How Does Search Encrypt Work?

Search Encrypt/ July 19, 2018/ Tech/ 6 comments

Search Encrypt is a private search engine designed with privacy as its core value. Search Encrypt protects your privacy by encrypting your search terms, expiring your browsing history and using advanced SSL encryption. We’re sharing a bit about how we encrypt your searches and, as a result, protect your privacy.

What Happens When You Search with Search Encrypt?

  1. Search Encrypt checks the URL of each website you visit. We do not log or store that data anywhere.
  2. For your privacy, Search Encrypt intercepts the requests if it’s on our list of sites that may track your searches.
  3. Search Encrypt encrypts your search locally using industry standard AES-256 encryption.
  4. Your locally encrypted search term is securely transmitted to our servers.
  5. To provide you with the most relevant results possible, we then decrypt your search term and securely request results from our search & content partners.
  6. We aggregate the most relevant results and securely display them to you.
  7. For added security, your local browsing history, for any search we protect, expires and goes away after 15 minutes of inactivity.

Search Encrypt Redirects Tracked Searches

Search Encrypt checks if you are using a search engine that tracks you. If it sees that you are being tracked, it encrypts your search term locally and then transmits it securely to our servers. We then decrypt and redirect your search term through our private search engine. This protects your privacy by not allowing the searches on major search engines to go through. Our browser extension adds a layer of protection by helping you move away from search engines that track you around the web. You may be using one of those search engines without even knowing. We then provide you with the most relevant results possible by securely requesting and aggregating them from our search partners.

Search Encrypt’s Encryption Methods

Encryption happens when an algorithm scrambles your data into an unrecognizable “cipher” form. An encryption key is then required to view the data in plain text. There are many types of encryption. Search Encrypt uses AES, which is the most widely used encryption algorithm. AES-256, which has a 256-bit cipher key, is used by the NSA for TOP SECRET classified information.

AES-256 Encryption

AES, Advanced Encryption Standard, is a data encryption standard endorsed by the National Institute of Standards and Technology (NIST). It replaced the previous standard, Data Encryption Standard, DES. AES is a more secure system for internet communications and transactions. Two Belgian Cryptographers, Joan Daemen and Vincent Rijmen, created AES in October 2000. The system was originally called Rijndael before being accepted as the new encryption standard, AES. Rijndael offered security, performance, efficiency, implementability, and flexibility beyond that of any of the other candidates for the new encryption standard.

Some well-known uses of AES include Signal Protocol, used in Google Allo, Facebook Messenger, and WhatsApp. The technology is also used in certain game engines, like Rockstar’s Advanced Game Engine used in Grand Theft Auto IV to deter hacking in online multiplayer game modes.  AES-256 denotes that the encryption key size is 256 bits. AES supports 128, 192 and 256-bit key sizes. 256 bit keys mean that there are 2256 options for encryption keys. The number of options is bigger than the number of atoms in the perceivable universe. In other words, no person, or computer, will be able to “guess” the key. With current computing capabilities, cracking a key of this length would take millions of years.

SSL (Secure Socket Layer) Encryption

Secure Socket Layer, SSL, is a cryptographic protocol that encrypts communication on a computer network. It allows for secure transfer of sensitive information like financial info, passwords or Social Security numbers. Websites that process payment via credit card must have an SSL certificate.

SSL works by creating a public and a private key. These two keys then create a secure and encrypted connection. Websites with SSL certificates communicate with the user’s browser to let it know that a secure connection is available. Without SSL encryption, sites transmit user information in plain text. This means that anyone with access to the network could theoretically access the data. SSL encrypts this data so it can’t be easily leaked or hacked.

Expiring Browsing History

Beyond the traditional encryption methods, we use a short lived key for client side encryption of search history. This means that you, or anyone with access to your computer, can’t access your search history after you finish searching. Because we use an expiring key, your search history is totally gone, even if a hacker accesses the encryption key.

Privacy-Friendly Token

When you come to Search Encrypt’s site for the first time, we give you a token that is associated with your IP address. We don’t track or store your IP address, and we don’t link your searches to your IP address. The token can only be seen by Search Encrypt and you. The purpose of this token is to let us encrypt your search term and to let you see your search results in non-encrypted form.

Search Encrypt’s token logic works to let us know when it’s you searching so we can let you view your results. If the token is not present, your searches stay encrypted so no one else can view them.

Perfect Forward Secrecy

Search Encrypt offers perfect forward secrecy. This is any encryption method in which a breach of the long-term key doesn’t compromise past session keys. Your search terms are encrypted and not linked to any personally identifiable information. For our users it offers a sense of security, because even if the NSA or hackers were able to access our servers, we store none of your information. Through a combination of advanced encryption, expiring browser history, and not storing user information, Search Encrypt delivers a secure and private search experience.

Search Encrypt vs. Other Search Engines

  • Most search engines track your searches. Search Encrypt doesn’t track any personally identifiable data.
  • Other search engines use your personal information to serve you targeted ads around the internet. Search Encrypt serves ads on its results page only, and they are based on you search term and nothing else!
  • Search Encrypt uses end-to-end encryption so your search terms aren’t as vulnerable to hackers who otherwise could see what you were searching for.
  • Search Encrypt uses AES-256 encryption combined with expiring encryption keys which mean your search terms disappear after you’re done searching.

Why Should You Use a Private Search Engine, Like Search Encrypt?

  • Private search engines don’t track you.
  • You can keep other people from seeing your search history.
  • Private search engines can’t follow you around the internet with ads.
  • Your data can’t be hacked or leaked if your search engine never collects it.

Read More about the importance of private search engines.



  1. how do i delete search encrypt. how do i return to google search

    1. This article provides an in-depth explanation of how to remove our extension.

  2. make it simpler too understand

    1. Hopefully some of our upcoming articles will be simpler, and easier to understand. Thanks for reading.

  3. Ur articles are amazing and thank you that u r posting such a useful articles

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>