Data Transmission: Encryption: Understand How Data Is Encrypted Using Symmetric And Asymmetric Encryption (Copy)
| Concept | Data Encryption |
|---|---|
| Definition | Process of converting plain text into cipher text |
| Purpose | Prevents unauthorised access |
| Requirement | Encryption key |
| Encryption Types | Description |
|---|---|
| Symmetric | Same key used to encrypt and decrypt |
| Asymmetric | Different keys used (public & private) |
| Symmetric Encryption | Key Points |
|---|---|
| Keys Used | One shared secret key |
| Speed | Fast |
| Security Issue | Key must be shared securely |
| Used For | Large data volumes |
| Symmetric Process | Step |
|---|---|
| 1 | Sender encrypts data using secret key |
| 2 | Encrypted data sent |
| 3 | Receiver decrypts using same key |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Symmetric Examples | Use |
|---|---|
| AES | Secure data storage |
| DES | Older encryption systems |
| Asymmetric Encryption | Key Points |
|---|---|
| Keys Used | Public key + Private key |
| Public Key | Shared openly |
| Private Key | Kept secret |
| Speed | Slower than symmetric |
| Asymmetric Process | Step |
|---|---|
| 1 | Receiver shares public key |
| 2 | Sender encrypts using public key |
| 3 | Receiver decrypts using private key |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Asymmetric Examples | Use |
|---|---|
| RSA | Secure key exchange |
| HTTPS | Secure web communication |
| Symmetric vs Asymmetric | Symmetric | Asymmetric |
|---|---|---|
| Keys | One | Two |
| Speed | Fast | Slower |
| Key Sharing | Risky | Secure |
| Best For | Bulk data | Secure exchange |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Why Both Are Used Together | Reason |
|---|---|
| Asymmetric | Securely shares secret key |
| Symmetric | Encrypts actual data efficiently |
| Real-World Example | Explanation |
|---|---|
| HTTPS | Public key sets session key |
| File Transfer | Symmetric encrypts file |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
| Common Examiner Traps | How To Avoid |
|---|---|
| Mixing key usage | State which key does what |
| Saying symmetric is insecure | Mention key sharing issue |
| Ignoring speed difference | Compare clearly |
| No examples | Quote AES / RSA |
| One-Line Summary | Exam-Perfect Statement |
|---|---|
| Symmetric | Same key encrypts and decrypts |
| Asymmetric | Public encrypts, private decrypts |
| Security | Prevents unauthorised access |
Written and Compiled By Sir Hunain Zia (AYLOTI), World Record Holder With 154 Total A Grades, 7 Distinctions and 11 World Records For Educate A Change O Level And IGCSE Computer Science Full Scale Course
