Open In App

End to End Encryption (E2EE) in Computer Networks

Last Updated : 15 Oct, 2018
Like Article

What is Encryption?
Have you ever wondered how our emails, texts, photos, videos are sent over the Internet? Whenever you send anything over the Internet, it passes through a lot of servers, routers, and other devices where anyone can intercept it and get access to your private information. Thus, to tackle such mishap, encryption was introduced. In encryption, the sent data is modified into such a form that it is impossible to read in between the users. Encryption is basically the modification of data into some unreadable form. When the data reaches the receiver, the data is again modified to its original form. This process called Decryption. A key is required to decrypt the encrypted data called the encryption key. Only the parties that have this key are able to get access to the data.

What is E2EE?
It is a type of asymmetric encryption. In this type of encryption, both the parties have two keys, public and private. The public key is available to each party and to anyone sitting on the server. The private key is known only to the owner and no one else, not even to the party on the opposite end. Both public and private keys are required to decrypt the scrambled data. Suppose Ronaldo is sending a text to Messi. The public key is known to both and to the server also. But both of them has a private key, which no one has any idea about. Thus the text sent by Ronaldo can’t be read by the server (as it doesn’t have the private key). The private key of Messi with the public key is required to decrypt the original text by Ronaldo (I hope it says, ” We both are legends!!! “). In this encryption, the middle party in no way can get access to the data.

All this encryption, decryption, generating keys, etc are handled by web mechanisms, the software, and algorithms. We need not worry about the enabling of the end to end encryption. Just sit back and relax because it is the most secure way of sending information till now. Although there is not a hundred percent surety about its vulnerability. Maybe in near future, there will be some better encryption method than this. But E2EE is the most efficient encryption at present.

Similar Reads

What is E2EE(End to End Encryption)?
E2EE or End to End Encryption refers to the process in which encryption of data are being done at the end host. It is an implementation of Asymmetric encryption and hence ensures a secure way of data communication. It is the most secure way to communicate privately and securely as data can be read-only by the sender and the receiver. No one else ca
3 min read
Difference between Software Encryption and Hardware Encryption
1. Software Encryption: Software Encryption, as the name suggests, is a process of keeping data safe using the software. In this, the software is generally installed in the host computer that encrypts and decrypts data. It is more cost-effective for smaller companies. In this, the password is the key that one needs to have access to data. It usuall
5 min read
Why is Encryption Important in Securing Data Transmission Over Networks?
Answer: Encryption is basically important for securing data transmission over Networks, because it makes shows that sensitive information remains private and inaccessible to unauthorized users.Below are the reasons specifying why encryption important in securing data transmission over networks: ConfidentialityEncryption process encodes the data int
2 min read
Computer Networks - GATE CSE Previous Year Questions
Solving GATE Previous Year's Questions (PYQs) not only clears the concepts but also helps to gain flexibility, speed, accuracy, and understanding of the level of questions generally asked in the GATE exam, and that eventually helps you to gain good marks in the examination. Previous Year Questions help a candidate practice and revise for GATE, whic
4 min read
Computer Networks | Set 5
Following questions have been asked in GATE CS 2005 exam. 1) Packets of the same session may be routed through different paths in: (a) TCP, but not UDP (b) TCP and UDP (c) UDP, but not TCP (d) Neither TCP nor UDP Answer (b) Packet is the Network layer Protocol Data Unit (PDU). TCP and UDP are Transport layer protocols. Packets of same session may b
2 min read
Computer Networks | Set 3
Following Questions have been asked in GATE 2011 CS exam. 1) A layer-4 firewall ( a device that can look at all protocol headers up to the transport layer) CANNOT (A) block HTTP traffic during 9:00PM and 5:00AM (B) block all ICMP traffic (C) stop incoming traffic from a specific IP address but allow outgoing traffic to same IP (D) block TCP traffic
3 min read
Computer Networks | Set 4
Following Questions have been asked in GATE 2010 CS exam. 1) One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field? (A) It can be used to prioritize packets (B) It can be used to reduce delays (C) It can be used to optimize throughput (D) It can be used to
4 min read
Computer Networks | Set 12
Following questions have been asked in GATE CS 2009 exam. 1) Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? (A) G(x) contains more than two terms (B) G(x) does not divide 1+x^k, for any k not exceeding the frame length (C) 1+x is a factor of G
2 min read
Computer Networks | Set 6
Following questions have been asked in GATE CS 2005 exam. 1) An organization has a class B network and wishes to form subnets for 64 departments. The subnet mask would be: (a) (b) (c) (d) Answer (d) The size of network ID is 16 bit in class B networks. So bits after 16th bit must be used to creat
4 min read
Computer Networks | Set 7
Following questions have been asked in GATE CS 2008 exam. 1) Which of the following system calls results in the sending of SYN packets? (A) socket (B) bind (C) listen (D) connect Answer (D) socket() creates a new socket of a certain socket type, identified by an integer number, and allocates system resources to it. bind() is typically used on the s
3 min read
Article Tags :