Perfect Forward Secrecy explained everything you need to know TechRadar

Perfect Forward Secrecy explained everything you need to know TechRadar

Perfect Forward Secrecy explained everything you need to know TechRadar Skip to main content TechRadar is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Here's why you can trust us. Perfect Forward Secrecy explained everything you need to know By Chiara Castro published 8 June 2022 With hackers refining their tactics, encryption gets smarter (Image credit: Shutterstock) You're probably already familiar with the concept of encryption. Messaging apps, VPN services and most websites constantly scramble your data in transit so that just you and the receiver can access that information - whether it's a message, call or webpage. However, for encryption to be effective, these private keys must remain secret at all times. Otherwise, if cybercriminals get hold of them, they will be able to access or modify your data in transit. That's where Perfect Forward Secrecy (PFS) comes into play: to minimize the risk in the rare situation that your encryption keys do get compromised. This technology is a way to fortify encryption, and prevent hackers from accessing your whole stack of data. Secure messaging apps like Signal and many of the best VPN providers have implemented PFS technology in their software to ensure their users stay safe, even in a worst-case scenario. Here, we'll explain everything you need to know about Perfect Forward Secrecy: how it works, its pros and cons, and on which occasions it is implemented. (Image credit: Shutterstock) What is Perfect Forward Secrecy   Perfect Forward Secrecy minimizes the risk posed to your personal information in the event of an encryption key breach by regularly changing your keys. The amount of time between changes varies by implementation - some are hourly, and others change every time you access a new message or load a new page. This means that if malicious actors manage to intercept one of these keys, they will be able to access just a small portion of the information you shared online. These keys are randomly generated so that, even in case they get intercepted, hackers won't be able to use them to get hold of your past nor your future data. In the case of VPN traffic, these sets of keys are regenerated for each session. Some providers like ExpressVPN use new keys every time your device switches network, after a connection is terminated, as well as every 15 minutes to better protect longer sessions. How does Perfect Forward Secrecy work So, PFS generates new sets of keys to minimize the users' risk, but how exactly does this process work? The infrastructure of apps, services and websites supporting Perfect Forward Secrecy relies on the Diffie-Hellman key exchange (DH) (opens in new tab) to generate ephemeral keys without sharing them over the internet. Using prime numbers and complex mathematical formulas, DH allows two parties without prior knowledge of each other to establish a shared secret key over an insecure connection channel. In simple terms, as soon as these decryption keys have been used, they disappear. And the process is repeated for each data exchange happening between the two parties - whether that's you and your mate chatting via Telegram Secret Chats, or your device and the web server rerouting you on a chosen site. All this makes it quite difficult for hackers to get hold of your data in transit and, in the virtually impossible case that they manage to do so, only the information you shared via that single key will be revealed. (Image credit: NordVPN) What are the benefits of Perfect Forward Secrecy Perfect Forward Secrecy has several advantages compared with traditional encryption systems. That's not to say that normal encryption isn't secure, but adding an extra layer of protection makes your crypto-lock way more difficult to crack. First of all, with endlessly changing encryption keys, your past activities will be protected from any intruders in case future sessions get compromised. Your overall data security will improve as, even if a leak does happen, third parties will manage to see only a tiny portion of your encrypted data. On top of that, hackers would probably be less inclined to target PFS-based services. That's mainly because it wouldn't be worth the effort to access only a very limited stack of data. And the disadvantages As every time a double encryption occurs - similarly to NordVPN's Double VPN - your connection might slow down. That's because the system requires more processing power. However, if your device is powerful enough you are unlikely to even realize it. From a developing perspective, PFS is harder to troubleshoot as its infrastructure is more complex. Plus, although all modern browsers support Perfect Forward Secrecy on HTTPS-encrypted sites, there are still some web servers that unfortunately do not. It is also worth noting that, even though both the popular OpenVPN and WireGuard protocols support PFS technology, even the most secure VPN services usually do not enable this by default. (Image credit: Proton VPN) Who s using Perfect Forward Secrecy With cyber attacks continuing to grow everywhere around the world, Perfect Forward Secrecy is becoming increasingly popular for protecting modern communications. In 2011, Google started integrating PFS in its TLS infrastructure to secure all its services - from Gmail and Google Docs to encrypted search. Two years later, Twitter did the same. Now, almost every website implements Perfect Forward Secrecy technology. As Atlas VPN reported, SSL Labs found out that only a tiny 0,9% of sites do not support PFS at all (opens in new tab). Many of the most private VPN services have implemented this secure technology, too. These include ExpressVPN, Proton VPN, NordVPN and Private Internet Access (PIA). Compare today's best overall VPNs+3 MONTHS FREE (opens in new tab)ExpressVPN 12 month (opens in new tab)$6.67/mth (opens in new tab)View Deal (opens in new tab)+3 months free (opens in new tab)NordVPN 2 Year (opens in new tab)$3.09/mth (opens in new tab)View Deal (opens in new tab)+2 months free (opens in new tab)Surfshark 24 Months (opens in new tab)$2.30/mth (opens in new tab)View Deal (opens in new tab)+2 MONTHS FREE (opens in new tab)Private Internet Access 2 Year (opens in new tab)$2.19/mth (opens in new tab)View Deal (opens in new tab) (opens in new tab)Proton VPN 2 year (opens in new tab)$4.99/mth (opens in new tab)View Deal (opens in new tab)We check over 250 million products every day for the best prices Chiara CastroStaff WriterChiara is a multimedia journalist, with a special eye for latest trends and issues in cybersecurity. She is a Staff Writer at Future with a focus on VPNs. She mainly writes news and features about data privacy, online censorship and digital rights for TechRadar, Tom's Guide and T3. With a passion for digital storytelling in all its forms, she also loves photography, video making and podcasting. Originally from Milan in Italy, she is now based in Bristol, UK, since 2018. Are you a pro? Subscribe to our newsletter Sign up to theTechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Thank you for signing up to TechRadar. You will receive a verification email shortly. There was a problem. Please refresh the page and try again. MOST POPULARMOST SHARED1You may not have to sell a body part to afford the Nvidia RTX 4090 after all2Blizzard made me explain Overwatch 2 smurfing to my mum for nothing3Apple October launches: the new devices we might see this month4Google's AI editing tricks are making Photoshop irrelevant for most people5One of the world's most popular programming languages is coming to Linux1We finally know what 'Wi-Fi' stands for - and it's not what you think2Best laptops for designers and coders 3Tech giants found destroying thousands of data storage devices every year - but why?4The iPhone 14 Pro is made of the wrong stuff; the Pixel 7 proves that to me5Miofive 4K Dash Cam review Technology Magazines (opens in new tab)● (opens in new tab)The best tech tutorials and in-depth reviewsFrom$12.99 (opens in new tab)View Deal (opens in new tab)
Share:
0 comments

Comments (0)

Leave a Comment

Minimum 10 characters required

* All fields are required. Comments are moderated before appearing.

No comments yet. Be the first to comment!