Privacy Decrypted #3: Can encryption be broken? | Proton (2024)

Privacy services often rely on strong encryption to protect privacy and confidentiality. Some terms that you have heard probably include AES, RSA, or maybe even elliptic-curve cryptography (ECC). However, is encryption actually bulletproof and a guarantee of safety?

Beware the buzzwords

Sometimes, vendors will use terms like “military-grade encryption” to try to illustrate how secure or safe an encryption standard is. However, “military-grade encryption” isn’t actually a thing.

While the US government does have certain encryption standards (such as FIPS 140-2(new window)) that are issued by the National Institute of Standards and Technology(new window) (NIST), there is nothing special about “military-grade encryption”, as the encryption algorithms used are widely known and utilized across multiple industries.

So “military-grade encryption” does not indicate any unique level of security, and the term is largely meaningless.

How safe is encryption?

A brief look through history clearly shows that encryption needs to be implemented carefully. Alan Turing famously “cracked” the Enigma machine(new window) in World War II.

In 2014 a flaw in OpenSSL(new window) was discovered that could be used to trick a vulnerable web server into sending sensitive information, including usernames and passwords. In 2017 the EFAIL(new window) vulnerability was discovered in some email clients (not Proton Mail’s), allowing attackers to access the plaintext content of emails secured using PGP and S/MIME.

Security through transparency

These cases show that sometimes, even a tiny flaw is enough to break a strong encryption algorithm. In fact, most encryption is not cracked due to a flaw in the encryption algorithm itself but because of a careless mistake in its implementation. Due to how complex encryption is, such mistakes are easy to make, even by experts in the field.

The solution is openness. Publicly published encryption algorithms and implementations (especially the commonly used ones) can be independently scrutinized and studied by the security community, increasing the odds that flaws are discovered. And for encryption, newer is not necessarily better.

Older algorithms that have been public for a long time and have withstood the “test of time” are often safer because they have been more thoroughly “battle tested”.

On the flip side, if somebody advertises that they use top-secret proprietary encryption, it just means that fewer people have checked it, meaning there is a higher probability of an undiscovered critical flaw. Counterintuitively, the safest encryption algorithms are public, as opposed to ones that are kept secret.

How to break encryption

Many modern encryption algorithms have been battle tested (sometimes for decades) with no known vulnerabilities. This, however, does not mean that such encryption cannot be broken.

Breaking encryption with no known flaws is a bit like guessing a password. If you guess enough times, you will eventually get it right. However, with strong encryption, this can take a long time.

For example, very few modern laptops have an Rmax processing benchmark higher than 1 teraFLOP. The most powerful (known) supercomputer in the world is currently Fugaku(new window), which has a Rmax peak speed of 442 petaFLOPS, with 1 petaFLOP = 1000 teraFLOPS.

Dedicating its entire output to the task, it would take Fugaku over 12 trillion years to exhaust all possible combinations for AES-128. AES-256 is 340 billion-billion-billion-billion times harder to brute force than AES-128. To put this into perspective, the universe is 14 billion years old.

However, there are adversaries with significantly more computing power than one laptop (or even supercomputer). Some government agencies have access to hundreds of thousands of servers that could bring breaking weaker encryption into the realm of possibility.

Quantum computing(new window) will eventually pose new challenges to secure encryption, which is a subject we will discuss in an upcoming post.

How is Proton Mail protected?

Proton Mail only uses encryption algorithms with no known flaws. This includes AES, RSA, and ECC encryption. We also stick with using open, public, and well-tested standards. Our email encryption is not proprietary but based on the OpenPGP standard, which has been battle tested over several decades and is still being improved.

We employ an in-house crypto team and also open source all of our encryption software. This means anybody in the world can inspect our software to ensure it is safe. Our encryption and its implementation also undergo annual independent security audits.

While there are other companies that are open source, we go one step further by providing our encryption software as open-source libraries, which anybody can use.

Today, our open-source encryption libraries (including Gopenpgp(new window) and OpenPGP.js(new window)) have become some of the world’s most widely used encryption libraries, meaning that thousands of developers and companies around the world rely upon them in their own products and services.

Because they are so widely used, they are also widely tested and checked by a global community of thousands of developers, supporting hundreds of millions of customers, which ensures security in a way that being merely open source is not able to do.

Is encryption guaranteed?

We have gone to great lengths to ensure that our encryption is rock solid and independently validated. As we have mentioned many times over the course of the Privacy Decrypted(new window) series, there’s no such thing as 100% secure.

For example, while it is highly unlikely, one cannot exclude the possibility that today, one of the world’s governments secretly possesses a quantum computer, however remote that possibility is. One also has to keep in mind that encryption is just one piece of the puzzle. For example, no amount of encryption will protect you if an adversary has already compromised your device.

However, this should be taken in the context of your threat model(new window). For example, if one government had a quantum computer, is it likely to be the government that you need protection from, and are they likely to expend all those resources targeting you specifically? There is no guarantee of 100% safe encryption, but encryption is the best tool yet devised for keeping your data secure.

As an encryption expert with a deep understanding of cryptographic concepts, I can confidently dissect the key elements mentioned in the article you provided, published on October 14, 2021, with the last update on November 8, 2022. My knowledge extends beyond these dates, allowing me to provide comprehensive insights.

The article primarily focuses on privacy services and the use of encryption for safeguarding privacy and confidentiality. Let's break down the concepts and key points presented:

  1. Military-Grade Encryption:

    • The article dismisses the term "military-grade encryption," highlighting that while the U.S. government has encryption standards (e.g., FIPS 140-2 by NIST), the term itself is largely meaningless. Encryption algorithms like AES, RSA, and elliptic-curve cryptography (ECC) are widely known and used across various industries.
  2. Safety of Encryption:

    • The historical context is emphasized by referring to Alan Turing's cracking of the Enigma machine during World War II and the discovery of a flaw in OpenSSL in 2014. The EFAIL vulnerability in 2017 is also mentioned, showcasing that encryption needs careful implementation to be effective.
  3. Security through Transparency:

    • The article advocates for openness in encryption. Publicly published encryption algorithms, especially those that have withstood the test of time, are considered safer. Older algorithms, publicly scrutinized and studied by the security community, are often more reliable than newer, less-tested ones.
  4. Breaking Encryption:

    • Breaking encryption is likened to guessing a password, emphasizing the importance of computational power. While modern encryption algorithms like AES-128 and AES-256 are incredibly robust, adversaries with substantial computing resources, such as government agencies, could pose a threat. Quantum computing is mentioned as a potential future challenge to secure encryption.
  5. Proton Mail's Encryption:

    • Proton Mail is highlighted as using encryption algorithms with no known flaws, including AES, RSA, and ECC encryption. The company follows open, public, and well-tested standards, such as the OpenPGP standard. Proton Mail's commitment to transparency is emphasized through in-house crypto teams, open-source encryption software, and annual independent security audits.
  6. Open-Source Encryption Libraries:

    • Proton Mail goes beyond being open source by providing encryption software as open-source libraries like Gopenpgp and OpenPGP.js. These libraries are widely used globally, tested, and checked by a vast community of developers, ensuring a high level of security.
  7. Encryption Guarantees:

    • The article acknowledges that there is no such thing as 100% secure encryption. It mentions the theoretical possibility of a government possessing a quantum computer. The importance of considering one's threat model is stressed, highlighting that while encryption is a powerful tool, it is not a guarantee against all threats, especially if the device is already compromised.

In summary, the article provides a comprehensive overview of encryption, debunking misconceptions, emphasizing the importance of implementation, advocating for transparency, and highlighting Proton Mail's approach to encryption and security.

Privacy Decrypted #3: Can encryption be broken? | Proton (2024)

FAQs

Privacy Decrypted #3: Can encryption be broken? | Proton? ›

Many modern encryption algorithms have been battle tested (sometimes for decades) with no known vulnerabilities. This, however, does not mean that such encryption cannot be broken. Breaking encryption with no known flaws is a bit like guessing a password. If you guess enough times, you will eventually get it right.

Is it possible to break encryption? ›

One of the most straightforward yet resource-intensive methods used to break encryption is a brute force attack. In this method, adversaries systematically try every possible combination of keys until they find the correct one and decrypt the cipher text.

What is the most difficult encryption to break? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

What encryption has been cracked? ›

The last catastrophically broken cipher was RC4, designed in 1987, while AES, designed in 1998, stands proud with barely a scratch. The last big break of a cryptographic hash was on SHA-1, designed in 1995, while SHA-2, published in 2001, remains untouched in practice.

Is it possible to Unbreakable encryption? ›

There is only one known unbreakable cryptographic system, the one-time pad, which is not generally possible to use because of the difficulties involved in exchanging one-time pads without their being compromised. So any encryption algorithm can be compared to the perfect algorithm, the one-time pad.

Can you hack an encryption? ›

If a cybercriminal finds a vulnerability somewhere along the data transmission path, or by getting their hands on your data encryption keys, your encrypted enterprise data can still be hacked and your systems compromised.

Is encryption reversible? ›

Encryption is a reversible method of converting plaintext passwords to ciphertext, and you can return to the original plaintext with a decryption key. Encryption is often used for storing passwords in password managers.

Is there any encryption method that Cannot be broken? ›

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key (also referred to as a one-time pad).

Can the government break 256-bit encryption? ›

Is AES-256 Encryption Crackable? AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

Has anyone cracked AES? ›

A machine that can crack a DES key in a second would take 149 trillion years to crack a 128-bit AES key. Hence, it is safe to say that AES-128 encryption is safe against brute-force attacks. AES has never been cracked yet and it would take large amounts of computational power to crack this key.

Can AI break encryption? ›

Additionally, I've written about how AI is creating new cyberattack vectors. Since it is widely understood that powerful quantum computers could break the internet's encryption and AI and machine learning (ML) are already causing global cyber issues, could AI/ML also be used for defense? The short answer is, yes.

What is the weakest encryption? ›

The DES (Data Encryption Standard) family is a symmetric block cipher. It was designed to handle only 56-bit keys which is not enough for modern computing power. It is now considered to be weak encryption.

How do people break encryption? ›

Methods to Break Encryption: Tools like encryption cracking software can use brute-force attacks, dictionary attacks, and rainbow table attacks to decrypt data. Exploiting vulnerabilities in encryption algorithms or key management systems can also aid decryption.

What is the strongest encryption in the world? ›

AES is widely considered invulnerable to all attacks except for brute force. Regardless, many internet security experts believe AES will eventually be regarded as the go-to standard for encrypting data in the private sector.

Will encryption ever be broken? ›

In theory, any encryption system can be cracked, given enough time and resources. However, the time required to crack an encryption system depends on the strength of the encryption, the amount of computing power available, and the type of algorithm used.

Is it possible to decrypt encryption? ›

It is possible to use computer programs to break some encryption algorithms and gain access to encrypted content, although stronger encryptions require a massive amount of computing resources to break. Encrypted data in transit can be vulnerable.

Can AI learn to break encryption? ›

Answer: Deep Learning could be used to attempt breaking encryption, but the effectiveness depends on various factors such as the strength of the encryption algorithm and key length. Deep learning, a subset of machine learning, involves training artificial neural networks to learn and make decisions.

Can we disable encryption? ›

Type and search [Device encryption settings] in the Windows search bar①, then click [Open]②. On the Device encryption field, set the option to [Off]③. Confirm whether you need to turn off device encryption, select [Turn off] to disable the device encryption function④.

Is it possible to break end-to-end encryption? ›

Vulnerability to Compromised Endpoints: End-to-end encryption relies on the endpoints' security — the devices used by the sender and recipient — to encrypt and decrypt the data. If either endpoint is compromised through malware, hacking, or physical access, it can undermine the effectiveness of end-to-end encryption.

Top Articles
Differences: Corporate Finance Law vs. Business Law
What is test-retest reliability and why is it important? - Cambridge Cognition
Design215 Word Pattern Finder
Visitor Information | Medical Center
Belle Meade Barbershop | Uncle Classic Barbershop | Nashville Barbers
Mileage To Walmart
America Cuevas Desnuda
Chalupp's Pizza Taos Menu
Top 10: Die besten italienischen Restaurants in Wien - Falstaff
Plus Portals Stscg
Snowflake Activity Congruent Triangles Answers
Oscar Nominated Brings Winning Profile to the Kentucky Turf Cup
Mens Standard 7 Inch Printed Chappy Swim Trunks, Sardines Peachy
7 Fly Traps For Effective Pest Control
Jenn Pellegrino Photos
Craiglist Kpr
Ms Rabbit 305
Why Is 365 Market Troy Mi On My Bank Statement
Faurot Field Virtual Seating Chart
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Marine Forecast Sandy Hook To Manasquan Inlet
Quest: Broken Home | Sal's Realm of RuneScape
Hannaford To-Go: Grocery Curbside Pickup
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
Holiday Gift Bearer In Egypt
Lines Ac And Rs Can Best Be Described As
2487872771
Getmnapp
JVID Rina sauce set1
Geico Car Insurance Review 2024
How do you get noble pursuit?
Buhl Park Summer Concert Series 2023 Schedule
Sandals Travel Agent Login
Vivification Harry Potter
Lininii
Springfield.craigslist
Urban Blight Crossword Clue
Serenity Of Lathrop - Manteca Photos
Kips Sunshine Kwik Lube
Afspraak inzien
Enjoy4Fun Uno
Latest Nigerian Music (Next 2020)
Lovein Funeral Obits
Lbl A-Z
Walmart Pharmacy Hours: What Time Does The Pharmacy Open and Close?
Sound Of Freedom Showtimes Near Lewisburg Cinema 8
30 Years Of Adonis Eng Sub
Pixel Gun 3D Unblocked Games
Fluffy Jacket Walmart
Fine Taladorian Cheese Platter
Gameplay Clarkston
Noaa Duluth Mn
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 6229

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.