Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16
Can you read this?
Encryption Chapter 2: Data Transmission What is encryption?
• Encryption is the process of
converting or scrambling data and information into an unreadable, encoded version that can only be read with authorized access Purpose of encryption: • . Encryption is a widely used security tool that can prevent the interception of sensitive data, either while stored in files or while in transit across networks. • Same key is used to encrypt and decrypt Symmetric the data
• uses two separate
keys: a public key and Asymmetric a private key. Example-Symmetric key Definition • Symmetric encryption uses the same key for encryption and decryption. Because it uses the same key, symmetric encryption can be more cost effective for the security it provides. That said, it is important to invest more in securely storing data when using symmetric encryption. Example: Definition Asymmetric encryption uses two separate keys: a public key and a private key. Often a public key is used to encrypt the data while a private key is required to decrypt the data. The private key is only given to users with authorized access. As a result, asymmetric encryption can be more effective, but it is also more costly. Questions: • Do activity 2.9