2.3 Encryption

-an algorithm is used to scramble data
-making the data unreadable during transmission

Plain Text

Cyphertext

State the purpose of encrypting data

  • Data becomes scrambled/unreadable.
  • If intercepted it won’t be understood

Symmetric encryption:

Asymmetric encryption

State differences between symmetric and assymetric

  • Symmetric has a shared key..
  • …to encrypt and decrypt
  • both the sender and receiver know the key
  • Asymetric has different kes (public + private)
  • …public to encrypt the data and private to decrypt
  • …anyone can know the public key but only those inteded know the private key

State similarities between symmetric and assymetric

  • They both use a key
  • They both scramble data
  • They both turn plain text to cypher text

Explain how data is encrypted using symmetric encryption

  • Data us encrypted and decrypted using the same key
  • plain text is encrypted into cipher text
  • Data is encrypted using an algorithm
  • …that uses a key
  • The key can be generated using an algorithm
  • The key is transmitted to the receiver

State how SSL secures the data for transmission

  • It encrypts it
  • Uses digital certificates

The data for the web page is transmitted using SSL Fill in the blanks:

The web browser asks the web server to identify itself. The web server sends back its digital certificate. The web browser authenticates the digital certificate.

If it is authentic, encrypted data transmission begins