# How does website or VPN encryption work?

Using a bunch of mathematical magic, a key pair is generated. But that's just where the fun starts.

//

When I travel and use a site like Hotspot Shield or another service, how does my information get encrypted? Does the site send an encryption key that encrypts my data before it leaves my computer and then decrypts it with a key only it and my computer knows?

I have the same question regarding my “secure” online banking transaction when I’m at home on my secured wireless network. Does the bank send my computer a key to encrypt my data before it leaves my computer to go through my secured wireless LAN? I plan to travel overseas shortly and I’m very concerned about using my computer for sensitive transactions while overseas.

You’re mostly right, but you’re also overlooking an important step in that process. How do you exchange that encryption key securely before the encryption has been set up?

In other words, how do you send someone a password securely if the only thing that they would have to make it secure is knowing that password before they got it?

The problem is that you need to encrypt to exchange data securely, but you can’t encrypt until you’ve exchanged the encryption key. It’s a classic chicken and egg problem.

Let me explain what happens here at a very high level.

## Public key encryption

Normal encryption, the kind you’re probably most used to, is where you have one key. That key is typically a password or something derived or calculated from a password. When you use it to encrypt something the recipient who wants to access it must know that same password or key and uses it to decrypt the encryption.

Public key encryption is different.

Instead of a single encryption key, a key pair is generated. That pair or keys has a very interesting property: anything encrypted with the first key can only be decrypted by the second, and anything encrypted by the second key can only be decrypted by the first.

I’ll just call it all mathematical magic, because unless you’re a computer scientist or mathematician, it pretty much is. It’s very complex math, and honestly, very cool stuff if you think about it. It’s one of those wonderful fundamental discoveries that actually enables a bunch of the security that we use and rely on today on the internet.

## Using public key encryption

While the math is hard, using public key encryption is actually pretty simple:

• Create a key pair
• Make one of the keys public – anyone can see it.
• Keep the other one secret – only you can see it.

That way two things are possible:

• Anyone can encrypt something using your public key that only you can decrypt using your private key.
• Someone can verify that something came from you if they can decrypt it using your public key – because only you could have encrypted it with the matching private key.

It’s that first one that we’ll use to clarify how https and VPNs work.

## Setting up an encrypted connection

When you contact a site using SSL (the secure part of https and most VPNs), the first thing that site responds with its public key.1

Your browser can then generate a completely random number – typically a fairly large one. It encrypts that random number using the public key of the site and sends the encrypted data to the site. The site then decrypts this random number, as only it can since it has the secret, private key that matches the public key that was used to encrypt it in the first place.

That random number is thereafter used as a simple “both sides need to know it” key for encrypting and decrypting the data that goes back and forth. This simple key is used rather than continuing to use the public/private key pair because it’s simpler and often much faster to actually use. Much like a strong password this simple key is often very large making cracking it effectively impossible.2

## Wifi Encryption

It’s important to realize that when you place encryption on a Wifi router – for example by enabling WPA2 and requiring a password – you’re only encrypting the conversation between your router and your computer, nothing more:

As it turns out, if you do your banking or VPN as https over a password-protected Wi-Fi, you’re actually encrypting twice while you’re on that wireless connection:

Once, for the connection between your computer and your WiFi access point, and once for the entire connection between your computer and the service to which you are connected.

That’s OK. The SSL connection ensures that you’re encrypted from one end to the to other – that’s its job. That the wireless leg of that conversation is being encrypted again causes no harm whatsoever.

##### Footnotes and references

1: I’m over-simplifying this to an extreme degree to focus on the concepts and how such a thing can be accomplished rather than the pedantic details of the actual SSL/TLS protocols.

2: One thing you’ll note is this “both sides need to know it” key doesn’t change for the life of the conversation. If a conversation is recorded it’s theorized that someday the encryption used could be cracked as technology becomes more powerful. One variant of the secure protocol called “forward secrecy” actually causes this encryption key to constantly change making that type of “hacking the past” extremely difficult, if not theoretically impossible. Unfortunately this variant is not yet in widespread use, though it is growing.

## There are 7 comments:

This is very interesting but I wish I could understand more. I understand the concept but not the how to do it Thank you…

• Connie Delaney Reply

Rita,
If you are wondering how to set up encryption on your own website the solution is to contact your server provider. They are going to have to be involved in getting it set up for you anyway, and will explain the exact steps needed for their servers. BTW, it will cost some extra money.

Leo, in the above illustrations, it appears that an access point is synonymous with a router. But in general, what is an “access point”? Thanks…

• Mark Jacobs Reply

Strictly speaking an Access Point is a radio transceiver which connects wireless devices to a wired network. It’s an interface for wireless clients to connect to a LAN. In many cases, especially in most home networks, they are combined into one unit. Generally speaking, all wireless routers are access points, but not all access points are routers.

German Chancellor Angela Merkel may have doubts regarding the security that encryption offers.
“caveat emptor”