1.2.6

Encryption

Test yourself

Encryption

If sensitive data is going to be transferred, then it is important that we keep it secure from third parties.

Illustrative background for EncryptionIllustrative background for Encryption ?? "content

Encryption

  • Encrypting data is the process of scrambling data according to a specific algorithm so that it cannot be read by third parties.
  • Only the intended recipient will know how to decode the data.
Illustrative background for KeysIllustrative background for Keys ?? "content

Keys

  • A lot of encryption depends upon secret keys, which are shared secret pieces of data.
  • Keys are made up of a pair of very large prime numbers, either 256 or 1,024 bits long.
  • It would take an impractical amount of time to guess the key. So we say that the encryption is secure.
Illustrative background for Wireless communicationIllustrative background for Wireless communication ?? "content

Wireless communication

  • It is especially important to encrypt wireless communication.
  • Protocols exist for wireless communication, such as WiFi Protected Access version 2 (WPA2), which encrypt all traffic.

Symmetric Encryption

The use of encryption is vital to protect our private information. One type of encryption is symmetric encryption.

Illustrative background for Symmetric encryptionIllustrative background for Symmetric encryption ?? "content

Symmetric encryption

  • Symmetric or private key encryption is used to encrypt data for transmission.
  • A private key is used to convert plain text into cypher text.
  • This cypher text and private key are then transferred to another location or person.
  • The key is then used to decrypt the cypher back into plain text.
Illustrative background for SecurityIllustrative background for Security ?? "content

Security

  • Using a single key to encrypt and decrypt text proposes a massive flaw in security, as anyone with the key can decrypt the cypher.
  • As with passwords, the longer the encryption key, the less likely it is to be compromised by brute force, and so the more secure the encryption.

Jump to other topics

1Computer Systems

1.1Data Representation

1.2Data Transmission

1.3Hardware

1.4Software

1.5The Internet & its Uses

1.6Cyber Security

1.7Automated & Emerging Technologies

2Algorithms, Programming & Logic

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium