iGCSE Computer Science
  • Introduction
  • Past Papers
    • Set of 2019
    • Set of 2021
  • Pre-Exam Notes
    • Paper 1
    • Paper 2
  • Data Representation
    • 1.1 Number Systems
    • 1.2 Text, Sound & Images
    • 1.3 Data Storage & File Compression
  • Data Transmission
    • 2.1 Types & Methods of Data Transmission
    • 2.2 Methods of Error Detection
    • 2.3 Symmetric & Asymmetric Encryption
  • Hardware
    • 3.1 Computer Architecture
    • 3.2 Input & Output Devices
    • 3.3 Data Storage
    • 3.4 Network Hardware
  • Software
    • 4.1 Types of Software & Interrupts
    • 4.2 Types of Programming Languages, Translators & IDEs
  • The Internet & Its Uses
    • 5.1 The Internet & The World Wide Web
    • 5.2 Digital Currency
    • 5.3 Cyber Security
  • Automated & Emerging Technologies
    • 6.1 Automated Systems
    • 6.2 Robotics
    • 6.3 Artificial Intelligence
  • Databases (P2)
    • 9.1 Databases
  • Boolean Logic (P2)
    • 10.1 Logic Gates
  • Miscellaneous (P2)
    • Flowchart Symbols
    • Standard Methods of Solution
    • Validation & Verification
    • Identifying Errors
Powered by GitBook
On this page
  • Threats
  • Encryption
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashed Encryption Keys
  • Exam Questions

Was this helpful?

  1. Data Transmission

2.3 Symmetric & Asymmetric Encryption


Threats

Threats come in various forms and include malware, viruses, spyware, DOS attacks, SQL injection and much more. Hackers try to gain unlawful or unauthorised access to computer and networks by looking for weaknesses in the system. They can use a to read transmitted data and it is therefore why encryption is done.


Encryption

Encryption involves encoding data into a form that is not useful unless it is passed through an algorithm. Once encrypted, data can be decrypted by a . There are two main types of encryption:

  1. Symmetric encryption

  2. Asymmetric encryption

Sample answer:

Encryption key is used Encryption algorithm is used Encryption key / algorithm is applied to the plaintext It is converted into ciphertext using that key / algorithm It is also decrypted using the same key / algorithm

Symmetric Encryption

  • Both parties are given an identical secret key which can be used to either encrypt or decrypt data

  • A hacker can steal the key which is a disadvantage

How it works?

  • Once a key is generated the sender applies it to the plaintext and sends the ciphertext

  • The receiver receives the ciphertext and applies the key to get the plaintext

Asymmetric Encryption

  • Two keys are used, a and public key

  • Both keys are needed to encrypt and decrypt the data

  • Only 1 private key can be used to decrypt the message

How it works?

  • Person A uses a public key to encrypt their message

  • Person A send the message

  • Person B decrypts the message using the private key


Hashed Encryption Keys

  • These can be created manually, randomly, or via an algorithm.

  • Strong encryption keys are created using a .

  • SHA-2 is an example of a hashing algorithm

Why use them?

  • Hashing algorithms are many-to-one. This means that many different inputs can produce the same hash output.

  • Means that a hacker must first un-hash the key before it is useful

  • As hashing algorithms are un-reversible, this is really difficult

  • Due to the complexity of these algorithms, computing power is not enough to de-hash these keys


Exam Questions


Previous2.2 Methods of Error DetectionNext3.1 Computer Architecture

Last updated 7 months ago

Was this helpful?

COPYRIGHT -> SAVEMYEXAMS