Skip to main content

Even the FBI can’t defeat good encryption – here’s why it works

encryption bill underway protects your most private data
Image used with permission by copyright holder
Digital data is difficult to secure by nature. Once a person has access to a file, it’s trivial to move, copy or delete. A single breach can spread a file to literally millions of people across the globe, something that would never be possible with a document that only exists as a physical copy.

That will never change. The ease of accessing, moving, copying, altering, and deleting data is a key trait of all modern computers. Instead, digital data security focuses on creating barriers between the data and those seeking access, so a file never leaves its owner’s control.

Barriers like encryption. If you use the Internet, own a smartphone, or have a PC, then your data is at some point protected by encryption, though you may not know it. That’s why the FBI is having such a tough time getting into the phone of a mass shooter, and Apple is so reluctant to help. Defeating its own encryption for one iPhone could potentially defeat it for all iPhones, in the wrong hands.

It’s a complicated problem, but one that’s easier to understand if you know the basics of encryption. What is encryption, and how does it work? Hold on to your butts, because it’s time for some maths.

Child’s play

When I was a kid, I came up with a secret code that I thought was very clever. I’d write a message by substituting every letter with one six steps higher in the alphabet. So an A became G, and so on.

Silly as it may seem, this is a basic form of encryption. First, imagine each letter as a number. A corresponds to one, Z corresponds to 26, and so on. The cipher for my childhood code, mathematically speaking, became (x)+6, where (x) is the number corresponding to the letter I meant to communicate. Of course, the math loops above 26, since there’s only 26 letters in the alphabet. Thus, a Z became an F.

qwerty-card-password-protection-encryption
Image used with permission by copyright holder

So, to reiterate, my cipher turned an A to a G because that was the result of one (the number corresponding to A) plus six.

This is a very basic form of encryption. A set of data, in this case the letters of the alphabet, has a mathematical algorithm applied to it. It’s terrible encryption, since it wouldn’t take much effort to identify patterns in my garbled words, and then work out the code. Still, the example covers the basics.

Diving into the deep end

The code I came up is a bit like a code used in the Roman Empire called Ceaser’s Cipher. Modern encryption is a lot more complex. A number of techniques have been invented to further garble the data. That includes the literal key to modern encryption techniques – the encryption key. I’ll explain, using the popular AES standard as a basis.

No modern computer can break 256-bit AES, even if it’d started working on the problem at the beginning of the universe.

Understanding the encryption key in detail requires mathematical knowledge that most people simply don’t have, so I’m not going to try and cover every step. To put it as simply as possible, the original data goes through an “exclusive or” function alongside the value of the key. The function registers false if the inputs are the same, and true if they are not. If you’re familiar with computers, you’ll immediately recognize this false/true function is binary, and so it generates a new set of binary data from the input of the original data and the key.

Then, to make it even harder to crack, AES uses a number of additional steps such as confusion, the technique I used to make my childhood cipher. After those several additional steps, the encryption is complete. Decryption reverses the steps to find the original message, but only if the key is known, since it was used to complete the encryption functions.

You’ve probably at some point heard that encryption keys come in different types, like 64-bit, 128-bit, and 256-bit. The more bits in the key, the harder it becomes to decrypt, because the original data is more thoroughly muddled through the “exclusive or” and successive steps.

And when I say difficult, I mean difficult. You’ve likely heard that the FBI wants Apple to help it bypass the security of an iPhone used by a suspect in the San Bernardino terrorist attack. That phone is protected by 256-bit AES encryption. No computer currently in existence can break 256-bit AES through brute-force even if it’d started working on the problem at the beginning of the universe. In fact, it would take hundreds of billions of years for a modern supercomputer to crack 256-bit AES just by guessing.

Getting around the impossible

While impossible is a strong word, it’s applicable to current technology, and current forms of encryption. A brute force attack against today’s best algorithms isn’t feasible.

Yet you’ve probably heard, time and time again, of attackers taking down encryption. How can that be? Sometimes this occurs because of the use of an old encryption method that’s been cracked. In other cases, it’s due not to a weakness of the algorithm used, but instead a problem with how it was implemented.

The iPhone that the FBI can’t crack is an example of well implemented encryption. A PIN is used to secure the phone, but it rejects unsuccessful attempts with a lockout time that becomes longer and longer after the fourth try. After ten unsuccessful attempts the phone wipes itself clean. It’s not possible to get around the PIN by loading new software, because firmware can only be loaded onto an iPhone if it’s signed with a specific code only Apple knows. And encryption is applied by a chip that’s between the phone’s flash storage and the main system memory, so it’s not possible to physically hijack the data.

apple-iphone-6s_7855-1500x1000-720x720
Image used with permission by copyright holder

That’s a lot of security, and each barrier represents a potential hole. It’d be possible to simply re-try the PIN until the correct one was found if the iPhone did not reject successive attempts. The phone’s memory might be transplanted to a different device if it wasn’t encrypted by a chip within the phone. Firmware that’s not properly secured would let a hacker load their own custom firmware to disable the phone’s security features. And so on.

