0478 Computer Science
Chpater 1 Number System
1.1 Number systems
1.2 Text, sound and images
1.3 Data storage and compression
Chapter 2 Data transmission
2.1 Types and methods of data transmission
2.2 Methods of error detection
2.3 Encryption
Chapter 3 Hardware
3.1 Computer architecture
3.2 Input and output devices
3.3 Data storage
3.4 Network hardware
Chapter 4 Software
4.1 Types of software and interrupts
4.2 Types of programming language, translators and integrated development environments (IDEs)
Chapter 5 The internet and its uses
5.1 The internet and the World Wide Web (WWW)
5.2 Digital currency
5.3 Cyber security
Chapter 6 Automated and emerging technologies
6.1 Automated systems
6.2 Robotics
6.3 Artificial intelligence (AI)
Chapter 7 Algorithm design and problem solving
7.1 The program development life cycle
7.2 Computer systems, sub-systems anddecomposition
7.5 Validation and verification
7.6 Test data
Pseudocode
Chapter 8 Programming
8.1 Programming concepts
8.2 Arrays
pseudocode practice
Mr. Theo
-
+
首页
2.3 Encryption
## Encryption - Scrambles data for secure transmission. - ... making data meaningless/unintelligible so it doesn’t make sense to hackers and other attackers. - Uses an algorithm / key - Data / plain text is changed to cipher text ### How encryption improves data security - Encrypted text is meaningless - Need the key to decrypt the text ## purpose of encrypting data - To help keep the data secure - To make the data meaningless - If the data is intercepted, it cannot be understood ### how to make the encryption more secure - Increase the length of the key - Uses a more complex encryption algorithm ## how to increase the level of security provided by the encryption - Increase length / more bits used for key - It will have less chance of decryption by brute force method ### **Plaintext and Ciphertext** - Plaintext is the original data that is being sent - Ciphertext is the text produced after encryption ### **Symmetric and Asymmetric Encryption** ### Symmetric Encryption: - It uses an encryption key for the encryption process; the same key is used for encrypting and decrypting the data. #### How data is encrypted using symmetric encryption - Plain text is encrypted into cipher text // cipher text is decrypted into plain text - Data is encrypted using an algorithm that uses a key - The key can be generated using an algorithm - The key is transmitted to the receiver ### how the data is encrypted - Encryption key is used - Encryption algorithm is used - Encryption key / algorithm is applied to plain text to convert it into cypher text - Same key is used to encrypt and decrypt the text ### Asymmetric Encryption: - Uses a public key and a private key. The public key is available to everyone, whereas the private key is only available to the user. - The receiver would have the private key, and they would send the public key to the sender. The sender can encrypt the message with the public key, and the data can be decrypted using the private key. Data is encrypted using an encryption key. This is a type of **algorithm** that scrambles the **plain** **text** and turns it into **cipher** **text**. This makes the data **meaningless**. A **public/private** key is used to encrypt the data. This key cannot be used to decrypt the data. A **private/public** key is used to decrypt the data. Any device is able to request the **public** key, but only your device knows the **private** key. ### similarity between symmetric encryption and asymmetric encryption: - They both use a key - They both scramble(打乱) the data - They both turn plain text into cypher text ### differences between symmetric encryption and asymmetric encryption: - Symmetric uses one key whereas asymmetric uses two keys - Symmetric sends the key with the data whereas asymmetric does not - Symmetric decrypts the data using the same key whereas asymmetric decrypts the data using a different key ### why a person would use asymmetric encryption instead of symmetric encryption. - The process is more secure. - Do not need to worry about key exchange.
Theo
2026年1月12日 10:21
转发文档
收藏文档
上一篇
下一篇
手机扫码
复制链接
手机扫一扫转发分享
复制链接
Markdown文件
Word文件
PDF文档
PDF文档(打印)
分享
链接
类型
密码
更新密码
有效期