The 'End-To-End' Data Savior Read on as Pavan Kushwaha – a young ethical hacker and founder of cyber security start-up Kratikal Tech that recently raised $500k, puts E2EE in perspective.

By Sandeep Soni

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur India, an international franchise of Entrepreneur Media.

Entrepreneur India

By now, the term end-to-end encryption (E2EE) might not be alien to you. It is what you get every time you initiate a new conversation in WhatsApp: "messages you send to this chat are now end-to-end encrypted". Read on as Pavan Kushwaha – a young ethical hacker and founder of cyber security start-up Kratikal Tech that recently raised $500k, puts E2EE in perspective.

How does this work?

If X (sender) is sending a product to Y (recipient) through let's say a third person then the third person can fiddle or tamper with it. So this becomes an insecure way of exchanging product between X and Y. But if that product is delivered in a sealed box and is accessible only through "keys' that allows only the two parties to open, then the product's privacy is ensured. In digital exchange of data, this otherwise can be breached at various touch points like router, modem, Internet service provider, and data center before it reaches Y's device. This is E2EE and is a must have for businesses in Internet of Things and finance sectors.

Is there any particular type of encryption?

Yes. Encryption is of two types – symmetric and asymmetric. Though not compulsory, E2EE is mostly asymmetric in nature. All Internet-based interactions like emails, calls, and chats can be encrypted. In symmetric encryption, the cryptographic "key' is generated by X and is shared with Y to
decrypt the message for reading. However, because the key here is shared, there are chances of the data being compromised. This problem is solved in asymmetric encryption where two separate keys are generated for every user - a public key and a private key. A person who wants to send a secure message to this user, can use his public key to encrypt the message. The user can then use his private key to decrypt the message. Though the two keys are mathematically related, it is infeasible to derive any one key from the other.

But how secure is even E2EE?

If the data is encrypted properly then it would take billions of years for hackers to decrypt that data using a super computer because it has billions of key combinations to be cracked. How strong is encryption depends on how many "bits' the key has. Higher the number of bits, stronger is the encryption. For e.g., five-bit key advanced encryption system (AES) has 32 combinations (2^5=32) whereas an AES 256-bit key used at government level has some billions key combinations while most apps are AES 128-bit key secured.

How should startups go about it?

They should adopt E2EE right from day one. The volume of data has no relation to the strength of encryption. There are few protocols available for E2EE like Pretty Good Privacy (PGP) and Signal Protocol.

Do you think companies avoid E2EE?

Right! It is because they want to access their customers' data like browsing history, search habits, frequency of visits for advertisements and marketing purposes. Competitors often hack into the companies' data to leverage it even as it leads to revenue loss for companies. Telcom major Airtel in 2015 was accused of breaching customer privacy by tracking its data usage of customers using its 3G network without their consent. This was done by injecting JavaScript code into the users' browsers. Government also can check your data if required if it is not encrypted.

(This article was first published in the April issue of Entrepreneur Magazine. To subscribe, click here)

Sandeep Soni

Former Features Editor

Business Ideas

70 Small Business Ideas to Start in 2025

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2025.

Business Solutions

All the PDF Tools You Need in One Easy-to-Use App

Sign, edit, and merge PDFs in seconds.

Buying / Investing in Business

Former Zillow Execs Target $1.3T Market

Co-ownership is creating big opportunities for entrepreneurs.

Technology

Why 2025 Will Be a Breakthrough Year for MSMEs in India's Digital Revolution

With the convergence of AI, cloud ecosystems, enhanced connectivity, and ethical data practices, 2025 represents a pivotal year for MSMEs in the digital sector. To remain competitive, MSMEs must embrace these technologies while fostering innovation and strategically aligning their operations with emerging trends.

Growing a Business

How to Build a Solid Go-to-Market Strategy for 2025

Here's your playbook for creating a GTM strategy that works in 2025.

Business News

Zillow Predicts These 10 Places Will Have the Hottest Housing Markets in 2025

Zillow predicted that the hottest housing market of 2025 will be Buffalo, New York. Here's why.