2.3 Encryption
-an algorithm is used to scramble data
-making the data unreadable during transmission
Plain Text
- original data sent (no encoding)
Cyphertext
- plaintext that has been encoded
State the purpose of encrypting data
- Data becomes scrambled/unreadable.
- If intercepted it won’t be understood
Symmetric encryption:
- Data is encrypted and decrypted using the same key/algorithm
- Encryption algorithm is used
- Data before encryption is known as plain text
- Data after encryption used is known as cypher text
- Key is sent to receiver(to allow data to be decrypted
Asymmetric encryption
- Asymmetric encryption was developed to overcome the security problems associated with symmetric encryption
- Uses a public key and a private key
- Public key is available to everyone
- Private key only known by the computer user
- Both keys are needed to encrypt and decrypt data
State differences between symmetric and assymetric
- Symmetric has a shared key..
- …to encrypt and decrypt
- both the sender and receiver know the key
- Asymetric has different kes (public + private)
- …public to encrypt the data and private to decrypt
- …anyone can know the public key but only those inteded know the private key
State similarities between symmetric and assymetric
- They both use a key
- They both scramble data
- They both turn plain text to cypher text
Explain how data is encrypted using symmetric encryption
- Data us encrypted and decrypted using the same key
- plain text is encrypted into cipher text
- Data is encrypted using an algorithm…
- …that uses a key
- The key can be generated using an algorithm
- The key is transmitted to the receiver
State how SSL secures the data for transmission
- It encrypts it
- Uses digital certificates
The data for the web page is transmitted using SSL Fill in the blanks:
The web browser asks the web server to identify itself. The web server sends back its digital certificate. The web browser authenticates the digital certificate.
If it is authentic, encrypted data transmission begins