Save
A-level Computer Science
School Notes
Symmetric and Asymmetric Encryption
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Ana Saker
Visit profile
Cards (22)
What are the two types of encryption mentioned?
Symmetric
and
asymmetric
encryption
View source
How does asymmetric encryption function?
It uses
different
keys
for
encryption
and
decryption
View source
What is the key feature of symmetric encryption?
It uses the
same
key
for
encryption
and
decryption
View source
When is symmetric encryption most appropriate to use?
When
data
will
not
be
transmitted
View source
What is an advantage of symmetric encryption?
The
encryption algorithm
runs
more
quickly
View source
How does modern encryption compare to pre-computer era encryption?
It is
many
orders
stronger
View source
What is a characteristic of asymmetric encryption algorithms?
They
involve
more
processing
than
symmetric algorithms
View source
How can modern encryption be used by the general public?
Without
specialist
knowledge
,
often
unknowingly
View source
In what scenario is asymmetric encryption commonly used?
When
exchanging
sensitive
data
like
credit card
details
View source
When is symmetric encryption best suited?
When the
same
person
encrypts
and
decrypts
View source
What has the strength of encryption enabled on the Internet?
Widespread
use
and
support
for
e-commerce
View source
What is a consequence of modern encryption for governments?
They
struggle
to
crack
intercepted
messages
View source
What level of privacy does modern encryption provide individuals?
Unprecedented
levels
of
privacy
View source
What is a downside of modern encryption for communication?
Nefarious
purposes
can be
conducted
undetected
View source
What is the difference between symmetric encryption, asymmetric encryption, and hashing?
Symmetric encryption:
same
key
for
encryption
and
decryption
Asymmetric encryption:
two
keys
(
public
and
private
) for
encryption
and
decryption
Hashing:
one-way
process
,
non-reversible
,
produces
a
fixed
value
View source
What does encryption do to data?
It
converts
data
into
ciphertext
View source
What is the purpose of hashing?
To
verify
information
without
revealing
it
View source
How does symmetric encryption benefit robot data storage?
No
keys
need
to be
shared
or
transmitted
View source
What is a benefit of asymmetric encryption in robot communication?
Only the
public key
needs
to be
shared
View source
How can asymmetric encryption verify the identity of a sender?
By using the
public key
for
encryption
View source
What is a limitation of hashing?
It
cannot
return
data
to the
original
form
View source
Why is encryption useful for data transmission?
Intercepted
data
cannot
be
decrypted
without
the
key
View source