ProudNet offers a very strong communication security function. For instance, it can encrypt the message related to logon into the highest level.
First, let's learn what encryption is about.
If a message being sent to a different computer is easy to decode or alter then it becomes vulnerable for being hacked by a third person. Especially if the message is your login ID and Password, then one day you would see your game character stripped completely by hackers.
To encrypt a message, it requires each algorithms (formulas) to encrypt and decode. But what is going to happen if the algorithm itself breaks out to public? It wouldn't take long for any hacker to crack the encryption and your valuable information would be leaked. To prevent this, there must be a method, so called key that locks the encrypted message and make hackers see the encrypted message but can never decode it. In today's computer science, the key based encryption is used for encrypted algorithm. The length of encrypted key varies that it can be as long as hundreds of bits if needed.
Let's assume there is a hacker succeeded in possessing an encrypted message. In order to decode the message, the hacker must find a key to open it. Let's say the hacker already knows the algorithm used in the encryption. Then the hacker would pull out his key chain and see which key fits. Again, let's assume the length of encryption key is 128 bits. Then our hacker has a chance of finding the right one out of only 2^128 keys. If our hacker also has a program that automatically switches keys until the correct one come out, it may take around 1/1,000,000,000,000 seconds per a key with his multi-million dollars' worth of super computer. So to our smart and remarkably rich hacker, it only takes 10,790,283,070,806,014,188 years to find the right key.
Key, in other words, the encryption key is categorized into asymmetric and symmetric. Asymmetric key comes in a pair that if one key is used for encryption, then it can't be decoded without the other key. On the contrary, symmetric key can encrypt and decode by itself. Using this difference, both asymmetric and symmetric keys are used together for sending encrypted message in computer network.
Let's say there are two hosts, one is called A, and the other, B. Host A wants to send an encrypted message to Host B safely. Host A first makes a pair of asymmetric keys, then keeps one to himself and sends the other to Host B. The key that Host A kept it is called Private Key and one send to Host B is called Public Key.
And when a hacker attacked the transmission between Host A and B, he found the Public Key.
Host B has created a symmetric key (Session Key), is keeping it to himself and receives the Public Key coming from Host A. Then Host B encrypts the Public Key into a symmetric key. Our hacker manages to steal that symmetric key as well. Host A decodes the received symmetric key as Private Key and shares the symmetric key made by Host B. The hacker has Public Key and the encrypted symmetric key but can't decode the file since he has no Private Key in his possession.
Now Host A sends the message to Host B after encrypting it with the symmetric key came from Host B. The hacker captures this also.
Host B well uses the encrypted message after decoding it with the symmetric key but unfortunately, the hacker can't make of the contents in the message since he hasn't earned the symmetric key.
In an act of revenge, the hacker contaminates the message and sends it to Host B. Host B receives the corrupted message, decoded it anyhow but trashes it since it makes no sense.
ProudNet has such method of encryption implemented as default. It uses 128bit RSA as asymmetric key algorithm and AES, Fast as symmetric key algorithm. RSA is very powerful but it requires heavy calculation that it is difficult to encrypt all messages in RSA. This is precisely why the encryption method has to be mixed between the use of asymmetric and symmetric algorithm.
Not only ProudNet offer the strong encryption for communication between server and client, but also for P2P communication so that the message can be protected from any hacker's attack.