Scarinci Hollenbeck, LLC
The Firm
201-896-4100 info@sh-law.comFirm Insights
Author: Scarinci Hollenbeck, LLC
Date: October 9, 2015
The Firm
201-896-4100 info@sh-law.comCryptology provides the means to keep electronic information secure by protecting the electronic system as a whole, and by securing individual pieces of information (“bit”), even if the system itself is compromised. However, the Achilles heel to all data protection methods is that none is mathematically perfect. That is, no protection algorithm, even removing the computer from an Internet connection, guarantees data security.
Encryption is an element of cryptography. Cryptography is the most utilized method of data security and the primary focus of this series. At a basic level, encryption is easy to understand. It is just the process of using a cypher.
For example, if I want to exchange a written note with someone, but I don’t want others to be able to read it, I will use a cypher. Let’s say that I want to send my classmate a message, “This class is boring.” My classmate and I agree on the method that every letter in the message will be moved one letter over in the alphabet and “z” will be “a.” This is called the encryption “key.” So the message would read, “Sijt dmbtt jt cpsjoh.” Because my classmate also knows the key, he can decypher the message, and, no doubt, promptly agree.
This is a “symmetric-key algorithm,” because both my classmate and I must know the same key in order to use the cypher. Computer networks generally find this system completely unfeasible, because one has to manage all of these private keys and remember what key belongs to what message. Moreover, the number of keys grows exponentially with the number of network members. So, only 100 network members requires 10,000 different keys, all of which must be kept secret and correctly assigned.
The “public-key algorithm” solves this problem by giving a user a “public key” and a “private key.” Anyone wishing to send a message would find a readily accessible public key and apply it to the message before sending it to a user. Thus, anyone who wants to send a user an encrypted message can do so. However, to decrypt the message that user needs to use his or her private key.
Beyond the obvious problem of someone stealing the private key in either scenario is the problem that someone can figure it out. If someone looks at the message I sent earlier, “Sijt dmbtt jt cpsjoh,” through a simple process of guess-and-check, one might figure out that all I did was move each letter over one spot in the alphabet. Computers can perform a guess-and-check regime against encryption to “crack” the secret key. Therefore, to make the keys secure, computer encryption relies on “mathematical hardness,” or that the math involved to crack the key is so involved that not even a supercomputer, working at the problem for years, can crack it.
This is the basic idea behind encryption and keeping data secure. However, any method, including those not discussed here, has either mathematical weaknesses or practical weaknesses. In short, no system is truly secure. The consequences can be devastating. However, good practice and knowledge of both lawful protections and lawful remedies can minimize risk and maximize efficiency for operating in an ever-increasing digital world.
Related Article:
Cyber Insecurity: Ashley Madison Encrypted Passwords Cracked.
Survey Reveals Many Business Executives Lack Cybersecurity Confidence
Top Cybersecurity Threats Unveiled by Hackers – Is Anyone Safe?
Additional information and resources:
Cyber Security And Data Protection Group
Intellectual Property And Technology
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Your home is likely your greatest asset, which is why it is so important to adequately protect it. Homeowners insurance protects you from the financial costs of unforeseen losses, such as theft, fire, and natural disasters, by helping you rebuild and replace possessions that were lost While the definition of “adequate” coverage depends upon a […]
Author: Jesse M. Dimitro
Making a non-contingent offer can dramatically increase your chances of securing a real estate transaction, particularly in competitive markets like New York City. However, buyers should understand that waiving contingencies, including those related to financing, or appraisals, also comes with significant risks. Determining your best strategy requires careful analysis of the property, the market, and […]
Author: Jesse M. Dimitro
Business Transactional Attorney Zemel to Spearhead Strategic Initiatives for Continued Growth and Innovation Little Falls, NJ – February 21, 2025 – Scarinci & Hollenbeck, LLC is pleased to announce that Partner Fred D. Zemel has been named Chair of the firm’s Strategic Planning Committee. In this role, Mr. Zemel will lead the committee in identifying, […]
Author: Scarinci Hollenbeck, LLC
Big changes sometimes occur during the life cycle of a contract. Cancelling a contract outright can be bad for your reputation and your bottom line. Businesses need to know how to best address a change in circumstances, while also protecting their legal rights. One option is to transfer the “benefits and the burdens” of a […]
Author: Dan Brecher
What is a trade secret and why you you protect them? Technology has made trade secret theft even easier and more prevalent. In fact, businesses lose billions of dollars every year due to trade secret theft committed by employees, competitors, and even foreign governments. But what is a trade secret? And how do you protect […]
Author: Ronald S. Bienstock
If you are considering the purchase of a property, you may wonder — what is title insurance, do I need it, and why do I need it? Even seasoned property owners may question if the added expense and extra paperwork is really necessary, especially considering that people and entities insured by title insurance make fewer […]
Author: Patrick T. Conlon
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.
Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.
Cryptology provides the means to keep electronic information secure by protecting the electronic system as a whole, and by securing individual pieces of information (“bit”), even if the system itself is compromised. However, the Achilles heel to all data protection methods is that none is mathematically perfect. That is, no protection algorithm, even removing the computer from an Internet connection, guarantees data security.
Encryption is an element of cryptography. Cryptography is the most utilized method of data security and the primary focus of this series. At a basic level, encryption is easy to understand. It is just the process of using a cypher.
For example, if I want to exchange a written note with someone, but I don’t want others to be able to read it, I will use a cypher. Let’s say that I want to send my classmate a message, “This class is boring.” My classmate and I agree on the method that every letter in the message will be moved one letter over in the alphabet and “z” will be “a.” This is called the encryption “key.” So the message would read, “Sijt dmbtt jt cpsjoh.” Because my classmate also knows the key, he can decypher the message, and, no doubt, promptly agree.
This is a “symmetric-key algorithm,” because both my classmate and I must know the same key in order to use the cypher. Computer networks generally find this system completely unfeasible, because one has to manage all of these private keys and remember what key belongs to what message. Moreover, the number of keys grows exponentially with the number of network members. So, only 100 network members requires 10,000 different keys, all of which must be kept secret and correctly assigned.
The “public-key algorithm” solves this problem by giving a user a “public key” and a “private key.” Anyone wishing to send a message would find a readily accessible public key and apply it to the message before sending it to a user. Thus, anyone who wants to send a user an encrypted message can do so. However, to decrypt the message that user needs to use his or her private key.
Beyond the obvious problem of someone stealing the private key in either scenario is the problem that someone can figure it out. If someone looks at the message I sent earlier, “Sijt dmbtt jt cpsjoh,” through a simple process of guess-and-check, one might figure out that all I did was move each letter over one spot in the alphabet. Computers can perform a guess-and-check regime against encryption to “crack” the secret key. Therefore, to make the keys secure, computer encryption relies on “mathematical hardness,” or that the math involved to crack the key is so involved that not even a supercomputer, working at the problem for years, can crack it.
This is the basic idea behind encryption and keeping data secure. However, any method, including those not discussed here, has either mathematical weaknesses or practical weaknesses. In short, no system is truly secure. The consequences can be devastating. However, good practice and knowledge of both lawful protections and lawful remedies can minimize risk and maximize efficiency for operating in an ever-increasing digital world.
Related Article:
Cyber Insecurity: Ashley Madison Encrypted Passwords Cracked.
Survey Reveals Many Business Executives Lack Cybersecurity Confidence
Top Cybersecurity Threats Unveiled by Hackers – Is Anyone Safe?
Additional information and resources:
Cyber Security And Data Protection Group
Intellectual Property And Technology
Let`s get in touch!
Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!