2.3 Encryption Flashcards
encrypt
convert plain text into cypher text
decrypt
convert back cypher text into plain text
plain text
data before it is encrypted
cipher text
data after it is encrypted
encryption
encoding data into a form that is meaningless using an algorithm
Does encryption prevent hackers from hacking or stop the data from being stolen?
Encryption doesn’t stop the data from being stolen. It just makes it very difficult for hackers to understand the data
Types of encryption
2
Asymmetric Encryption
Symmetric Encryption
Symmetric Encryption
- Data is encrypted and decrypted using the same key/algorithm.
- Encryption key is applied to plain text to convert it into cypher text.
- Key is sent to receiver to allow data to be decrypted
Asymmetric Encryption
- Uses a public key and a private key. The public key is available to everyone, whereas the private key is only available to the user.
- Both keys are needed to encrypt and decrypt information
- The receiver would have the private key, and they would send the public key to the sender. The sender can encrypt the message with the public key, and the data can be decrypted using the private key.
why asymmetric encryption is safer than symmetric encryption when sending data over the internet?
Asymmetric encryption is safer than symmetric encryption for internet data transfer because it uses two keys: a public key for encryption and a private key for decryption. This prevents the need to share the private key, reducing the risk of interception compared to symmetric encryption, which uses a single key for both processes.