Background

Wikipedia defines Encryption as follows


In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor


 

So how does this occur?

In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.[2] Public-key encryption was first described in a secret document in 1973;[3] before then all encryption schemes were symmetric-key (also called private-key).

The Public Key is not something that necessarily needs to be safeguarded, and in fact, it usually isn’t. When people or organizations (like news agencies) want to receive sensitive encrypted data, they will send their public key out to people, who can use it to encrypt the data and send it to the holder of the private key.

Once the Private Key holder has the encrypted data (again, encrypted with the public key), then that person (and only that person) can decrypt the message.

Public Keys can be published to key servers for sharing with others, allowing them to send you encrypted messages or files. 

Some Key servers are listed below: 

hkps://hkps.pool.sks-keyservers.net

hkps://pgp.mit.edu

hkp://pool.sks-keyservers.net

hkp://keys.gnupg.net.

hkp://pgp.uni-mainz.de

A list of servers including those that should be avoided or that have been withdrawn can be found <HERE>

The ControlYourComms.com Public Keys for our various departments can be found <HERE>

Video

  • How encryption works and how it can be bypassed (WSJ) - https://youtu.be/TImdsUglGv4
  • Encryption Part 1 (Shane Killen) - https://youtu.be/vCDe14NxSY0
  • Encryption Part 2 (Shane Killen) - https://youtu.be/KEWGoXE6zMo
  • Encryption Part 3 (Shane Killen) - https://youtu.be/wZ9SnV6ySeM

Research Links and More Reading

  • How does encryption work and is it really safe - https://www.makeuseof.com/tag/encryption-care/
  • How does encryption work - https://thycotic.com/company/blog/2017/06/12/how-does-encryption-work/