At the moment, information technology is dominated by 2 types of encryption:
The basics of symmetric encryption are simple enough to understand. The essence of it is that the same exact key is used to encrypt and decrypt data.
Asymmetric encryption was invented to solve the problem of key transmission over an insecure connection channel existing in symmetric encryption. It works as follows:
At the moment, the most commonly used asymmetric encryption for exchanging symmetric encryption keys, ssl/tls, uses this exact model.
As the name suggests, this is a method of applying encryption when data is encrypted for a recipient, which makes the transfer of such data through intermediaries or centralized servers relatively secure. Unlike classic, older models in e2e encryption, the message is not encrypted for an intermediary or server that will send the message to the recipient, but directly to the recipient, which greatly reduces the risk of data leakage, but does not solve the problem of metadata leakage.
In a very short and simplified way, PFS is a method of using a combination of encryption algorithms so that encrypted data can no longer be decrypted following a successful decryption by the receiver. This is usually done by using a one-time “session” key that is immediately destroyed after successfully decrypting the encrypted data, which makes it impossible for a third party to decrypt even if it obtains access to the underlying encryption keys that both the sender and receiver have.