• exhibitaly2012@info.com
  • +000 582 456

The encryption of a VPN operates in 3 steps, but how do we know that these 3 steps are taking everytime we connect with a VPN

A VPN has two functions: Modification of the originating IP (Server) and Sécurization of transfers via a (encryption).

  • It is this second aspect that interests us the most today. What are the VPNs that offer the best encryption?. What are the VPNs that will guarantee you on the one hand that the integrity of the transfers will be ensured and that no one can or will be able to watch what is in transit between the VPN and you with the φθηνά vpn.

Privacy thanks to the level of encryption

This is often what VPNs put forward. This corresponds to the encryption key. The more it is raised the more the encryption will be important and therefore difficult to break. The most common encryption algorithm is AES 256 bit. There are of course other algorithms such as Camellia or Blowfish. Most users stop at this fact: 256-bit AES encryption, but it is the operating mode of the block cipher that is most important. The operating modes (CBC, ECB, GCM, CCM, …) will encrypt each block individually and with varying degrees of efficiency. The operating mode allows confidentiality. The most used is the CBC, the best is the GCM and the one to be avoided is the Surfshark Sverige.

The integrity of the data thanks to the hash functions

It’s amazing but the most rudimentary encryption (CBC-AES 256bit) provides data privacy but not integrity. This is why VPNs add a hash function to avoid data alteration between the VPN and your computer. The two used are SHA-1 or SHA-256. Even if your VPN doesn’t mention them, there is little chance that it won’t use them! To remedy this problem, more and more VPNs are using so-called authenticated modes such as GCM, which allow privacy and integrity in a single mode and soon a third-party hash function. GCM also has two other advantages: it is faster than CBC and resistant to timing attacks. All the VPNs on our list use OpenVPN with a GCM operating mode with Surfshark VPN review.

Process of establishing a communication

These key exchanges are used to establish a secure connection and verify that you are communicating properly with your VPN server. Diffie-Hellman key exchange with the RSA certificate is the most popular. There are some variants of Elliptic Curve encryption, known as ECDSA, but they do not bring anything to the table, except that they are also used by Bitcoin. VPNs have added security to this key exchange by introducing the notion of FPS (Perfect Forward Secrecy) which allows to manage a new key; This allows the user to generate a new key for each connection and to generate a new key every 60 minutes when connecting for more than 60 minutes.