonQ to Increase Performance and Scale of Quantum Computers with Photonic Integrated Circuits in Collaboration with imec - Yahoo Finance - November 10th, 2024 [November 10th, 2024]
- Why IonQ Stock Is Skyrocketing Today - The Motley Fool - November 10th, 2024 [November 10th, 2024]
- Weighty Subject: Is The Universe a Giant Quantum Gravity Computer? - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- Massachusetts is launching a new quantum computing project. An expert explains why that's a big deal not just for the state but the world -... - November 10th, 2024 [November 10th, 2024]
- IonQ Strengthens Quantum Computing Capabilities through Partnerships with imec and NKT Photonics - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- Quantum Computing Inc. 3Q Report: Focus on Loss Reduction While Building Partnerships - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- Chasing Impossible Vortices: Supersolid Discovery and the Future of Quantum Technology - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- IonQ and Ansys Partner to Integrate Quantum Computing for Accelerating CAE Simulations and Also to Use Ansys Tools for Designing Ions Quantum... - November 10th, 2024 [November 10th, 2024]
- IonQ to Increase Performance and Scale of Quantum Computers with Photonic Integrated Circuits in Collaboration with imec - Business Wire - November 10th, 2024 [November 10th, 2024]
- Calling All Gamers: Valens Games Reimagination of Gaming for a World With LLM, AI, and Quantum Computing - HSToday - November 10th, 2024 [November 10th, 2024]
- IBM, Guarding Against Tomorrows Threats Today - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- Yonsei University Establishes South Koreas First 127-Qubit Quantum Computing Center for Industry and Research - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- Building the future of chips in the USA - IBM Research - November 10th, 2024 [November 10th, 2024]
- Chinese superconducting quantum computing power sold to overseas client - Global Times - November 10th, 2024 [November 10th, 2024]
- IonQ's Third-Quarter Results: Revenue Guidance Raised Amid Strategic Acquisitions, Partnerships - The Quantum Insider - November 10th, 2024 [November 10th, 2024]
- ASEAN FinTech funding grew more than 10-fold in past decade, GenAI and Quantum Computing to power new era: FinTech in ASEAN 2024 report - Yahoo... - November 10th, 2024 [November 10th, 2024]
- Ansys and IonQ Are Bringing the Power of Quantum to the $10 Billion Dollar Computer-Aided Engineering Industry - Business Wire - November 8th, 2024 [November 8th, 2024]
- Computer Engineering faculty awarded to advance the compilation process in quantum computing - Rochester Institute of Technology - November 8th, 2024 [November 8th, 2024]
- Ansys and IonQ Are Bringing the Power of Quantum to the $10 Billion Dollar Computer-Aided Engineering Industry - StockTitan - November 8th, 2024 [November 8th, 2024]
- Quantum Machines and Nvidia use machine learning to get closer to an error-corrected quantum computer - TechCrunch - November 4th, 2024 [November 4th, 2024]
- Quantum computers are here but why do we need them and what will they be used for? - Livescience.com - November 2nd, 2024 [November 2nd, 2024]
- Rigetti and Riverlane Achieve Real-Time Quantum Error Correction on 84-Qubit System - The Quantum Insider - November 2nd, 2024 [November 2nd, 2024]
- Quantum Computing Announces Strategic Partnerships and Pre-Orders Ahead of 2025 Foundry Opening - Yahoo Finance - November 2nd, 2024 [November 2nd, 2024]
- Where Will IonQ Be in 3 Years? - The Motley Fool - November 2nd, 2024 [November 2nd, 2024]
- In the Fight Against Noisy Quantum Computing, CVaR Proves a Worthy Opponent - The Quantum Insider - November 2nd, 2024 [November 2nd, 2024]
- Riverlane CEO Asks: What Will We Do With Error-Corrected Quantum Computers? - The Quantum Insider - November 2nd, 2024 [November 2nd, 2024]
- Gulf bets on a quantum computing leap - Arabian Gulf Business Insight - November 2nd, 2024 [November 2nd, 2024]
- Fully Operational Rigetti QPU Included in UKs Recently Opened National Quantum Computer Centre - GlobeNewswire - November 2nd, 2024 [November 2nd, 2024]
- Guest EditorialQuantum Computing: A Beacon of Transformation for the Oil and Gas Industry - Society of Petroleum Engineers (SPE) - November 2nd, 2024 [November 2nd, 2024]
- A Race to The End of Time - Brown Political Review - November 2nd, 2024 [November 2nd, 2024]
- Study observes a phase transition in magic of a quantum system with random circuits - Phys.org - November 2nd, 2024 [November 2nd, 2024]
- Securing tomorrow: What you should know about protecting data in the future - Clemson News - November 2nd, 2024 [November 2nd, 2024]
- Heres the paper no one read before declaring the demise of modern cryptography - Ars Technica - November 2nd, 2024 [November 2nd, 2024]
- Rigetti and Riverlane Progress Towards Fault Tolerant Quantum Computing with Real-Time and Low Latency Error Correction on Rigetti QPU - StockTitan - November 2nd, 2024 [November 2nd, 2024]
- NIST approves 14 new quantum encryption algorithms for standardization - Nextgov/FCW - November 2nd, 2024 [November 2nd, 2024]
