0478 Computer Science
Chpater 1 Number System
1.1 Number systems
1.2 Text, sound and images
1.3 Data storage and compression
Chapter 2 Data transmission
2.1 Types and methods of data transmission
2.2 Methods of error detection
2.3 Encryption
Chapter 3 Hardware
3.1 Computer architecture
3.2 Input and output devices
3.3 Data storage
3.4 Network hardware
Chapter 4 Software
4.1 Types of software and interrupts
4.2 Types of programming language, translators and integrated development environments (IDEs)
Chapter 5 The internet and its uses
5.1 The internet and the World Wide Web (WWW)
5.2 Digital currency
5.3 Cyber security
Chapter 6 Automated and emerging technologies
6.1 Automated systems
6.2 Robotics
6.3 Artificial intelligence (AI)
Chapter 7 Algorithm design and problem solving
7.1 The program development life cycle
7.2 Computer systems, sub-systems anddecomposition
未命名
未命名
Chapter 8 Programming
8.1 Programming concepts
8.2 Arrays
Mr. Theo
-
+
首页
2.3 Encryption
## Encryption - Encryption is a process of turning the data into an unreadable form so it doesn’t make sense to hackers and other attackers. ### **Plaintext and Ciphertext** - Plaintext is the original data that is being sent - Ciphertext is the text produced after encryption ### **Symmetric and Asymmetric Encryption** - Symmetric Encryption: - It uses an encryption key for the encryption process; the same key is used for encrypting and decrypting the data. - Asymmetric Encryption: - Uses a public key and a private key. The public key is available to everyone, whereas the private key is only available to the user. - The receiver would have the private key, and they would send the public key to the sender. The sender can encrypt the message with the public key, and the data can be decrypted using the private key.
Theo
2025年5月30日 12:07
转发文档
收藏文档
上一篇
下一篇
手机扫码
复制链接
手机扫一扫转发分享
复制链接
Markdown文件
Word文件
PDF文档
PDF文档(打印)
分享
链接
类型
密码
更新密码
有效期