The use of instant messengers is increasing day by day. They provide quality conversations at no cost when computers are at both ends and very cheap for calls from a computer to a mobile phone or a landline. They even allow us to make video calls, audio calls and text our friends and relatives.
Why we use data encryption cyphers
One of the most important things is the privacy of our conversations. No one would like anyone else eavesdropping on their conversations, be it video, audio or chat. Websites maintain the privacy of your conversation by encrypting your conversation in a certain data code so that no one else who intercepts the data transmission can understand what is being shared. These codes are then decrypted at the company’s servers and then sent to the person with whom you are communicating. This is safe enough for end user, allowing you to talk to anyone without any fear that someone else is violating your privacy.
Skype takes a punch
The encryption cipher that Skype, the most popular instant messenger, used has been decrypted by a team of Cryptanalysts. This team was led by Sean O’Neil reckon who said that they have successfully decrypted Skype’s implementation of the RC4 cipher. This is the technology used by Skype and is better than other technologies available in the market. This cypher was the best in the market because it encrypted data in a much more secure manner than others did. Now this team has become the first team to decrypt the RC4 cipher of Skype. It is important to keep in mind that Skype also uses many other encryption techniques. Therefore, the decryption of this cypher does not mean that Skype’s whole privacy structure has been breached. They might start using other encryption methods or even improve this one so that it will not be decrypted as easily in the future.
The beauty with public encryption methods is that once someone has found a way to break the encryption, the owner will know that it is time for an improvement. Keeping your encryption cyphers secret may result in an unannounced breach. It is a lot more dangerous because you will not know that you are no longer secure.
Skype told a news website that O’Neil’s partial leak that he did some month ago was what facilitated spam attacks against users of the VoIP service in the first place. He further said that they believe that the work being done by Sean O’Neil, whom we understand was formerly known as Yaroslav Charnovsky, is directly facilitating spamming attacks against Skype and we are considering our legal remedies.
O’Neil’s original blog posting has been pulled but some copies of those posts can still be found in Google’s cache. O’Neil has published the RC4 Skype key expansion algorithm, but it is just a part of the encryption technologies used by Skype.