0% found this document useful (0 votes)
14 views16 pages

Encryption

The document discusses encryption and how it protects data transmitted over public networks from interception. It explains symmetric and asymmetric encryption, providing examples of each. It also discusses how asymmetric encryption uses public and private keys to securely send messages between multiple parties.

Uploaded by

dapotatogamerz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views16 pages

Encryption

The document discusses encryption and how it protects data transmitted over public networks from interception. It explains symmetric and asymmetric encryption, providing examples of each. It also discusses how asymmetric encryption uses public and private keys to securely send messages between multiple parties.

Uploaded by

dapotatogamerz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Encryption

The purpose of encryption:

When data is transmitted over any public network (wired or wireless), there is always a risk of it being
intercepted by, for example, a hacker. Under these circumstances, a hacker is often referred to as an
eavesdropper. Using encryption helps to minimise this risk.
Plain text and Cipher text
Types of encryption

• Symmetric
• Asymmetric
Example:
• A 10-bit encryption key as:

• Let’s plain text is “COMPUTER SCIENCE IS EXCITING”.


• Asymmetric encryption overcomes the security problem by
introducing two keys:

• Public key (made available to everybody)


• Private key (only known to computer user)
• Example:
Suppose Tom and Jane works in the same company, and Tom wants
to send a confidential document to Janee.
ACTIVITY 2.8
More than 2 communicators:
QUIZ

You might also like