3.4.1

Encryption

Test yourself

Encryption

If sensitive data is going to be transferred, then it is important that we keep it secure from third parties.

Illustrative background for EncryptionIllustrative background for Encryption ?? "content

Encryption

  • Encrypting data is the process of scrambling data according to a specific algorithm so that it cannot be read by third parties.
  • Only the intended recipient will know how to decode the data.
Illustrative background for KeysIllustrative background for Keys ?? "content

Keys

  • A lot of encryption depends upon secret keys, which are shared secret pieces of data.
  • Keys are made up of a pair of very large prime numbers, either 256 or 1,024 bits long.
  • It would take an impractical amount of time to guess the key. So we say that the encryption is secure.
Illustrative background for Wireless communicationIllustrative background for Wireless communication ?? "content

Wireless communication

  • It is especially important to encrypt wireless communication.
  • Protocols exist for wireless communication, such as WiFi Protected Access version 2 (WPA2), which encrypt all traffic.

Jump to other topics

1Problem Solving

2Programming

3Data

4Computers

5Communication & The Internet

6The Bigger Picture

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium