Back to 课程

Computer Science AS OCR

0% Complete
0/0 Steps
  1. 1-1-structure-and-function-of-the-processor as
    5 主题
  2. 1-2-types-of-processor as
    3 主题
  3. 1-3-input-output-and-storage as
    2 主题
  4. 2-1-systems-software as
    8 主题
  5. 2-3-software-development as
    5 主题
  6. 2-4-types-of-programming-language as
    4 主题
  7. 3-1-compression-encryption-and-hashing as
    3 主题
  8. 3-2-databases as
    3 主题
  9. 3-3-networks as
    8 主题
  10. 3-4-web-technologies as
    13 主题
  11. 4-1-data-types as
    8 主题
  12. 4-2-data-structures as
    4 主题
  13. 4-3-boolean-algebra as
    1 主题
  14. 5-1-computing-related-legislation as
    4 主题
  15. 5-2-moral-and-ethical-issues as
    9 主题
  16. 6-1-thinking-abstractly as
    3 主题
  17. 6-2-thinking-ahead as
    1 主题
  18. 6-3-thinking-procedurally as
    3 主题
  19. 6-4-thinking-logically as
    2 主题
  20. 6-5-thinking-concurrently as
    2 主题
  21. 7-1-programming-techniques as
    9 主题
  22. 8-1-standard-algorithms-and-big-o-notation as
    8 主题
课 Progress
0% Complete

Exam code:H046

Symmetric & Asymmetric Encryption

What is encryption?

  • Encryption is crucial for converting readable data into an unreadable format

  • Its primary aim is to secure data from unauthorised access, making it a highly important technique for defending against cyber-attacks and data breaches

  • Encryption methods use ‘keys’, which are specialised programs designed to scramble or unscramble data

  • Selecting a type of encryption isn’t a daily choice for most people

    • Modern devices and technologies, e.g. web browsers (HTTPS protocol), provide a basic level of encryption by default

    • Most people transfer sensitive data without thinking about it because of developments in technology

How does symmetric encryption work?

  • The sender uses a key to encrypt the data before transmission

  • The receiver uses the same key to decrypt the data

  • It’s usually faster, making it ideal for encrypting large amounts of data

  • The significant downside is the challenge of securely sharing this key between the sender and receiver

  • If a bad actor captures the key, they can decrypt all messages intercepted in transmission

Structure of Symmetric Encryption

Structure of Symmetric Encryption

How does asymmetric encryption work?

  • Asymmetric encryption uses two keys:

    • a public key for encryption

    • and a private key for decryption

  • Receivers openly share their public key

  • Senders use this public key to encrypt the data

  • The receiver’s private key is the only key that can decrypt the data and is kept locally on their side

  • The public and private keys are created at the same time and are designed to work together in this way

  • It is typically slower than symmetric encryption

  • It is generally used for more secure and smaller data transactions, e.g. passwords, bank details

Structure of Asymmetric Encryption

Structure of Asymmetric Encryption

Choosing an encryption type

  • Symmetric encryption is fast but has key-sharing issues; asymmetric is slower but solves these issues.

  • The choice should be made based on the situation’s needs: whether speed or security is more critical.

Encryption Type

Suitable For

Reasons to choose

Symmetric

Large files, databases

  • Fast and efficient for bulk data.

  • The same person encrypts and decrypts, e.g. when backing up data.

Asymmetric

Confidential/secret communications

  • Sharing highly secure data, e.g. passwords, government communications

Worked Example

Discuss the impact of modern encryption on society. You should refer to:
• The importance of asymmetric encryption and how it differs from symmetric encryption.
• Different circumstances in which symmetric and asymmetric encryption may be used.

[9]

How to Answer This Question:

Structuring your answer carefully is the best approach for gaining the most marks for the question. Use the list below as a guide:

  1. Start with an introduction outlining the importance of modern encryption in society. Consider some scenarios where private data is being transferred, such as at school or the workplace.

  2. Discuss the key features of asymmetric encryption, emphasising its significance and how it resolves key distribution issues.

  3. Compare asymmetric and symmetric encryption, pointing out the differences and mentioning the single key used in the latter.

  4. Provide examples of scenarios where symmetric and asymmetric encryption are most suitable, discussing the pros and cons of each. 

  5. Conclude by summarising the overall impact of both types of encryption on society, including data security, online transactions, and individual privacy. 

Answer:

 Example Answer That Gets Full Marks:

Encryption is critical to protect people from data misuse in today’s digital society. It’s a fundamental aspect of secret communications, e-commerce, and the protection of personal information.

Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. This solves a crucial issue in key distribution, as the public key can be openly shared without compromising the secure private key. Asymmetric encryption forms the backbone of secure online transactions and communications, enabling features like digital signatures and secure key exchange.

Unlike asymmetric encryption, symmetric encryption uses a single key for both encryption and decryption. While it’s usually faster and more efficient for handling large data, it poses a challenge in securely sharing the key between parties. Asymmetric encryption, though generally slower, alleviates this issue by using a public-private key pair, adding an extra layer of security.

Symmetric encryption is ideal for quick scenarios, such as encrypting large files or databases within a secure network where key distribution is not an issue. Asymmetric encryption is preferred in situations demanding high security, like secure email communications or online banking, where a compromise in key distribution can lead to significant risks.

Using symmetric and asymmetric encryption profoundly impacts society, enabling secure data transmission, enhancing online commerce, and protecting individual privacy. However, the consequences of providing individuals with highly secure methods of communication mean that regular users can communicate for nefarious reasons, such as organised crime. For situations where an individual must choose between the two methods, they should consider if the data transfer needs to happen quickly or securely.

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注