Save
Computing GCSE
Wired and Wireless Networks
Encryption
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Chloe Lynch
Visit profile
Cards (13)
Primarily used to protect data in case it has been hacked/accessed
illegally
Data being transmitted over Internet is
vulnerable
to hackers
Encryption will not prevent
hacking
but it makes the data
incomprehensible
unless the recipient has the necessary decryption tools
Plaintext
the original message to be
encrypted
Ciphertext
the
encrypted
message
Encryption
the process of
converting
plaintext into
ciphertext
Key
a sequence of letter, numbers and other characters used to
encrypt
or
decrypt
Encryption Algorithm
the method for
encrypting
the
plaintext
Symmetric
encryption
uses a
secret key
which can be a combination of letters,
numbers
and other characters
a single key is used to encrypt and
decrypt
a
message
and must be given to the recipient of your message so that they can decrypt and read it
Example of symmetric encryption
Caesar shift cipher
Caesar shift cipher
each letter is
replaced
by a letter 'n' number of positions further on in the
alphabet
'n' can be any number but it will remain the
same
for one
message
Asymmetric encryption
number of
risks
if
encryption key
falls into wrong hands
more secure method to use it
public key
encryption or
asymmetric
encryption
Public Key Encryption
private
key and
public
key needed
User A receives
public
key and a
private key
from a certificate authority
User B uses
public key
sent to them by User A to send n
encrypted
message
User A then
decrypts
the message using their
private
key which is not shared with anyone else