3.1.4

Encryption

Test yourself

Encryption

If sensitive data is going to be transferred, then it is important that we keep it secure from third parties.

Illustrative background for EncryptionIllustrative background for Encryption ?? "content

Encryption

  • Encrypting data is the process of scrambling data according to a specific algorithm so that it cannot be read by third parties.
  • Only the intended recipient will know how to decode the data.
Illustrative background for KeysIllustrative background for Keys ?? "content

Keys

  • A lot of encryption depends upon secret keys, which are shared secret pieces of data.
  • Keys are made up of a pair of very large prime numbers, either 256 or 1,024 bits long.
  • It would take an impractical amount of time to guess the key. So we say that the encryption is secure.
Illustrative background for Wireless communicationIllustrative background for Wireless communication ?? "content

Wireless communication

  • It is especially important to encrypt wireless communication.
  • Protocols exist for wireless communication, such as WiFi Protected Access version 2 (WPA2), which encrypt all traffic.

Jump to other topics

1Components of a Computer

2Software & Software Development

3Exchanging Data

4Data Types, Data Structures & Algorithms

5Legal, Moral, Cultural & Ethical Issues

6Elements of Computational Thinking

6.1Thinking Abstractly

6.2Thinking Ahead

6.3Thinking Procedurally

6.4Thinking Logically

6.5Thinking Concurrently

7Problem Solving & Programming

8Algorithms

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium