3.4: encryption Flashcards
what is encryption
the process of converting data into a form that cannot be understood by anyone other than an authorised user
does not prevent data from being acessed but prevents data from being understood
what is required to decrypt a message
the encryption method and the key
how are keys created
from number using binary digits
key length
the number of binary digits used
the longer the key length the more possible combinations
how are keys generated
by computers
brute force attack
when computers try and deteremine what keys have been used by genererating every possible combination in a key length
how many bit keys do modern encryption methods use
128 bit keys
why are 128 bit keys used
because it gives a range of combinations too big for a computer to generate every possible combination
symetric encryption
the same key is used to encrypt and decrypt the message
this means that 2 people with the key can share messages
problem with symetric keys
messages sent over a network can be intercepted
therefore if the key is known by unauthorised users the encryption is useless
asymetric encryption
uses 2 keys that work as a pair
the first key is used to encrypt the message
the second key is used to decrypt the message
the first key in asymetric encryption
used to encrypt the message
can be sent to anyone from who the user wants to recieve an encrypted message
the second key in asymetric encryption
kept secret by the user so that only they know it
called a private key
as long as the private key is kept secret the encryption is very difficult to break
uses of asymetric encryption
used by organisations who need to send confidential data for example:
banks
online shops
how asymetric encryption works
when a user logs onto a banks website a copy of the banks public key is downloaded to the users browser
any communications sent from the bank to the user are encrypted with the private key
the users browser decrypts the private key using the public key
same works vice versa