RSA and AES-256 Keys explained | Boxcryptor Encryption

preview_player
ะŸะพะบะฐะทะฐั‚ัŒ ะพะฟะธัะฐะฝะธะต
๐—ง๐—ต๐—ถ๐˜€ ๐—ถ๐˜€ ๐—›๐—ผ๐˜„ ๐—˜๐—ป๐—ฐ๐—ฟ๐˜†๐—ฝ๐˜๐—ถ๐—ผ๐—ป ๐˜„๐—ถ๐˜๐—ต ๐—•๐—ผ๐˜…๐—ฐ๐—ฟ๐˜†๐—ฝ๐˜๐—ผ๐—ฟ ๐—ช๐—ผ๐—ฟ๐—ธ๐˜€
We encrypt files and thus provide increased protection against espionage and data theft. For #encryption, we use a combination of #AES-256 encryption and #RSA encryption. Here we explain the two algorithms.

๐—”๐—˜๐—ฆ-๐Ÿฎ๐Ÿฑ๐Ÿฒ ๐—˜๐—ป๐—ฐ๐—ฟ๐˜†๐—ฝ๐˜๐—ถ๐—ผ๐—ป
Advanced Encryption Standard (AES) is one of the most frequently used and most secure encryption algorithms available today. It is publicly accessible, and it is the cipher which the NSA uses for securing documents with the classification โ€œtop secretโ€. Based on the block structure of AES, the change of a single bit, either in the key, or in the plaintext block, results in a completely different ciphertext block โ€“ a clear advantage over traditional stream ciphers. The difference between AES-128, AES-192 and AES-256 finally is the length of the key: 128, 192 or 256 bit โ€“ all drastic improvements compared to the 56 bit key of DES. By way of illustration: Cracking a 128-bit AES key with a state-of-the-art supercomputer would take longer than the presumed age of the universe. And Boxcryptor even uses 256-bit keys. As of today, no practicable attack against AES exists. Therefore, AES remains the preferred encryption standard for governments, banks, and high security systems around the world.

๐—ฅ๐—ฆ๐—” ๐—˜๐—ป๐—ฐ๐—ฟ๐˜†๐—ฝ๐˜๐—ถ๐—ผ๐—ป
RSA is one of the most successful, asymmetric encryption systems today.
As opposed to traditional, symmetric encryption systems, RSA works with two different keys: A public and a private one. Both work complementary to each other, which means that a message encrypted with one of them can only be decrypted by its counterpart. Since the private key cannot be calculated from the public key, the latter is generally available to the public.

Boxcryptor implements a combined encryption process based on asymmetric RSA and symmetric AES encryption. Every file has its own unique random file key, which is generated when the file is being created.

ะ ะตะบะพะผะตะฝะดะฐั†ะธะธ ะฟะพ ั‚ะตะผะต