KEMBAR78
1.9 Data Encryption | PDF | Public Key Cryptography | Key (Cryptography)
0% found this document useful (0 votes)
11 views15 pages

1.9 Data Encryption

Uploaded by

tara sana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views15 pages

1.9 Data Encryption

Uploaded by

tara sana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Data Encryption

1.9
Describe encryption and its importance

SLO # 1.9.1
What is Encryption and Why is it Important?

Encryption is a method of protecting information by converting it into a code


that can only be read or decoded by someone who has the correct key. Think
of it like locking a message in a secret box, where only the person with the
key can open the box and read the message inside.
Encryption is important for several reasons

Privacy: It ensures that only the intended recipient can read your message.
This helps protect personal and sensitive information from being stolen or
accessed by unauthorized people.
Security: Encryption keeps your data safe when it’s being transmitted over
the internet. For example, when you log in to a website, encryption ensures
that your password and personal information are protected.
Integrity: Encryption also helps verify that data has not been tampered with.
If the encrypted message changes in any way, the recipient will know that it’s
no longer valid.
Relate The Terms Cryptography And Encryption

SLO # 1.9.2
What is Cryptography and How is it Related to
Encryption?
Cryptography: This is the broader study of secure communication methods,
which involves both encryption and decryption. It includes techniques for
transforming information into a secret code (encryption) and changing it back
to its original form (decryption) when needed.

Encryption: Encryption is just one part of cryptography. It refers to the actual


process of changing data into a secret code.

In short:
Cryptography = the entire science of securing information.
Encryption = the process of encoding data to protect it.
Compare the following types of encryption
techniques in terms of speed, key management,
and use cases:
a. symmetric
b. asymmetric

SLO # 1.9.3
Types of Encryption

There are two main types of encryption: symmetric encryption and


asymmetric encryption. Let’s compare them based on speed, key
management, and use cases.
Symmetric Encryption

In symmetric encryption, the same key is used to both encrypt and decrypt
the data. This means that both the sender and the receiver must have the
same secret key. It’s like using the same lock and key to secure and open a
box.

Speed
Symmetric encryption is generally faster than asymmetric encryption. This is
because the encryption process is simpler, as it uses only one key.
Symmetric Encryption

Key Management
• The main problem with symmetric encryption is key management. If
someone intercepts the key, they can decrypt the message. So, both the
sender and the receiver must securely exchange the key before
communication begins. Keeping the key secret is critical.

• If the key is lost, it’s impossible to decrypt the message.


Symmetric Encryption

Use Cases
• Symmetric encryption is often used for encrypting large amounts of data
quickly. It is commonly used in file encryption (e.g., encrypting a file on your
computer), database encryption, or securing data on a hard drive.

Example
• AES (Advanced Encryption Standard) is one of the most common
symmetric encryption algorithms.
Asymmetric Encryption

In asymmetric encryption, two different keys are used: a public key and a
private key. The public key is used to encrypt the data, and the private key is
used to decrypt it. The public key can be shared openly, while the private key
is kept secret by the recipient.

Speed
Asymmetric encryption is slower than symmetric encryption. This is because
it involves more complex mathematical calculations to generate the two keys
and to encrypt/decrypt data.
Asymmetric Encryption
Key Management
• The main advantage of asymmetric encryption is that it solves the key
distribution problem. You don’t need to share the private key; you only
share the public key. This makes key management much easier and more
secure.

• The private key is kept secret by the recipient, while the public key can be
distributed freely.
Asymmetric Encryption
Use Cases
Asymmetric encryption is used in applications like securing email (PGP),
online banking, and SSL/TLS (which secures websites).
It's also used in digital signatures, where a message can be signed using the
sender’s private key to verify the message's authenticity.

Example
RSA (Rivest–Shamir–Adleman) is one of the most widely known asymmetric
encryption algorithms.
Symmetric vs. Asymmetric Encryption

Feature Symmetric Encryption Asymmetric Encryption

Speed Fast (simpler encryption) Slower (more complex encryption)

Harder (same key for encryption and Easier (uses two keys: public and
Key Management
decryption) private)

File encryption, database encryption, Secure communication (emails,


Use Cases
securing storage websites), digital signatures

You might also like