Data Encryption
1.9
Describe encryption and its importance
SLO # 1.9.1
What is Encryption and Why is it Important?
Encryption is a method of protecting information by converting it into a code
that can only be read or decoded by someone who has the correct key. Think
of it like locking a message in a secret box, where only the person with the
key can open the box and read the message inside.
Encryption is important for several reasons
Privacy: It ensures that only the intended recipient can read your message.
This helps protect personal and sensitive information from being stolen or
accessed by unauthorized people.
Security: Encryption keeps your data safe when it’s being transmitted over
the internet. For example, when you log in to a website, encryption ensures
that your password and personal information are protected.
Integrity: Encryption also helps verify that data has not been tampered with.
If the encrypted message changes in any way, the recipient will know that it’s
no longer valid.
Relate The Terms Cryptography And Encryption
SLO # 1.9.2
What is Cryptography and How is it Related to
Encryption?
Cryptography: This is the broader study of secure communication methods,
which involves both encryption and decryption. It includes techniques for
transforming information into a secret code (encryption) and changing it back
to its original form (decryption) when needed.
Encryption: Encryption is just one part of cryptography. It refers to the actual
process of changing data into a secret code.
In short:
Cryptography = the entire science of securing information.
Encryption = the process of encoding data to protect it.
Compare the following types of encryption
techniques in terms of speed, key management,
and use cases:
a. symmetric
b. asymmetric
SLO # 1.9.3
Types of Encryption
There are two main types of encryption: symmetric encryption and
asymmetric encryption. Let’s compare them based on speed, key
management, and use cases.
Symmetric Encryption
In symmetric encryption, the same key is used to both encrypt and decrypt
the data. This means that both the sender and the receiver must have the
same secret key. It’s like using the same lock and key to secure and open a
box.
Speed
Symmetric encryption is generally faster than asymmetric encryption. This is
because the encryption process is simpler, as it uses only one key.
Symmetric Encryption
Key Management
• The main problem with symmetric encryption is key management. If
someone intercepts the key, they can decrypt the message. So, both the
sender and the receiver must securely exchange the key before
communication begins. Keeping the key secret is critical.
• If the key is lost, it’s impossible to decrypt the message.
Symmetric Encryption
Use Cases
• Symmetric encryption is often used for encrypting large amounts of data
quickly. It is commonly used in file encryption (e.g., encrypting a file on your
computer), database encryption, or securing data on a hard drive.
Example
• AES (Advanced Encryption Standard) is one of the most common
symmetric encryption algorithms.
Asymmetric Encryption
In asymmetric encryption, two different keys are used: a public key and a
private key. The public key is used to encrypt the data, and the private key is
used to decrypt it. The public key can be shared openly, while the private key
is kept secret by the recipient.
Speed
Asymmetric encryption is slower than symmetric encryption. This is because
it involves more complex mathematical calculations to generate the two keys
and to encrypt/decrypt data.
Asymmetric Encryption
Key Management
• The main advantage of asymmetric encryption is that it solves the key
distribution problem. You don’t need to share the private key; you only
share the public key. This makes key management much easier and more
secure.
• The private key is kept secret by the recipient, while the public key can be
distributed freely.
Asymmetric Encryption
Use Cases
Asymmetric encryption is used in applications like securing email (PGP),
online banking, and SSL/TLS (which secures websites).
It's also used in digital signatures, where a message can be signed using the
sender’s private key to verify the message's authenticity.
Example
RSA (Rivest–Shamir–Adleman) is one of the most widely known asymmetric
encryption algorithms.
Symmetric vs. Asymmetric Encryption
Feature Symmetric Encryption Asymmetric Encryption
Speed Fast (simpler encryption) Slower (more complex encryption)
Harder (same key for encryption and Easier (uses two keys: public and
Key Management
decryption) private)
File encryption, database encryption, Secure communication (emails,
Use Cases
securing storage websites), digital signatures