3.1.2
Encryption
Encryption
Encryption
If sensitive data is going to be transferred, then it is important that we keep it secure from third parties.
![Illustrative background for Encryption](https://image-v2.cdn.app.senecalearning.com/2018-08/299fd687-0b03-4954-a77c-ecdb601d4f38/Security-Encryption-Code-Internet-Computer-,h_400,q_80,w_640.jpg)
![Illustrative background for Encryption ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-08/299fd687-0b03-4954-a77c-ecdb601d4f38/Security-Encryption-Code-Internet-Computer-,h_400,q_80,w_640.jpg)
Encryption
Encryption
- Encrypting data is the process of scrambling data according to a specific algorithm so that it cannot be read by third parties.
- Only the intended recipient will know how to decode the data.
![Illustrative background for Keys](https://image-v2.cdn.app.senecalearning.com/courseImages/biology/Edexcel/1 Cells/keys and locks,h_400,q_80,w_640.jpg)
![Illustrative background for Keys ?? "content](https://image-v2.cdn.app.senecalearning.com/courseImages/biology/Edexcel/1 Cells/keys and locks,h_400,q_80,w_640.jpg)
Keys
Keys
- A lot of encryption depends upon secret keys, which are shared secret pieces of data.
- Keys are made up of a pair of very large prime numbers, either 256 or 1,024 bits long.
- It would take an impractical amount of time to guess the key. So we say that the encryption is secure.
![Illustrative background for Wireless communication](https://image-v2.cdn.app.senecalearning.com/2018-07/d76addcb-0eff-4c0e-9f52-81b2d3190629/Wirless-Controller-Wifi-WIC-Interface-,h_400,q_80,w_640.jpg)
![Illustrative background for Wireless communication ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/d76addcb-0eff-4c0e-9f52-81b2d3190629/Wirless-Controller-Wifi-WIC-Interface-,h_400,q_80,w_640.jpg)
Wireless communication
Wireless communication
- It is especially important to encrypt wireless communication.
- Protocols exist for wireless communication, such as WiFi Protected Access version 2 (WPA2), which encrypt all traffic.
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
The use of encryption is vital to protect our private information. One type of encryption is symmetric encryption.
![Illustrative background for Symmetric encryption](https://image-v2.cdn.app.senecalearning.com/2020-03/a3b43307-a764-42d4-a1a4-3ab83c2ce529/cyber-security-min,h_400,q_80,w_640.jpg)
![Illustrative background for Symmetric encryption ?? "content](https://image-v2.cdn.app.senecalearning.com/2020-03/a3b43307-a764-42d4-a1a4-3ab83c2ce529/cyber-security-min,h_400,q_80,w_640.jpg)
Symmetric encryption
Symmetric encryption
- Symmetric or private key encryption is used to encrypt data for transmission.
- A private key is used to convert plain text into cypher text.
- This cypher text and private key are then transferred to another location or person.
- The key is then used to decrypt the cypher back into plain text.
![Illustrative background for Security](https://image-v2.cdn.app.senecalearning.com/2019-08/ceec0a51-33fc-4c62-b098-9e589f0a2be2/nail-computer-woman-,h_400,q_80,w_640.jpg)
![Illustrative background for Security ?? "content](https://image-v2.cdn.app.senecalearning.com/2019-08/ceec0a51-33fc-4c62-b098-9e589f0a2be2/nail-computer-woman-,h_400,q_80,w_640.jpg)
Security
Security
- Using a single key to encrypt and decrypt text proposes a massive flaw in security, as anyone with the key can decrypt the cypher.
- As with passwords, the longer the encryption key, the less likely it is to be compromised by brute force, and so the more secure the encryption.
![Illustrative background for Asymmetric encryption](https://image-v2.cdn.app.senecalearning.com/2018-07/85022e76-668d-464d-b34c-aecd57ee3a90/Lock-Locksmith-Padlock-Secure-Security,h_400,q_80,w_640.jpg)
![Illustrative background for Asymmetric encryption ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/85022e76-668d-464d-b34c-aecd57ee3a90/Lock-Locksmith-Padlock-Secure-Security,h_400,q_80,w_640.jpg)
Asymmetric encryption
Asymmetric encryption
- Asymmetric or public key encryption is a much stronger form of encryption and uses two keys: a public and a private key.
- The public key is given to anyone who wishes to send you encrypted data.
- This public key can only be used to encrypt information and not decrypt the information.
- The private key is used to decrypt the data, and only you have this key.
