Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

What is Cyber Security? It Starts With Cryptology

Author: Scarinci Hollenbeck, LLC

Date: October 9, 2015

Key Contacts

Back

The mathematical basis for all cyber security is cryptology, the study of the hidden.

Cryptology provides the means to keep electronic information secure by protecting the electronic system as a whole, and by securing individual pieces of information (“bit”), even if the system itself is compromised. However, the Achilles heel to all data protection methods is that none is mathematically perfect. That is, no protection algorithm, even removing the computer from an Internet connection, guarantees data security.

The mathematical basis for all cyber security is cryptology, the study of the hidden.

Encryption is an element of cryptography. Cryptography is the most utilized method of data security and the primary focus of this series. At a basic level, encryption is easy to understand. It is just the process of using a cypher.

For example, if I want to exchange a written note with someone, but I don’t want others to be able to read it, I will use a cypher. Let’s say that I want to send my classmate a message, “This class is boring.” My classmate and I agree on the method that every letter in the message will be moved one letter over in the alphabet and “z” will be “a.” This is called the encryption “key.” So the message would read, “Sijt dmbtt jt cpsjoh.” Because my classmate also knows the key, he can decypher the message, and, no doubt, promptly agree.

This is a “symmetric-key algorithm,” because both my classmate and I must know the same key in order to use the cypher. Computer networks generally find this system completely unfeasible, because one has to manage all of these private keys and remember what key belongs to what message. Moreover, the number of keys grows exponentially with the number of network members. So, only 100 network members requires 10,000 different keys, all of which must be kept secret and correctly assigned.

The “public-key algorithm” solves this problem by giving a user a “public key” and a “private key.” Anyone wishing to send a message would find a readily accessible public key and apply it to the message before sending it to a user. Thus, anyone who wants to send a user an encrypted message can do so. However, to decrypt the message that user needs to use his or her private key.

Beyond the obvious problem of someone stealing the private key in either scenario is the problem that someone can figure it out. If someone looks at the message I sent earlier, “Sijt dmbtt jt cpsjoh,” through a simple process of guess-and-check, one might figure out that all I did was move each letter over one spot in the alphabet. Computers can perform a guess-and-check regime against encryption to “crack” the secret key. Therefore, to make the keys secure, computer encryption relies on “mathematical hardness,” or that the math involved to crack the key is so involved that not even a supercomputer, working at the problem for years, can crack it.

This is the basic idea behind encryption and keeping data secure. However, any method, including those not discussed here, has either mathematical weaknesses or practical weaknesses. In short, no system is truly secure. The consequences can be devastating. However, good practice and knowledge of both lawful protections and lawful remedies can minimize risk and maximize efficiency for operating in an ever-increasing digital world.

Related Article:
Cyber Insecurity: Ashley Madison Encrypted Passwords Cracked.

Survey Reveals Many Business Executives Lack Cybersecurity Confidence

Top Cybersecurity Threats Unveiled by Hackers – Is Anyone Safe?

Additional information and resources:
Cyber Security And Data Protection Group

Intellectual Property And Technology

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
Genesis Mission: How the U.S. Government’s New AI Platform Will Reshape Corporate Innovation, Risk, and Competition post image

Genesis Mission: How the U.S. Government’s New AI Platform Will Reshape Corporate Innovation, Risk, and Competition

The federal government has launched one of the most ambitious scientific initiatives in decades, and it will redefine how companies develop technology, manage risk, and compete. The Genesis Mission, created by Executive Order and driven by the Department of Energy (“DOE”), is intended to accelerate scientific discovery through a national AI platform that links supercomputers, […]

Author: Michael J. Sheppeard

Link to post with title - "Genesis Mission: How the U.S. Government’s New AI Platform Will Reshape Corporate Innovation, Risk, and Competition"
Stablecoins and the GENIUS Act: How New Global Rules Are Reshaping Compliance post image

Stablecoins and the GENIUS Act: How New Global Rules Are Reshaping Compliance

Stablecoins Leave the Grey Zone Stablecoins were supposed to be the “boring” part of crypto: digital dollars that just work. Yet for years they have lived in a regulatory no-man’s-land, classified one day as securities, the next as commodities, and sometimes as something regulators had not even named yet. That uncertainty is finally starting to […]

Author: Bryce S. Robins

Link to post with title - "Stablecoins and the GENIUS Act: How New Global Rules Are Reshaping Compliance"
Don’t Overlook the Importance of Business License Management post image

Don’t Overlook the Importance of Business License Management

If you operate a business without the proper license, you risk fines, insurance issues, reputational harm, and even business closure. Even innocent mistakes, like forgetting to renew a license, can have significant consequences, such as losing your lawsuit for payment of services that are unlicensed, which makes it imperative to have business license management procedures […]

Author: Dan Brecher

Link to post with title - "Don’t Overlook the Importance of Business License Management"
Failing to Comply With NJ Rent Control Exemption May Prove Costly post image

Failing to Comply With NJ Rent Control Exemption May Prove Costly

What Developers Need to Know About New Jersey’s Rent Control Exemption Law to Ensure Entitlement to Exemption for Newly Constructed Multi-family Housing.  A property owner in Jersey City is facing a $400 million federal class action lawsuit alleging that the landlord did not follow the procedural steps required to be eligible for exemption from local […]

Author: Patrick T. Conlon

Link to post with title - "Failing to Comply With NJ Rent Control Exemption May Prove Costly"
Crypto Securities Law: When Tokens Become Investment Contracts post image

Crypto Securities Law: When Tokens Become Investment Contracts

The application of traditional federal securities laws to crypto assets continues to evolve. In some cases, the Securities and Exchange Commission (SEC) considers tokens and other digital assets to be securities. This makes them subject to federal securities law, including the Securities Act of 1933 and the Securities Exchange Act of 1934. This classification has […]

Author: Bryce S. Robins

Link to post with title - "Crypto Securities Law: When Tokens Become Investment Contracts"
The Due Diligence Process for NY Condominiums and Cooperatives post image

The Due Diligence Process for NY Condominiums and Cooperatives

While the New York City real estate market can be extremely competitive, moving too quickly often backfires. Before purchasing a condominium or cooperative in New York City, it is important to do you homework. Purchasing property in NYC can involve a dizzying number of legal issues. These include condo and co-op rules, rent restrictions, and […]

Author: Jesse M. Dimitro

Link to post with title - "The Due Diligence Process for NY Condominiums and Cooperatives"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!