News

The future of encryption

Encryption is an essential component of top-notch computer security, and the technology continues to evolve. Companies that don't use encryption and SSL certificates are gambling with their data, and risk losing business as potential consumers become increasingly sensitive to cyberthreats. Effective encryption systems are multifaceted operations, reported FedTech, and a firm's best strategy depends on its unique IT environment.

Public-key cryptography is one of the foundational encryption applications. It is usually used for signing messages, as an authentication device, and for encrypting short strings of data. The Rivest-Shamir-Adleman algorithm is the most widely used public-key cryptographic theorem, and improvements in its capabilities have necessitated updates in standards over the years. It relies on a key, the size of which depends on the amount of information that must be encrypted, reported FedTech. Currently, the U.S. National Institute of Standards and Technology recommends using at least a 128-bit symmetric encryption key, with anything lower likely to pose a security risk. Longer keys offer better protection.

One of the challenges data security professionals face is cloud computing. Encryption can reduce concerns about cloud security, and FedTech stated that all cloud platforms should use encryption and authentication for all communication. 

"Cloud applications have two significant risks that encryption can help mitigate," reported FedTech. "One risk is familiar: An application could have holes or bugs that let an unauthorized party view sensitive data. The other risk, more specific to cloud service providers, is that the infrastructure might not be secure."

Using encryption to stop hackers from trying
Encryption is not only a way to actually stop hackers from accessing data, but acts as a deterrent to attempts, reported Wired contributor Dr. Glen Newton. To a potential hacker, an encrypted system may not be worth the effort and risk to breach. Greeted with a encryption, the data thief, wrote Newton, will make judgments about the potential value of the data and the robustness of encryption. Encryption can be an effective asset to stopping such brute force attacks.

"What typically happens is that criminals who discover that your data is encrypted will decide that decrypting it without the keys is too much work for the potential gain, and they'll go on to an easier target," wrote Newton.

Part of the evolution of encryption is a strengthening of cryptographic practices, and those processes must continue to get stronger. Web server certificates can help safeguard the whole system.

Protect your in transit data with an SSL certificate today.

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!