Skip to content

Encrption

Alt text

Encryption

  • A hacker is often referred to as an eavesdropper. Using encryption helps to minimise this risk.

  • The original data being sent is known as plaintext. Once it has gone through an encryption algorithm, it produces ciphertext:

Alt text

Symmetric encryption

  • Symmetric encryption uses an encryption key; the same key is used to encrypt and decrypt the encoded message.

  • Suppose our encryption key is: 4 2 9 1 3 6 2 8 5 6

Alt text

Asymmetric encryption

  • Asymmetric encryption was developed to overcome the security problems associated with symmetric encryption.
  • It makes use of two keys called the public key and the private key.
StepProcess
1Alt text
2Tom now uses Jane’s public key ( ) to encrypt the document he wishes to send to her
3Alt text
4Jane uses her matching private key ( ) to unlock Tom’s document and decrypt it