Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

How does website or VPN encryption work?

Question:

When I travel and use a site like Hotspot Shield or another service, how does my information get encrypted? Does the site send an encryption key that encrypts my data before it leaves my computer and then decrypts it with a key only it and my computer knows?

I have the same question regarding my “secure” online banking transaction when I’m at home on my secured wireless network. Does the bank send my computer a key to encrypt my data before it leaves my computer to go through my secured wireless LAN? I plan to travel overseas shortly and I’m very concerned about using my computer for sensitive transactions while overseas.

You’re mostly right, but you’re also overlooking an important step in that process. How do you exchange that encryption key securely before the encryption has been set up?

In other words, how do you send someone a password securely if the only thing that they would have to make it secure is knowing that password before they got it?

The problem is that you need to encrypt to exchange data securely, but you can’t encrypt until you’ve exchanged the encryption key. It’s a classic chicken and egg problem.

Let me explain what happens here at a very high level.

Become a Patron of Ask Leo! and go ad-free!

Public key encryption

Normal encryption, the kind you’re probably most used to, is where you have one key. That key is typically a password or something derived or calculated from a password. When you use it to encrypt something the recipient who wants to access it must know that same password or key and uses it to decrypt the encryption.

Public key encryption is different.

Instead of a single encryption key, a key pair is generated. That pair or keys has a very interesting property: anything encrypted with the first key can only be decrypted by the second, and anything encrypted by the second key can only be decrypted by the first.

I’ll just call it all mathematical magic, because unless you’re a computer scientist or mathematician, it pretty much is. It’s very complex math, and honestly, very cool stuff if you think about it. It’s one of those wonderful fundamental discoveries that actually enables a bunch of the security that we use and rely on today on the internet.

Using public key encryption

While the math is hard, using public key encryption is actually pretty simple:

  • Create a key pair
  • Make one of the keys public – anyone can see it.
  • Keep the other one secret – only you can see it.

That way two things are possible:

  • Anyone can encrypt something using your public key that only you can decrypt using your private key.
  • Someone can verify that something came from you if they can decrypt it using your public key – because only you could have encrypted it with the matching private key.

It’s that first one that we’ll use to clarify how https and VPNs work.
HTTPS

Setting up an encrypted connection

When you contact a site using SSL (the secure part of https and most VPNs), the first thing that site responds with its public key.1

Your browser can then generate a completely random number – typically a fairly large one. It encrypts that random number using the public key of the site and sends the encrypted data to the site. The site then decrypts this random number, as only it can since it has the secret, private key that matches the public key that was used to encrypt it in the first place.

That random number is thereafter used as a simple “both sides need to know it” key for encrypting and decrypting the data that goes back and forth. This simple key is used rather than continuing to use the public/private key pair because it’s simpler and often much faster to actually use. Much like a strong password this simple key is often very large making cracking it effectively impossible.2

Wifi Encryption

It’s important to realize that when you place encryption on a Wifi router – for example by enabling WPA2 and requiring a password – you’re only encrypting the conversation between your router and your computer, nothing more:
Wifi Encryption
As it turns out, if you do your banking or VPN as https over a password-protected Wi-Fi, you’re actually encrypting twice while you’re on that wireless connection:

Double Encrypted Connection

Once, for the connection between your computer and your WiFi access point, and once for the entire connection between your computer and the service to which you are connected.

That’s OK. The SSL connection ensures that you’re encrypted from one end to the to other – that’s its job. That the wireless leg of that conversation is being encrypted again causes no harm whatsoever.

Do this

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

I'll see you there!

Footnotes & references

1: I’m over-simplifying this to an extreme degree to focus on the concepts and how such a thing can be accomplished rather than the pedantic details of the actual SSL/TLS protocols.

2: One thing you’ll note is this “both sides need to know it” key doesn’t change for the life of the conversation. If a conversation is recorded it’s theorized that someday the encryption used could be cracked as technology becomes more powerful. One variant of the secure protocol called “forward secrecy” actually causes this encryption key to constantly change making that type of “hacking the past” extremely difficult, if not theoretically impossible. Unfortunately this variant is not yet in widespread use, though it is growing.

7 comments on “How does website or VPN encryption work?”

    • Rita,
      If you are wondering how to set up encryption on your own website the solution is to contact your server provider. They are going to have to be involved in getting it set up for you anyway, and will explain the exact steps needed for their servers. BTW, it will cost some extra money.

      Reply
  1. Leo, in the above illustrations, it appears that an access point is synonymous with a router. But in general, what is an “access point”? Thanks…

    Reply
    • Strictly speaking an Access Point is a radio transceiver which connects wireless devices to a wired network. It’s an interface for wireless clients to connect to a LAN. In many cases, especially in most home networks, they are combined into one unit. Generally speaking, all wireless routers are access points, but not all access points are routers.

      Reply
    • I’m under the impression that any snooping that may or may not have been done did not involve breaking encryption, but rather listening in to unencrypted conversations – possibly with malware or devices at the unencrypted endpoints.

      Reply
  2. SSL is not that safe as one thinks.
    The following article on the GRC website explains in rather understandable words why.
    https://www.grc.com/fingerprints.htm
    In short it explains in other words: you can trust nothing and nobody that’s connected to an ethernet or the WWW.
    The NSA illegal spying scandal only fortified that assumption.
    But we knew that already for a long time, didn’t we?

    Reply

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.