## HP TECH TAKES /...

# Protecting Your Data and How Different Types of Encryption Are Used

## What is encryption?

*Want to get ice cream after school?*- and pass it down the row of desks.

*Xbou up hfu jdf dsfbn bgufs tdippm?*The class clown wouldn’t be able to make sense of that and would pass the note along. Once your crush receives it, you’d send a second note to your crush that reveals the cipher:

*shift by one letter*.

## Why is encryption important?

__your laptop__gets stolen, the thief will find it difficult, if not impossible, to open files that you’ve encrypted.

## Types of encryption

*shift by one*. Let’s discuss how exactly digital encryption works.

### 1. Symmetric encryption

*shift by one*note.

- You encrypt the document
- Your encryption key is
*shift by one* - Your friend receives the document
- Your friend receives the key
- Your friend uses the key to decrypt the document

**Symmetric algorithms**

*shift by one*. The original symmetric algorithm, known as the Data Encryption Standard (DES), uses a 56-bit key. A computer bit has a value of either 0 or 1. A 56-bit key means that there are 56 total digits and each digit is either 0 or 1. So, a 56-bit key has over 70,000,000,000,000,000 (70 quadrillion) possible key combinations [1].

*shift by one*, right? But, believe it or not, modern computers can decipher that key with relative ease. Hackers locate encrypted files that are passing through the internet and launch “

__brute force attacks__” against them. In a brute force attack, a hacker will launch a program that will attempt to decrypt the file using every possible key combination. Computers operate at lightning speeds, and it doesn’t take long for an advanced program to cycle through 70 quadrillion combinations.

**The problem with symmetric encryption**

### 2. Public key encryption (asymmetric encryption)

**Prime numbers**

- 2: 1 x 2 = 2 (Prime Number)
- 4: 1 x 4 = 4
**or**2 x 2 = 4 (Not a Prime Number) - 41: 1 x 41 = 41 (Prime Number)
- 76: 1 x 76 = 76
**or**2 x 38 = 76 (Not a Prime Number)

*that*difficult to find the prime factors of 221; that was just an example. But what if you factored two prime numbers that were absolutely massive: 9,990,454,951 and 9,990,454,949? The product would be 9.80919 x e19.

**How public key encryption works**

- Private key: composed of two extremely large prime numbers
- Public key: made from the product of those prime numbers

- Your friend emails you his or her public key
- You encrypt the document using your friend’s public key
- You email the encrypted document to your friend
- Your friend decrypts the document with his or her private key

## Encryption algorithms

### 3DES encryption (Triple DES)

### RSA encryption

## Encryption protocols

### 1. Transport Layer Security (TLS)

- Web browsing
- Instant messaging

### 2. VPN protocols

__how virtual private networks work__.

### 3. Pretty Good Privacy (PGP)

__commercial version__, or you can browse the many

__OpenPGP applications__available online. PGP programs can encrypt data for you.

### 4. Encrypt data on Windows 10

__HP business laptops__are equipped with Windows 10 Pro.

- Right click on a file and folder you want to encrypt
- Click the “Properties” button
- Click the “Advanced” button
- Check the encryption box

## The future of encryption

__cybersecurity__experts (both professionals and amateurs) frequently test encryption protocols for weaknesses. There’s a collective effort by the cybersecurity community to develop faster and stronger encryption methods.

__How Encryption Works__

__The History of Encryption__

__How Encryption and Digital Signatures Work__

__Types of Encryption__

__3DES__

__What is SSL, TLS and HTTPS?__

__How to use EFS encryption to encrypt individual files and folders on Windows 10__