Information Security 05 - Encryption
Information Security 05 - Encryption
encrypted message.
Encryption
cont… Key
• Cipher: When used asTerms
a verb, the transformation of the
individual components (characters, bytes, or bits) of an
unencrypted message into encrypted components or vice
versa;
commencing communication.
Encryption
cont… Key
Terms8. RC6
• Symmetric Encryption Algorithms types:
• The public key can be sent to other people, while the private
• Those with the public key can then verify the message,
safe in the knowledge that the original message came
from the sender's private key.
Encryption
cont… Key
Terms
• Public and private keys also play an essential role in digital signatures,
whereby a
sender can sign their message with their private encryption key.
• Those with the public key can then verify the message, safe in the
knowledge that the original message came from the sender's private
key.
• A key pair is the mathematically linked public and private key generated
by an encryption algorithm.
Encryption
cont… Key
Terms
• HTTPS: Hyper Text Transfer Protocol Secure (HTTPS) is a
now widely
implemented security upgrade for the HTTP application protocol
• Well, this means that the private key used for encoding and
decoding your messages never leaves your device, in
turn ensuring that no one but you can send messages using