Ch. 1 — Data Representation
1.1 Number Systems 1.2 Text, Sound & Images 1.3 Data Storage & Compression
Ch. 2 — Data Transmission
2.1 Data Transmission 2.2 Error Checking 2.3 Encryption
Ch. 3 — Hardware
3.1 Computer Architecture 3.2 Input & Output Devices 3.3 Data Storage 3.4 Network Hardware
Ch. 4 — Software
4.1 Types of Software & Interrupts 4.2 Programming Languages & IDE
Ch. 5 — The Internet
5.1 Internet & World Wide Web 5.2 Digital Currency 5.3 Cyber Security
Ch. 6 — Emerging Tech
6.1 Automated Systems 6.2 Robotics 6.3 Artificial Intelligence
// All Chapters
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Home/ Paper 1/ 2.3 Encryption
2.3

2.3 Encryption

An algorithm is used to scramble data, making the data unreadable during transmission.

Plain Text & Ciphertext

  • Plain text: original data sent (no encoding)
  • Ciphertext: plaintext that has been encoded

State the purpose of encrypting data

  • Data becomes scrambled/unreadable.
  • If intercepted it will not be understood

Symmetric Encryption

  • Data is encrypted and decrypted using the same key/algorithm
  • Encryption algorithm is used
  • Data before encryption is known as plain text
  • Data after encryption is known as cipher text
  • Key is sent to receiver (to allow data to be decrypted)

Explain how data is encrypted using symmetric encryption

  • Data is encrypted and decrypted using the same key
  • Plain text is encrypted into cipher text
  • Data is encrypted using an algorithm
  • …that uses a key
  • The key can be generated using an algorithm
  • The key is transmitted to the receiver

Asymmetric Encryption

  • Asymmetric encryption was developed to overcome the security problems associated with symmetric encryption
  • Uses a public key and a private key
  • Public key is available to everyone
  • Private key only known by the computer user
  • Both keys are needed to encrypt and decrypt data

State differences and similarities between Symmetric and Asymmetric

Differences

  • Symmetric has a shared key…
  • …to encrypt and decrypt
  • Both the sender and receiver know the key
  • Asymmetric has different keys (public + private)
  • …public to encrypt the data and private to decrypt
  • …anyone can know the public key but only those intended know the private key

Similarities

  • They both use a key
  • They both scramble data
  • They both turn plain text to cipher text

SSL (Secure Sockets Layer)

State how SSL secures the data for transmission

  • It encrypts it
  • Uses digital certificates
The data for the web page is transmitted using SSL — Fill in the blanks:

The web browser asks the web server to identify itself. The web server sends back its digital certificate. The web browser authenticates the digital certificate.

If it is authentic, encrypted data transmission begins.