![Illustrative background for Public and private keys](https://image-v2.cdn.app.senecalearning.com/2018-07/af320d05-1647-446d-a75d-43de5454b148/Handingover-Keys-Displacing,h_400,q_80,w_640.jpg)
![Illustrative background for Public and private keys ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/af320d05-1647-446d-a75d-43de5454b148/Handingover-Keys-Displacing,h_400,q_80,w_640.jpg)
Public and private keys
Public and private keys
- The public and private key are related to one another through mathematical operations.
- The private key you set cannot be figured out from the public key.
Hashing
Hashing
Hashing can be used for both protecting data and for comparing files.
![Illustrative background for Hashing](https://image-v2.cdn.app.senecalearning.com/2020-08/d6ddd8eb-d807-42f8-a96c-994dea263866/Screenshot%202020-08-21%20at%2014.36.14-min,h_400,q_80,w_640.png)
![Illustrative background for Hashing ?? "content](https://image-v2.cdn.app.senecalearning.com/2020-08/d6ddd8eb-d807-42f8-a96c-994dea263866/Screenshot%202020-08-21%20at%2014.36.14-min,h_400,q_80,w_640.png)
Hashing
Hashing
- Hashing is the process of taking an input, performing some form of calculation on the input that outputs a value of fixed size.
- The output is known as a hash.
- The hash function has no inverse (non-invertible).
- This means hashing is extremely secure as you cannot reverse a hash to get back to the original data that was input.
![Illustrative background for Passwords](https://image-v2.cdn.app.senecalearning.com/2018-07/10e05be2-8d95-472e-9449-3c5e7078d4c6/Internet-wifi-Password-Screen-Computer-,h_400,q_80,w_640.jpg)
![Illustrative background for Passwords ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/10e05be2-8d95-472e-9449-3c5e7078d4c6/Internet-wifi-Password-Screen-Computer-,h_400,q_80,w_640.jpg)
Passwords
Passwords
- Hashing can be used to store passwords.
- When a user creates a password for an account, it is put through a hashing function and stored as the encrypted password.
- A password entered by a user to gain access to the account will be put through the same hashing function and compared to the stored password.
- No one can know your actual password by looking in the database.
![Illustrative background for Digital signatures](https://image-v2.cdn.app.senecalearning.com/2018-09/15529acd-c2f0-4b3b-add7-61a92095b62e/signature-signing-,h_400,q_80,w_640.jpg)
![Illustrative background for Digital signatures ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-09/15529acd-c2f0-4b3b-add7-61a92095b62e/signature-signing-,h_400,q_80,w_640.jpg)
Digital signatures
Digital signatures
- Hashing can also be used as a way of adding digital signatures to files.
- The hash output value can be encrypted with a private key and sent to someone else and they use the matching public key to decrypt.
- This way you know it has come from that one specific person.
1Components of a Computer
1.1Structure & Function of the Processor
1.2Types of Processors
2Software & Software Development
2.1Systems Software
2.2Applications Generation
2.3Software Development
3Exchanging Data
3.1Compression, Encryption & Hashing
3.3Networks
4Data Types, Data Structures & Algorithms
4.1Data Types
5Legal, Moral, Cultural & Ethical Issues
5.1Computing Related Legislation
6Elements of Computational Thinking
6.1Thinking Abstractly
6.2Thinking Procedurally
6.3Thinking Logically
7Problem Solving & Programming
7.1Programming Techniques
7.2Programming Construction
Jump to other topics
1Components of a Computer
1.1Structure & Function of the Processor
1.2Types of Processors
2Software & Software Development
2.1Systems Software
2.2Applications Generation
2.3Software Development
3Exchanging Data
3.1Compression, Encryption & Hashing
3.3Networks
4Data Types, Data Structures & Algorithms
4.1Data Types
5Legal, Moral, Cultural & Ethical Issues
5.1Computing Related Legislation
6Elements of Computational Thinking
6.1Thinking Abstractly
6.2Thinking Procedurally
6.3Thinking Logically
7Problem Solving & Programming
7.1Programming Techniques
7.2Programming Construction
![Go student ad image](/en-GB/revision-notes/_next/image?url=%2Fen-GB%2Frevision-notes%2Fimages%2Fgo-student-uk-ad.jpg&w=640&q=100)
Unlock your full potential with GoStudent tutoring
Affordable 1:1 tutoring from the comfort of your home
Tutors are matched to your specific learning needs
30+ school subjects covered