0% found this document useful (0 votes)
2 views13 pages

T1 Wk 3 Encryptn and Crypto Cur

Uploaded by

Tumi Ogunkoya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views13 pages

T1 Wk 3 Encryptn and Crypto Cur

Uploaded by

Tumi Ogunkoya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Encryption

OBJECTIVES – To:
 Explain the meaning of encryption
 Mention the two types of encryption
 Evaluate the features of encryption
 Discuss the differences between the two
types

Success criteria: The students have done


encryption in keystage 3.

Keywords: encryption, symmetric, asymmetric


ENCRYPTION KEYWORDS
Encryption: Method of securing data before transmission, by
scrambling it to make it meaningless to
unauthorized users

Plain text: Message before encryption or after decryption

Cipher text: Message once it has been encrypted or after


transmission

Encryption key: A type of algorithm (secret information) that is


used to encrypt data

Algorithm: A sequence of steps or instructions to solve a


problem 2
Encryption
Encryption is the process of converting plaintext
(readable data) into cipher text (unreadable data) using
an algorithm and a key.
Encryption allows devices to send messages to each
other securely.
It is a fundamental technique used in cybersecurity to
safeguard data privacy and confidentiality.
Note: encryption does not stop hacking, but makes
the stolen text meaningless
Types of encryption

Symmetric: A type of encryption that uses


the same key to encrypt and
decrypt data

Asymmetric: A type of encryption that uses


different keys to encrypt and
decrypt data

4
Symmetric Encryption
Symmetric encryption is the
oldest and best-known technique.

A secret key can be a number, a


word, or just a string of random
letters, is applied to the text of a
message to change the content in
a particular way.

This might be as simple as shifting


each letter by a number of places
in the alphabet.
Asymmetric Encryption

An advanced algorithm is used to


generate a public/private key pair.

Public keys are shared and anyone can


use them to encrypt information to send
to you.

Only the private key can decrypt the


information.

The public/private keys are generated by


one algorithm but …The private key
cannot be calculated using the public key.
Digital currency
OBJECTIVES – To:
 Mention the application of block chain technology
 Explain the concept of cryptography
 Evaluate the features of block chain technology
 Discusshow block chain works with digital
currency.

Success criteria: The students have heard of crypto


currency.

Keywords: blockchain, digital currency, crypto


currency, cryptography
Digital currency
Cryptocurrency is a digital or virtual currency that is
meant to be a medium of exchange for goods and
services.
Features of digital currency;
 It does not have a physical means of exchange
 There is a limit of how many can be produced.
 It works independent of banks
 New units are added after certain conditions are met
 It works with technology called cryptography
 It is easier and faster to confirm transactions
 Little or no transaction cost
 24 hours access to funds
 Not limit on purchases
 Open to anyone to use
 International transactions are faster
Cryptography
Cryptography is a method of using encryption
and decryption to secure communication in the
presence of a third party to prevent hacking and
fraud.

Features of Cryptography
 It usually requires a computational algorithm
 A public key (which the user shares
with everyone)
 A private key (which acts a digital
 signature of the user)
Block chain technology
Block chain is not just a technology that powers bitcoin. It is
capable of doing more.
It is a suite of distributed ledger technologies across peer to
peer network, that can be programmed to record and track
anything of value, e.g;
 Financial transaction
 Medical records
 Land titles
 Voting
Features of blockchain
 It stores and track data in batches called blocks, that are
linked together in a chronological fashion to form a
continuous line.
 It is a non-destructive way to track data over time.
 It create trust in data
 No intermediaries needed, like banker, lawyer, etc. One

You might also like