Strong VPN Encryption and Security Explained
Besides hiding your IP address and mixing your traffic with that of other users, ExpressVPN also encrypts your traffic between secure VPN servers and your computer, so that it can’t be read by third parties in between, such as your internet Service Provider or your local Wi-Fi operator.
Encryption is hard, and generally relies on well-tested implementation of advanced mathematics. Read on to learn a little bit about how ExpressVPN uses strong encryption to protect your data and communications.
How secure is ExpressVPN encryption?
ExpressVPN uses AES (Advanced Encryption Standard) with 256-bit keys — also known as AES-256. It's the same encryption standard adopted by the U.S. government and used by security experts worldwide to protect classified information.
256-bit keys means 2256 or 1.1 x 1077 possible combinations. That's 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,560,000,000,000,000,000,000,000,000 combinations! A brute-force attack on a 256-bit keyspace is simply infeasible, even if all the world's most powerful supercomputers ran for as long as the universe has existed so far, billions and billions of times over.
OpenVPN (TCP and UDP)
ExpressVPN offers a variety of VPN protocols to implement strong encryption between your computer and the VPN server location you connect to. When you use the ExpressVPN app, you can easily switch between the protocols, although it’s recommended that you stick with the default protocol (the open-source OpenVPN), or let the app automatically select the settings most optimal for your speed and security.
Here are some of the features of ExpressVPN encryption with OpenVPN:
OpenVPN functions similar to TLS or HTTPS, which is why it might be referred to as a TLS VPN. (HTTPS is the secure version of the basic Internet protocol HTTP, used to protect site authenticity on the internet. Your browser has certificates pre-installed that allow it to verify the integrity of website, as long as it uses HTTPS. You can verify that a site uses HTTPS properly by looking for the green lock ( ) in your browser’s address bar.)
Just like HTTPS, OpenVPN uses certificates to protect the user against man-in-the-middle attacks. With HTTPS there are centralized registrars called Certificate Authorities (CAs). They are cryptographically trusted by your operating system or browser, and issue and sign certificates for websites. This works in HTTPS because there are common standards to issue and revoke certificates, as well as to attribute the domains they are issued for to a specific owner. OpenVPN clients require you to install the VPN’s certificate yourself, usually by simply saving it on your computer, and instructing the OpenVPN client where the file is located.
ExpressVPN uses a RSA certificate corresponding to a key with 4096-bits of length, identified by SHA-512, a hashing algorithm of the SHA-2 family.
HMAC stands for keyed-Hash Message Authentication Code. A Message Authentication Code is a protection against data being altered in transit by an attacker who has the ability to read the data in real-time. Out of many possibilities on how to reliably authenticate messages, TLS and OpenVPN use hashes (hence the H in HMAC).
To encrypt the control channel ExpressVPN uses AES-256-CBC. AES is one of the most widely used encryption standards, based on the Rijndael cipher developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. 256 refers to its size, 256-bit, the largest available. CBC stands for Cipher Block Chaining, which makes each message passed dependent on the previous one. This way even a brief interruption in the channel can be quickly detected.
Data-channel encryption protection helps you against your information being visible to the parties that your data travels through. ExpressVPN uses a symmetric encryption scheme, in which the key is negotiated using the elliptic curve Diffie–Hellman key exchange. The ExpressVPN server and your VPN app use clever mathematics to negotiate and verify a secret key that is then used to encrypt the data for the entire session. Once you reconnect, a new key is used. This enables perfect forward secrecy, meaning it is impossible to decrypt old VPN sessions even if your computer or the VPN server were suddenly compromised.