Encryption

Cards (8)

  • Encryption
    Encryption is the process of encoding data or a message so that it cannot be understood by anyone other than its intended recipient. In computer processing, encryption means that data can be stored and transmitted securely by the sending computer to the receiving computer. The data or message is encrypted using an encryption algorithm. The opposite of encryption is decryption.
    An encryption key is a piece of information - usually random characters - used by the software algorithm to encrypt data or a message into a form which is unreadable (encryption) and allow the data or message to be made readable again (decryption).
  • Encryption does not prevent someone from intercepting a message - instead it prevents them from being able to understand it.
  • There are many uses of encryption. These include:
    • Encrypting data stored on a laptop hard disk. This is important as a laptop might contain sensitive information and could be easily stolen. If the hard disk is encrypted, the information will be unreadable unless the thief also has the key. In this situation it is usually a username and password.
    • When sending sensitive information, such as passwords or credit card details, over the internet. When a website uses the HTTPS protocol (see the networks study guide for further details) the information being transferred is encrypted. This means that if the connection is intercepted, the information will be unreadable.
    • Encrypting a document, such as a spreadsheet, using software tools, before sending it to a colleague via the internet, for security purposes.
    • Encrypting satellite TV transmissions to prevent users who do not subscribe from watching TV shows.
  • Types of encryption
    There are many different types of encryption algorithms. They vary in complexity and how secure they are.
  • The Caesar cipher
    A simple method of encryption requires the use of a technique known as the Caesar cipher. The technique was invented by Julius Caesar who lived from 100BC to 44BC. The cipher works by giving a number value to a key. Each plaintext letter is replaced by a new letter - the one found at the original letter's position in the alphabet plus or minus the value of the key.
    For example, a key value of +three would change the plaintext message “see you tonight” to the ciphertext message “vhh brx wrqljkw”.
  • To decrypt the message, the process is reversed.
    Caesar ciphers are often shown using a Caesar cipher wheel diagram, to illustrate that when the end of the alphabet is reached it goes around again.
  • Today, much more complicated algorithms are used to encrypt messages. The Caesar cipher is very easy to decrypt without the key as it is so simple.
  • Asymmetric encryption - public and private keys
    Encryption is of little use if unauthorised users know the key. They can use it to decrypt any message that is encrypted with that key.
    One way around this issue is to use an algorithm that generates two keys - a public key and a private key.
    A public key can be given to anyone. Anyone can then use this key to encrypt a message. However, the public key cannot decrypt a message - only the second, private key can do that. So long as the private key is never given out, messages will stay safely encrypted.
    An encryption method that uses public and private keys in this way is known as asymmetric encryption. There are a number of different asymmetric encryption algorithms that are in use.
    Encryption methods that use the same key for encryption and decryption are known as symmetric encryption methods.