APP Users: If unable to download, please re-install our APP.
Only logged in User can create notes
Only logged in User can create notes

General Studies 3 >> Science & Technology

audio may take few seconds to load

END-TO-END ENCRYPTION

END-TO-END ENCRYPTION

 
 
 
 
1. Context 
 
 
Securing information is paramount, and a crucial method for safeguarding it is encryption. End-to-end (E2E) encryption, in particular, revolutionizes the approach of human rights organizations, law enforcement agencies, and technology companies towards accessing individual information. This transformation is significant in their efforts to protect, prosecute, or derive profit from engagements, depending on the context.
 

2. About Encryption
  • At its core, encryption involves the transformation of readable information into an unreadable format based on specific rules.
  • These rules vary, and one example is the Data Encryption Standard (DES), which, with certain configurations, converts the phrase "ice cream" into AdNgzrrtxcpeUzzAdN7dwA== using the key "kite."
  • Altering the key, for instance, to "motorcycle," changes the encrypted text to 8nR+8aZxL89fAwru/+VyXw==.
  • The key serves as data that allows a computer to 'unlock' (decrypt) previously 'locked' (encrypted) text, utilizing the designated set of rules.
  • To illustrate, imagine writing down AdNgzrrtxcpeUzzAdN7dwA== on one piece of paper and "kite" on another, crumpling both, and tossing them across the room to a friend.
  • Suddenly, an unnoticed person in the room swiftly grabs the piece of paper with AdNgzrrtxcpeUzzAdN7dwA== and makes off with it.
  • However, since this individual lacks knowledge of the key ("kite"), the content of the piece of paper remains unknown to them.
  • In the digital realm, this is how encryption serves as a protective measure for securing digital information.

3. What is E2E encryption?

  • E2E encryption, short for End-to-End encryption, pertains to specific points in the journey of information transmission.
  • For instance, consider a chat conversation on a messaging app. When you send a message, it initially travels to a server maintained by the app's company. Following the app's instructions, the server directs the message to your friend. Within this framework, two critical encryption forms come into play: encryption-in-transit and E2E encryption.
  • Encryption-in-transit ensures that before a message is forwarded from the server to you (or vice versa), it undergoes encryption. This method is employed to thwart any attempt by an unauthorized entity to read the message's contents by intercepting the relay.
  • On the other hand, E2E encryption goes a step further. It encrypts the message both during transit (from your phone to the server or vice versa) and when it resides within the server. Decryption only occurs when your friend receives the message.

4. Methods of Information Encryption

Protecting information involves employing various encryption methods, selected based on the desired level of secrecy and security duration. One key distinction lies between symmetric and asymmetric encryption.

Symmetric Encryption

  • In symmetric encryption, the key used for encryption is identical to the one needed for decryption. Notable examples include the Data Encryption Standard (DES) and Triple DES.
  • Triple DES involves splitting the user-provided key into three parts, sequentially encrypting and decrypting the message with each part. This method is suitable when the sender and recipient are the same, as in encrypting a computer's hard drive. The Advanced Encryption Standard (AES) is another symmetric encryption algorithm widely used.

Asymmetric Encryption

  • Asymmetric encryption involves distinct keys for encryption and decryption. If a message is encrypted with one key, it can only be decrypted using a corresponding key in a predetermined manner.
  • Public and private key pairs are utilized. The public key is shared openly, while the private key remains confidential. This method is effective when the sender and recipient are different, ensuring privacy.
  • The effectiveness of asymmetric encryption relies on keeping the private key secret. Advanced implementations involve mathematical problems for key storage, making it computationally challenging to breach. Longer keys enhance security.

Curve25519 Algorithm and Elliptic-Curve Cryptography (ECC):

  • Messaging apps like WhatsApp employ the Curve25519 algorithm to generate public keys for messages. Curve25519 utilizes principles from elliptic-curve cryptography (ECC), grounded in algebraic geometry.
  • ECC offers equivalent security to asymmetric encryption but with shorter key lengths, making it computationally efficient.
 
5. Vulnerabilities in E2E Encryption

While End-to-End (E2E) encryption offers robust privacy assurances, certain vulnerabilities may expose user data or compromise the security of encrypted messages.

Man-in-the-Middle (MITM) Attacks

  • E2E encryption is susceptible to MITM attacks, where an unauthorized party intercepts the communication. Attackers may obtain encryption keys by hacking devices, compromising the correspondence between encryption and decryption keys, or other means.
  • Prevention involves using and comparing fingerprints—unique identifiers for keys. Users can verify key authenticity by comparing fingerprints through a separate channel, minimizing the risk of interception and message tampering.

 Device Hacking and Malware

  • E2E encryption does not safeguard against attacks on individual devices. If an attacker gains access to a sender's or recipient's device, they may exploit vulnerabilities to obtain unencrypted data.
  • Malware can infiltrate devices through various means, including SMS, providing unauthorized access to messages before encryption occurs.

Company-Installed Backdoors

  • Companies implementing E2E encryption may, under legal or other pressures, install backdoors or exceptions to access encrypted messages. This could be mandated by law enforcement or for purposes of data retention and legal compliance.
  • Instances like the Edward Snowden revelation exposed companies, such as Skype, installing backdoors for government agencies to access E2E-encrypted messages.

Complacency and Metadata Surveillance

  • Users may become complacent with E2E encryption, assuming absolute security. However, certain vulnerabilities, such as storing images on devices, can be exploited by attackers who compromise the device.
  • Metadata, information about messages (timing, frequency, recipients, locations, etc.), may still be accessible. While not revealing message content, metadata surveillance can provide insights into user behaviour.
6. The Way Forward
 
E2E encryption is a valuable tool for secure communication, but it's not foolproof. Understanding its strengths, limitations, and potential vulnerabilities empowers you to use it effectively and protect your privacy in the digital world.
 
 
For Prelims: End-to-End Encryption, elliptic-curve cryptography,  Curve25519 algorithm, Advanced Encryption Standard,  Data Encryption Standard
For Mains: 
1. Discuss the ethical and legal implications of using End-to-End Encryption (E2E) in the context of national security and individual privacy. What measures can be taken to balance these competing interests? (250 Words)
2. Imagine you are a policymaker responsible for developing a national framework for E2E encryption. What key factors would you consider, and what principles would guide your approach to ensure a balance between security, privacy, and economic interests? (250 Words)
 
Previous Year Questions
 
1. What is the key size of Data Encryption Standard algorithm in cryptography ? (UPSC ESE 2021)
A. 56 bit       B. 62 bit        C. 168 bit          D. 128 bit
 
2. The Data Encryption Standard (DES) has a function consists of four steps. Which of the following is correct order of these four steps? (UGC NET 2019)
A. an expansion permutation, S-boxes, an XOR operation, a straight permutation
B. an expansion permutation, an XOR operation. S-boxes, a straight permutation
C. a straight permutation, S-boxes, an XOR operation, an expansion permutation
D. a straight permutation, an XOR operation. S-boxes, an expansion permutation
 
Answers: 1-A, 2-B
 
Source: The Hindu
 

Share to Social