Have you ever wondered how our emails, texts, photos, videos are sent over the Internet?, or what the notice end to end encryption on your whatsapp or telegram calls means?.
Whenever you send anything over the Internet, it passes through a lot of servers, routers, and other devices where anyone can easily intercept it and get access to your private information without you ever getting to know about it or the owners of the service reading your private messages.
What is Encryption?
in simple term, encryption is a technique of putting ciphertexts from plaintexts, this means Plaintexts are the texts that can be read and understood by the third parties, on the other hand ciphertexts are scrambled texts that cannot be understood by the third parties if they somehow managed to get their hands on this piece of information.
In encryption, the sent data is modified into such a form that it is impossible to read in between the users. Encryption is basically the modification of data into some unreadable form. When the data reaches the receiver, the data is again modified to its original form.
What is end to end encryption ( E2EE )?
This is a method of secure communication that prevents third parties from accessing data while it is transformed from one end (sender to receiver) or device to another. In that way, end to end encryption ( E2EE ) can help mitigate risk and protect sensitive information by blocking third parties from accessing user data when data is transferred from one source to another. ( E2EE ) allows one to communicate privately online by encrypting both messages at the end of a conversation thus preventing anyone in the middle from reading private communication.
Before I go into detail to explain how end to end encryption – E2EE works,
Here are some benefits of end to end encryption;
- End to end encryption keeps your data private. If you use Gmail, Google can know every intimate detail you put in your emails and it can save your emails even if you delete them. E2EE gives you control over who reads your messages.
- Keeps your data safe from hacks. It means fewer parties have access to your unencrypted data even if hackers compromise the servers where your data is stored for example Yahoo mail hack, they can’t decrypt your data as they don’t have the decryption keys.
- It is good for democracy. Everyone has a right to privacy, E2EE protects free speech and shields persecuted activists, dissidents, and journalists from intimidation.
How end to end encryption (E2EE) works?
When you use end to end encryption to send an email or a message to someone, no one monitoring the network can see the content of your message- not hackers, not the government and not even the company that facilitates your communication. In E2EE, the data is encrypted on the sender’s system or device and only the recipient is able to decrypt it. For example, messages on WhatsApp are end to end encrypted meaning they are scrambled when they leave the senders device.
Technically, end to end encryption is a type of asymmetric encryption. In this type of encryption, both parties have two keys, public and private. The public key is available to each party and to anyone sitting on the server. The private key is known only to the owner and no one else, not even to the party on the opposite end. Both public and private keys are required to decrypt the scrambled data.
I will explain this in the terms that I understood. I will be using the names Lynna(sender) and Lindsey(receiver).
Lynna sends a message to Lindsey via WhatsApp or twitter and in between their communication, there is a server that protects their private conversation from being tapped by hackers. When the message leaves Lynna’s phone it leaves in a scrambled sway (in a way no one can understand what it is) but when it gets to Lindsey’s phone its in an understandable manner. Hopefully, I am making sense now.
Cipher: The term cipher refers to the algorithm that is specifically used for the encryption purposes. A cipher consists of a set of successive steps at the end of which the encrypted
Algorithm: Algorithms are the procedures that are followed by the encryption processes. There are numerous types of algorithms that are specifically used to decipher encrypted files and information: blowfish, triple DES and RSA are some of these types.
Asymmetric encryption: In this kind of encryption, two different keys are used. One is for the encryption purposes and the other is for decryption purposes. One of these keys are shared publicly while the other one is kept private. That is why asymmetrical encryption is also known as the public key encryption. This specific kind of encryption is also of pivotal importance for SSL (TLS).