END-TO-END
ENCRYPTION – SCI & TECH
News:
End-to-end encryption:
What it is, how it works, and why you need it
What's
in the news?
●
End-to-end encryption, a powerful
technology that scrambles your data so that only you and your intended
recipient can read it.
End-to-end
encryption (E2EE):
●
Encryption is a way of protecting data from unauthorised access or
tampering.
●
It works by transforming the data into a secret code that only the intended
recipient can decipher.
●
It is useful for various cases, such as
securing online communications, storing sensitive information, and verifying
digital identities.
Types
of Encryption:
There are two main types
of encryption:
1.
Symmetric:
●
It uses the same key to encrypt and decrypt the data.
●
In symmetric encryption, the key used to
encrypt some information is also the key required to decrypt it.
2.
Asymmetric:
●
It uses a pair of keys - one public and one private.
●
The public key can be shared with anyone,
but the private key must be kept secret.
Encryption
and End-to-end Encryption:
●
The term encryption is generally used when
referring to the privacy of stored data, while end-to-end encryption protects
data as it’s transferred between a location – which is crucial wherever there’s
a rapid exchange of information.
●
In an E2EE-enabled app, only the person on
each end – the sender and receiver – can read any exchanged messages.
○
This is because messages get encrypted on
your device before being sent and only are decrypted when they reach your
intended recipient.
Applications
of End-to-end Encryption:
●
End-to-end encryption is used to secure communications. Some of the popular
instant-messaging apps that use it are Signal, WhatsApp, iMessage, and Google
messages.
●
It is also used to secure passwords, protect stored data and safeguard data on cloud
storage.
●
It is often used to help companies comply
with data privacy and security regulations and laws. For example, an electronic
point-of-sale (POS) system provider would include E2EE in its offering to
protect sensitive information, such as customer credit card data.
●
End-to-end encryption has long been used
when transferring business documents, financial details, legal proceedings, and
personal conversations.
●
It can also be used to control users’ authorisation when
accessing stored data.
Concerns
with End-to-end Encryption:
●
Metadata
●
Compromised endpoints
●
Complexity in defining the endpoints
●
Too much privacy