Amirhossein Saberi
November 17, 2021
•
6
min read
Have you been wondering what is encryption? To start with, let’s look at the bigger picture of communication data. Every day we are communicating with people or computers (such as Siri and Alexa), and a lot of that communication is also picked up by others – think of eavesdroppers, people nearby, or apps and IoT (Internet of Things) systems that just happen to be eavesdropping too.
If you’re at a dinner party and want to say something private to your friend, then you’d leave the dinner table and take her somewhere the other guests can’t hear what you talk about. When it comes to the IoT era however, that becomes a little more difficult!
Let’s face it, there’s always someone interested in intercepting our voice, text messages, emails, and phone calls. Whether it’s for ominous purposes, big data for marketing, or just a snoop – we need to be proactive to protect our communication data, and “leave the dinner table” in a digital way.
Different countries have long-since implemented different laws to prevent the interception of public communication channels, such as voice calls (PSTN), or Post, but when it comes to digital channels; there’s so many different ways to communicate that legislation takes a while to catch up.
The best way to ensure security of your communication data online? Encryption.
The first use of encryption for military purposes came when the Romans ruled the earth over two thousand years ago. Caesar needed a way to send communication documents to his troops in the field and thus developed a substitution cipher method. With this method, they simply shifted the letters in the alphabet by three. A straightforward method in today’s times, but very effective in its day. In modern times, decoding such straight-forward codes with a computer is super easy.
Symmetric Encryption
The first modern encryption standards were achieved by using algorithms that have a key to encrypt and decrypt information (Symmetric). In 1975, the first Data Encryption Standard (DES) was proposed in the U.S. Federal Register. In 2001, the more secure Advanced Encryption Standard (AES), which we use today, replaced DES following decades of advancements and innovations in CPU power.
Asymmetric Encryption
With asymmetric encryption there are two types of keys: one for encryption (public key), and one for decryption (private key).
Transport Layer Security (TLS), known as SSL, is a cryptographic security protocol which is using symmetric and asymmetric encryptions to secure your communication. The TLS protocol aims primarily to provide privacy and data integrity. This protocol supports different type of methods for encrypting the data and authenticate for message integrity. We in CINNOX use the best methods approved by NIST to comply with compliances.
The CINNOX platform offers multiple ways for companies to communicate, both between their staff, and between staff with their customers. Our engineers and developers have had to look at all the different telecom and digital channels on offer in order to ensure communication across each of them is safe and protected:
Browser Safety
Try not to use unsecured and public WiFi
When making a secure call, make sure the browser is using a Secure WebSocket
Always check permissions of applications and websites on your Microphone and Webcam
References
If you've read this far, you're probably already working hard to make your customers happy! When you pair your efforts with a total experience platform like CINNOX together with the tips we shared above, they should help you onboard new customers, retain existing customers, and keep everyone coming back for more.