Data is encrypted and decrypted using the same key/algorithm
Encryption algorithm is used
Data before encryption is known as plain text
Data after encryption is known as cipher text
Key is sent to receiver (to allow data to be decrypted)
Explain how data is encrypted using symmetric encryption
Data is encrypted and decrypted using the same key
Plain text is encrypted into cipher text
Data is encrypted using an algorithm... that uses a key
The key can be generated using an algorithm
The key is transmitted to the receiver
Asymmetric Encryption
Asymmetric encryption was developed to overcome the security problems associated with symmetric encryption
Uses a public key and a private key
Public key is available to everyone
Private key only known by the computer user
Both keys are needed to encrypt and decrypt data
State differences and similarities between Symmetric and Asymmetric
Differences
Symmetric has a shared key... to encrypt and decrypt
Both the sender and receiver know the key
Asymmetric has different keys (public + private) public to encrypt the data and private to decrypt anyone can know the public key but only those intended know the private key
Similarities
They both use a key
They both scramble data
They both turn plain text to cipher text
SSL (Secure Sockets Layer)
State how SSL secures the data for transmission
It encrypts it
Uses digital certificates
**The data for the web page is transmitted using SSL --- Fill in the
blanks:**
The web browser asks the web server to identify itself. The web server sends back its digital certificate. The web browser authenticates the digital certificate.
If it is authentic,encrypted data transmission begins.