Think Learn & Perform (TLP)

The Only Dedicated Platform for UPSC Mains Answer Writing

Day 54 – Q 4.What is ‘end to end encryption’? How does it protect data? Explain with the help of suitable examples.

4. What is ‘end to end encryption’? How does it protect data? Explain with the help of suitable examples. 

‘एंड टू एंड एन्क्रिप्शन’ क्या है? यह डेटा की रक्षा कैसे करता है? उपयुक्त उदाहरणों की मदद से समझाओ।

Approach:

  • Introduction- Brief explanation of ‘end to end’ encryption
  • How does it protect data?
  • Advantages
  • Conclusion

Introduction:

End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages.
In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation. End-to-end encryption is intended to prevent data being read or secretly modified, other than by the true sender and recipient(s).
The messages are encrypted by the sender but the third party does not have a means to decrypt them, and stores them encrypted. The recipient retrieves the encrypted data and decrypts it themselves.

How it works?

Below is a flow chart depicting encryption in WhatsApp.

Pros of end-to-end encryption:

  • Secures privacy
  • It keeps your data safe from hacks. E2EE means fewer parties have access to your unencrypted data. Even if hackers compromise the servers where data is stored (e.g. Yahoo mail hack), they cannot decrypt data because the does not possess the decryption keys.
  • No government spies: There have been many cases when suspects were dragged into controversies that did not had anything to do with the original case.
  • Connecting people better : People talk more freely with others when they are sure that their conversation will remain to themselves while if you are aware that some random person could be eavesdropping on your conversation, it will most likely be a little fabricated, making it less real.
  • Shared network : With more and more people resorting to save money by sharing data over a single hotspot, end-to-end encryption prevents shared content from falling into wrong hands.

Cons of end-to-end encryption:

  • Misuse of technology: Freedom beyond the limits of laws are going to be a problem if no one is on the other end to keep a track on illegal activities that could be advertised or propagated through internet.
  • Law and order overlooked : When government would not be able to access information that is suspected or needs to be dug out there will be questions of law and order being overlooked at the face of confidentiality of users.
  • Terrorists, people with sick mind games etc will take advantage of the technology without fearing law.

Conclusion:

End-to-end encryption is in line with the right to free speech and the right to life (Article 19 and 21). It provides much need privacy. Thus, it is necessary to ensure that there is no backdoor where the data can be decrypted by other parties.

Best answer: Aishwarya Singh

https://uploads.disquscdn.com/images/0db2dcc554620339574adabb7eb79cd87e966cab3b665d98885725591357f7f8.jpg

https://uploads.disquscdn.com/images/be4fbaf720c85637e774e320deda4741b7f1580c1445ff5d475e2bea92e68bd1.jpg

Print Friendly, PDF & Email