Encryption / Hashing
Well, as we are using VPN for communicating safely, there are still chances of eavesdropping. We are on the public network when we use VPN and by any chance if a hacker on a public network spots and catches our packets, our data will be at risk and can get exposed.
The solution is when we use VPN, we will also use hashing which is also known as encryption. Encryption will change the data in the packets in such a way that no one could understand or could be able to decrypt it.
There are several levels of encryption and there are several types of encryption -
We will see three design scenarios to understand the concept much better.
First design scenario -
We can use VPN without encryption as well. And that completely depends upon how valuable the data can be for the one who is sending and for the one who is receiving it. As encryption is not an easy task, it takes high amount of CPU utilization while encrypting every single packet before sending it on the network. Hence, it is up to the importance of data.
Second design scenario -
We can use both, VPN as well as encryption in the network. Which also depends upon the value of data.
Third design scenario -
Even after having the dedicated physical link, we can use the VPN as well as encryption with it. The question is why there is need to use a VPN and hashing on a physical private link?
The answer, many financial organizations have these kind of requirements where data needs to be encrypted even between the two branches due to the trust issues. One must not take security for granted resulting in financial loss of whole organization. Here, the purpose is not public, private or VPN as we already have a private physical link. The purpose is to make data secure by using encryption / hashing.
So! This was the brief overview about encryption / hashing. See you in the next article!