logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
20th April 2018 by CyberVision 0 Comments 1099 Views
20th April 2018 by CyberVision in Business Security

Encryption backdoors and how they affect you

Encryption is the process of encoding and decoding messages so that only authorised people can view the contents of the message. Computers today have allowed the use of much more complex encryption systems because we can rely on the technology to do the extremely tough number-crunching required to decode encrypted messages.

 

A ‘backdoor’ in computing is a way of bypassing the normal method of authentication. Backdoors are often hidden in part of the design of the program or algorithm. A backdoor would allow an intruder to access the encrypted information without having the correct credentials. It would either allow the intruder to guess the access key based on the context of the message or allow the intruder to present a skeleton key that will always grant him access.

Encryption backdoors were initially developed to assist law officials on a daily basis with catching criminals. However, they just make illegal tasks easier for malicious attackers to execute. There are some reasonable compromises that can keep all our data safe and still help catch the bad guys. A backdoor for the good guys, however, is inevitably a potential backdoor for the bad guys too.

 

Internet of Things (IOT) devices are everywhere now and the general public uses them for numerous tasks in homes and at work and they are creating a new level of paranoia. One needs to remember that any device with a connection to the internet could have a backdoor. If someone gets the keys or figures out how the garage door works, they could get inside your door locks, baby monitors, surveillance cameras and more.

The solution to the problem at hand is to make any encryption without a backdoor against the law. However, encryption is generally just multiplying two prime numbers. It would be hard to make mathematics against the law.

 

Ultimately, your online activity is based on your own choices. Criminals can choose not to use services with backdoors. There are more solutions tech companies could come up with to assist law enforcement. The main concern should be to limit ways for criminals to do malicious attacks, rather than limiting the activity of the everyday online user.

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cyber-security
  • encryption backdoors
  • f-secure cyber security
  • risks
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo