In order to fulfill the basic functions of our service, the user hereby agrees to allow Xiaomi to collect, process and use personal information which shall include but not be limited to written threads, pictures, comments, replies in the Mi Community, and relevant data types listed in Xiaomi's Private Policy. By selecting "Agree", you agree to Xiaomi's Private Policy and Content Policy .
Agree

Redmi Note 9/S/Pro

[Discussion] [Device Tech Bytes #36] All About Encryption

2021-03-02 15:09:14
4472 76
Hey Mi Fans,
Wassup,
Hope everone is happy and chill..!

In the last week we've learnt about the "All About Network Bands" by @cherri . So, This week we're back again with an interesting topic i.e
"All About Encryption" ...! Before we can describe anything about the kinds of encryption, we have to know what encryption is in layman’s terms.

Encryption: According to Wikipedia, Encryption is simply the process of encoding data. That’s true, but does it end there? If you say “yes”, then you are wrong. But, I don’t think anybody said “yes”. So, there is a lot more to encryption- How is the information encrypted? Is the encryption based on mathematical equations or the complex theories of physics?
You probably are wondering: What? Physics in encryption? Yes, precisely speaking Quantum Mechanics. I will tell you about that.
Talking about the kinds of Encryption:

Broadly, Encryption is divided into 2 parts(You won’t find this on the internet):
1. Classical Encryption
2. Quantum Encryption

Quantum Encryption is an individual kind of encryption, but Classical Encryption is further classified into 2 types:
1. Asymmetric (Public-Private Key Encryption)
2. Symmetric

Let’s see them in a little detail(not more than little, because it is well described in the classical internet we use, yes correct, there is something called the Quantum Internet as well).

Asymmetric Classical Encryption:

Let us understand this with an example. Suppose, you are the Head of the Data Science team of a reputed organization and you have Data Scientists working under you on different kinds of industrial data. You wish to get that data from all of them without technical leakage. You provide Public Keys to all the Data Scientists, using which they would encrypt their information and data and send it to you, where you would be using a Private Key(only known to you) to decrypt the data sent over to you. In this manner, we are therefore using 2 keys- Public and Private to encrypt and decrypt the message respectively, without any technical leakage(unless it’s hacked). So it is very secure. But, there is a pitfall to it- The Computational Time of validation of the keys between the public and the private counterparts is pretty high and thus, time-consuming.
For this, comes another kind of Encryption(Less safe, but faster):

Symmetric Classical Encryption:
This Encryption uses just one key for both Encryption and Decryption. So, it is fast and used for Bulk Data Transfers. But don’t you think it’s less secure, because if we can crack the key we will get access to both the encrypted and decrypted data, and hackers are sitting to do this only. Yes, precisely it’s much less secure.

What is the solution then..?
          We use something called the “SSL/TSL Handshake”. What's that? Ohh, you don’t need to overthink this. This is not something very complex. It is just the term used in every Digital Certificate for using both Symmetric and Asymmetric Encryption. What? Both? Yes, both. But how? Let’s keep it brief in this article. When we are first logging into a website, we use Asymmetric Encryption to secure the establishment of a connection between the client(user) and the source website. Once the connection is set up, the bulk information is exchanged using Symmetric Encryption as the user becomes a known client to the website and the connection has already been secured at first using Asymmetric Encryption.

          Okay, enough small talks on Classical Encryption, which uses mathematical algorithms to encrypt and decrypt messages. Now, let us expand our knowledge horizon to something beyond this, something the world has never seen before but will be seeing in the next decade probably- Quantum Cryptography. Since I am trying to explain this thing to all my audience, I will keep this thing limited to the theory and the basic idea of what Quantum Cryptography is and the difference between Quantum Encryption and Classical Encryption.

Quantum Encryption:
          Quantum Encryption replaces all practical mathematical encryption algorithms with a theoretical concept and practical(but, based on hundreds of assumptions)- Quantum Mechanics. What we would do is Entangle Photons(Basic particle of light) between the source and the receiver. If you don’t know about Entanglement or Superposition.The photons should be in a Superposition state of 0 and 1. Achieving this is pretty easy, polarizing the photons. But, the major challenge here lies in the fact that keeping the Entanglement intact for long-distance communication is tough. The Entanglement seems to get disrupted at a very short distance making long-distance communication almost impossible.
Do you want to know the most interesting part of Quantum Encryption? If it is Yes, continue reading.

          Quantum Encryption is Unhackable. What? You probably are wondering if that's not true. But, it is true. Information is sent using Entangled Polarized Photons. If anybody from outside tries to break into the encrypted photons, it changes the state of polarization of the photon instantly and the message is lost.

So, it is very secure, isn’t it? Yes, it is, but again a pitfall, and this time a very dangerous one. If Quantum Encryption at full phase is put to use before changing all the standard encryptions, the doom on the planet will be just achieved in a matter of hours. Quantum Computing has the power to break into Classical Encryption within hours, even Nuclear Bombs. With this, I conclude a very brief introduction to Quantum Cryptography. Questions are probably there: How can we transfer the photons? Can we use satellites to send Quantum Information? How can the Entanglement be achieved practically? My next thread will be on that: Quantum Networks and Quantum Internet.

If you find this thread interesting, do like and comment and please follow me.
If anybody is interested to learn more about Quantum Cryptography, do write it down in the comments below.


Previous Tech Byte Series:


Rate

Number of participants 4 Experience +46 Pack Reason

View Rating Log

2021-03-02 15:09:14
Favorites61 RateRate

Wizard Bunny

1860bodo | from Mi 9T Pro

#1

thanks for sharing
2021-03-02 19:11:52

Grand Master Bunny

RichG | from MI 8

#2

Thank you for sharing.
2021-03-02 20:25:39

Grand Master Bunny

Suter | from app

#3

Thanks for the interesting article
2021-03-03 04:27:09

Device Team

Arun Abhimanyu Author | from Redmi Note 7 Pro

#4

1860bodo
thanks for sharing

you're welcome
2021-03-03 10:33:28

Device Team

Arun Abhimanyu Author | from Redmi Note 7 Pro

#5

RichG

Thank you for sharing.

welcome Brother
2021-03-03 10:33:54

Device Team

Arun Abhimanyu Author | from Redmi Note 7 Pro

#6

Suter
Thanks for the interesting article

you're welcome..!
2021-03-03 10:34:33

Master Bunny

Aavs | from app

#7

Very interesting. Thanks for sharing.
2021-03-05 12:11:59
Aavs replied at 2021-03-05 09:41:59
Very interesting. Thanks for sharing.

That means a lot thanks..!
2021-03-05 13:01:16

Master Bunny

Jet Zhan | from Mi MIX 2S

#9

Thanks for sharing.
2021-03-05 13:16:00

Semi Pro Bunny

Ak 8152 | from app

#10

thank you for sharing, it's interesting
2021-03-05 14:46:26
please sign in to reply.
Sign In Sign Up

Arun Abhimanyu

Device Team

  • Followers

    341

  • Threads

    55

  • Replies

    2057

  • Points

    25541

3 Days Check-In
7 Days Check-In
21 Days Check-In
40 Days Check-In
70 Days Check-In
100 Days Check-In
Nov-100 replies in a month
Dec-100 replies in a month
100 ответов в декабре
Newbie Member
Mi Apps
Christmas 2017
2018 New Year Medal
ThrowBackWithMiCommunity
MIUI Instagram
2017 Xiaomi Annual Bill
Mi Community Updater
Color Your Planet
Color Our Planet Game
The Motivator
MIUI 10
MIUI 8th Anniversary
Dirgahayu ke-73 Indonesia
New Home
10k Mi Fans
Redmi Note 7
Cast Away
20K Mi Fans
Mi Love U & I
Bunny Winner
Best Mi
Happy Mother's Day
Android Q
50K Mi Fans
Mobile Photography Lover
70K Mi Fans
Challenger
Eid ul-Fitr Mubarak
15K UK
100K Mi Fans
Selfie Day
Happy July
Mi 9T
Global Fans
My Country My Pride
Like
Check in
Reply
Favorites
Post
MIUI 9th Birthday
Global Community
Mi A3
better together slogan
Global Community
better together with friends
Super Saturday
Puzzle Master
Mid-Autumn Festival
30K UK
200K Mi Fans
400K Mi Fans
300K Mi Fans
2020
500K Mi Fans
MIUI 11
step up
close up
Halloween
Best Photo
110million
Redmi Note 8 Series
MIUI12
Art Challenge
Father's Day
Design Together
Mother's Day
ContributeTogether
10 years
K2K #3
Emoji Day
design wallpaper
First Anniversary
10th mi fan stories
K2K #4
10 years
Mitu Shares Vol.1
Ringtone Medal
Music Medal
MiWatch
2021's Wish Medal
namedesign medal
Valentine's Day Medal
CDcover
comments

Read moreGet new

Mi Comm APP

Stay updated on Mi Products and MIUI

Copyright©2010-2021 Xiaomi.com, All Rights Reserved
Quick Reply To Top Return to the list