Encryption is effective, but sensitive. If the key used to execute it can be discovered, or the software and hardware used to conduct the encryption can be fooled, it’s easily defeated. Key-logging software is a good example. It can “defeat” even the toughest encryption by logging the user’s password. Once that’s compromised, an attacker doesn’t need the slightest technical skill to proceed.

Conclusion

The iPhone is also a great example of encryption because most people don’t realize it’s encrypted while using it. This is true of its implementation more often than not. HTTPS uses encryption to send data securely over the Web. All the major cloud storage providers use encryption to protect data. Even your cell phone’s data voice and data connections are encrypted.

Opaque operation is ideal. Encryption shouldn’t be obvious – at least not when applied to everyday consumer devices. If it were, it might become annoying, and users would seek ways to circumvent it. You’ll find it’s rare that you must do anything to enable encryption.

But it’s still important to know what it is, and how it works, so you can judge the devices you use and be careful about how you use them. User error causes encryption failure far more often than an actual breach of an algorithm. Knowledge can help you shore up the weak spot – you.

Editors' Recommendations

Matthew S. Smith
Matthew S. Smith is the former Lead Editor, Reviews at Digital Trends. He previously guided the Products Team, which dives…
Weekend deal: Save $350 on this Alienware gaming PC with RTX 4070
Alienware Aurora R16 sitting on a desk.

The Alienware brand is Dell’s dive into the gaming world, and Dell is coming up big today when it comes to gaming PC deals. The super popular Alienware Aurora R16 gaming desktop with some serious specs is currently discounted at Dell. It’s marked down from $2,050 to $1,700 and amounts to $350 in savings. This is one of the better Alienware deals you’ll find today and we don’t know how long it will last, so click over to Dell to claim the savings while yo can.

Why you should buy the Alienware Aurora R16 gaming desktop
There are a lot of great options when trying to ensure you’re getting one of the best gaming PCs, and with Alienware you know you’ll be getting something you can take seriously. The Alienware Aurora R16 is a gaming desktop that offers ultimate expansion and customization options, and it’s where a lot of gamers turn when they’re looking to take on the best PC games. As built for this deal the Aurora R16 has 32GB of RAM and an Intel i9 processor with 24 cores. This is a lot of power even by gaming standards, and the powerful NVIDIA GeForce RTX 4070 graphics card with 12GB of its own RAM is part of the package as well.

Read more
One of HP’s best 2-in-1 laptops just had its price slashed to $460
HP Pavilion x360 laptop in laptop mode.

Shopping the best 2-in-1 laptops is the right way to go about adding some versatility to your digital world, but if you’re looking for some savings as well we’d like to turn your attention toward HP. One of today’s best HP laptop deals is on the Pavilion x360 2-in-1 laptop. It’s marked down to just $460 from its regular price $800. This makes for $340 in savings and the build has some pretty good specs. Free shipping is also included with a purchase.

Why you should buy the HP Pavilion x360
Among the best laptop brands you’ll often find HP. It has several laptop lineups to suit different computing needs, and with the Pavilion x360 2-in-1 laptop you’ll be getting a great balance of flexibility and capability. This is a great option for nearly anyone who has their eye set on a 2-in-1 laptop. As spec’d for this deal the Pavilion x360 has a 10-core Intel i5 processor, 8GB of RAM, and a 256GB solid state drive. All of this is plenty for everyday laptop users, as the RAM and processor will provide a snappy experience and the 256GB solid state drive should cover anyone who’s not hoping to house massive media libraries on the laptop.

Read more
How to type an em dash on a Mac
Apple MacBook Pro 14 top down view showing keyboard and touchpad.

The em dash (—) punctuation is a useful stylization in writing and editing that can replace a comma, colon, or parenthesis. Accessing this symbol on a computer can be challenging, depending on the operating system.

The Windows operating system has several built-in and program-associated methods for typing or pulling up the em dash into a word processor or text box. However, macOS is well known for having a system integrated methods of accessing the em dash -- some you may know and some that might not be as obvious.
Keyboard
Apple has made inserting an em dash into your text very simple with a keyboard shortcut. Press the Shift (⇧) + Option (⌥) + Minus (-) keys on your keyboard, and the em dash will appear in your word processor or text box automatically.

Read more