- ORCA Computing Unveils The PT-2: Delivering Quantum-Enhanced Generative AI Capabilities - The Quantum Insider - November 2nd, 2024 [November 2nd, 2024]
- UK quantum computer cluster opens on site of Cold War atomic "holy of holies" - The Stack - November 2nd, 2024 [November 2nd, 2024]
- D-Wave Announces Appointment of Two New Board Members - Business Wire - November 2nd, 2024 [November 2nd, 2024]
- IonQs Quantum Surge: Ride the Wave or Cash Out? - MarketBeat - November 2nd, 2024 [November 2nd, 2024]
- D-Wave Deemed Awardable Vendor for US Department of Defense Chief Digital and Artificial Intelligence Offices Tradewinds Solutions Marketplace -... - November 2nd, 2024 [November 2nd, 2024]
- Challenges and opportunities in quantum optimization - Nature.com - November 2nd, 2024 [November 2nd, 2024]
- Quantum Computing, Inc. Announces Strategic Partnerships and Pre-Orders Ahead of 2025 Quantum Photonic Chip Foundry Opening - PR Newswire - November 2nd, 2024 [November 2nd, 2024]
- Bridging Cities with Quantum Links in Pursuit of the Quantum Internet - The Quantum Insider - November 2nd, 2024 [November 2nd, 2024]
- Quantum Computing, Inc. Announces Strategic Partnerships and Pre-Orders Ahead of 2025 Quantum Photonic Chip Foundry Opening - StockTitan - November 2nd, 2024 [November 2nd, 2024]
- UK's Newly Opened National Quantum Computing Centre Designed to Push The Boundaries of What is Possible With Quantum - The Quantum Insider - November 2nd, 2024 [November 2nd, 2024]
- Scientists build the smallest quantum computer in the world it works at room temperature and you can fit it on your desk - Livescience.com - October 24th, 2024 [October 24th, 2024]
- No, China Isnt a Decade Ahead of The U.S. in Quantum Computing (Probably) - The Quantum Insider - October 24th, 2024 [October 24th, 2024]
- Quantum Computing, Inc. to Host Third Quarter 2024 Shareholder Call on Wednesday, November 6, 2024 - StockTitan - October 24th, 2024 [October 24th, 2024]
- Quantum Computing, Inc. to Host Third Quarter 2024 Shareholder Call on Wednesday, November 6, 2024 - Quantisnow - October 24th, 2024 [October 24th, 2024]
- One Skyrmion to Rule Them All: Noise Resilience and Data Storage Solutions for Quantum Computing and Spintronics - The Quantum Insider - October 24th, 2024 [October 24th, 2024]
- Plotting the inevitable rise of quantum computing - Business Weekly - October 24th, 2024 [October 24th, 2024]
- The Netherlands to host an EU quantum computer in Amsterdam - DutchNews.nl - October 24th, 2024 [October 24th, 2024]
- Qubits Manipulated on the Fly - Physics - October 24th, 2024 [October 24th, 2024]
- Quantum Computing, Inc. to Host Third Quarter 2024 Shareholder Call on Wednesday, November 6, 2024 - WV News - October 24th, 2024 [October 24th, 2024]
- Scientists build the smallest quantum computer in the world it works at room temperature and you can fit it on your desk - MSN - October 24th, 2024 [October 24th, 2024]
- Scalable Silicon Spin Qubits Achieve Over 99% Fidelity for Quantum Computing with CMOS Technology - The Quantum Insider - October 24th, 2024 [October 24th, 2024]
- Multiverse Computing Expands to US with New San Francisco Office to Drive Quantum AI Adoption - HPCwire - October 24th, 2024 [October 24th, 2024]
- LUCI in The Surface Codes With Drop Outs: Google Quantum AI Researchers Report Framework Could Help Reduce Errors - The Quantum Insider - October 24th, 2024 [October 24th, 2024]
- Chinese scientists claim they broke RSA encryption with a quantum computer but there's a catch - Livescience.com - October 23rd, 2024 [October 23rd, 2024]
- Riverlanes Quantum Error Correction Report: Defining the Path to Fault-Tolerant Computing and the MegaQuOp Milestone - The Quantum Insider - October 23rd, 2024 [October 23rd, 2024]
- Quantum Computing, Inc. Enters Final Stage of Commissioning Quantum Photonic Chip Foundry in Tempe, Arizona - Yahoo Finance - October 23rd, 2024 [October 23rd, 2024]
- Why experts are warning businesses to prepare for quantum now or face critical cyber risks when it arrives - ITPro - October 23rd, 2024 [October 23rd, 2024]
- Quantum Computers Expected to Be Useful by 2026, Survey - IoT World Today - October 23rd, 2024 [October 23rd, 2024]
- ParTec AG and HZDR to Build AI Supercomputer Supporting Research in AI, Quantum Computing, and HPC - The Quantum Insider - October 23rd, 2024 [October 23rd, 2024]
- Pete Shadbolt on Tackling the Challenges of Quantum Computing & Its Future Impact on Everyday Life - The Quantum Insider - October 23rd, 2024 [October 23rd, 2024]
- How to build a quantum computer that's actually useful - Space Daily - October 23rd, 2024 [October 23rd, 2024]
- Quantum Algorithms for Faster Pattern Matching in Genomics and Text Processing, and Data-Intensive Applications - The Quantum Insider - October 23rd, 2024 [October 23rd, 2024]
- 2025 Tech Trends Report: New Insights on IT Investment in AI, Quantum Computing, and Cybersecurity Published by Info-Tech Research Group - PR Newswire - October 23rd, 2024 [October 23rd, 2024]
- Next Quantum Computer Comes To Netherlands - Mirage News - October 23rd, 2024 [October 23rd, 2024]