Technology Networking & Internet

Encryption Method for Secure Email & Voice

    How Encryption Works

    • Internet communications has a security issue stemming from the methods used to move data. On your local network, some router communications may allow the data you send and receive to be picked up by other computers on the same network; this is especially true of wireless communications and public access points. Encrypting your data ensures that your information cannot be read even if it is intercepted.

      Encryption works with the use of mathematical algorithms based on "public and private keys." A private key is a string of mathematical bits that are stored only on your computer; no one else has access to it. The public key is mathematically derived from this and can be freely disseminated. The private key is then used to encrypt your data into apparent gibberish; only the people who are given access to your public key will be able to convert it back into the original data. A similar set of public and private keys on the receiving end is used to authenticate that the person you are communicating with actually is the person you intend to speak to.

      Encryption is a complex topic, but well-designed software can make it transparent to the end user. This is exemplified with the common use of the "https" standard on the Web, which is used to encrypt communications with banks and online vendors. Whenever the lock icon appears in your browser, your communications have been encrypted, and the browser is handling all of the complexity for you.

    Encryption for Email

    • Most email applications do not have embedded encryption similar to what is standard in web browsers. Some corporate email servers advertise local network encryption between the server and the desktop mail client, but this does not mean that the email will be encrypted once it leaves the server and is sent to the recipient across the Internet. To encrypt your email, you and your recipients must agree on the same standard for encryption and install software plug-ins that allow your email to be encrypted. Try PGP Desktop Email if your applications are compatible, as this uses a common standard that will be broadly understood by many others.

    Encryption for Internet Voice

    • There are many competing applications for Voice over Internet Protocol (VOIP), but many use the same standards and should be interoperable. Consult the documentation for your VOIP software to see if your software supports encryption; alternately, use the Skype network and software, which automatically encrypts all voice, video and instant message communications.

Leave a reply