1.4.11

Encryption

Test yourself

Encryption

If sensitive data is going to be transferred, then it is important that we keep it secure from third parties.

Illustrative background for EncryptionIllustrative background for Encryption ?? "content

Encryption

  • Encrypting data is the process of scrambling data according to a specific algorithm so that it cannot be read by third parties.
  • Only the intended recipient will know how to decode the data.
Illustrative background for KeysIllustrative background for Keys ?? "content

Keys

  • A lot of encryption depends upon secret keys, which are shared secret pieces of data.
  • Keys are made up of a pair of very large prime numbers, either 256 or 1,024 bits long.
  • It would take an impractical amount of time to guess the key. So we say that the encryption is secure.
Illustrative background for Wireless communicationIllustrative background for Wireless communication ?? "content

Wireless communication

  • It is especially important to encrypt wireless communication.
  • Protocols exist for wireless communication, such as WiFi Protected Access version 2 (WPA2), which encrypt all traffic.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson