You are on page 1of 16

Objectives

• Understand the need for and purpose of encryption


when transmitting data
• Understand how data is encrypted using symmetric
and asymmetric encryption
Encryption
Unit 2 Data transmission and encryption

Starter
• Many people now use a Wi-Fi access point in
their home
• Why do Wi-Fi access points need encryption?
• Describe how the encryption
on a Wi-Fi access point works
from a user’s point of view
Encryption
Unit 2 Data transmission and encryption

Starter
• Why do Wi-Fi access points need encryption?
• Sensitive data, such as passwords, bank information and
photos, is sent from computers and devices to the
access point
• An eavesdropper can listen to the Wi-Fi signal and if it isn’t
encrypted, they will be able to use this sensitive information
• Describe how the encryption on a Wi-Fi access point
works from a user’s point of view
• A Wi-Fi password known as a pre-shared key (PSK) is given
to each user that wants to connect to the network
• The data is then encrypted using this key
Encryption
Unit 2 Data transmission and encryption

The need for encryption


• Large amounts of personal data are now stored and
transmitted on computers
• Companies and other organisations also have highly
confidential data that they don’t want others looking at
• In paper systems, sensitive data was held in locked
cabinets and locked rooms
• Now, sensitive data is often transmitted via the Internet which
is a public network
• Data is also stored on computers and servers on the Internet
which may be hacked
• If a hacker gains access to the data, they won’t be able to
understand it if it is encrypted
Encryption
Unit 2 Data transmission and encryption

What is encryption?
• The purpose of encryption is to encode a file or data
into something that cannot be read or understood
• The file or data that cannot be understood is known
as encrypted
• A key or password is used to decrypt the data

“That’s one small AI94KkmC39g7c


step for 0xznwejg8sJKY3
a man, one 7c3GBmOWp9D
giant leap for KcnbuenJhnDko9
mankind.” – Neil 4ncC385C7djkIol
Armstrong kfyvnwIHH9WI

Plaintext Encrypted
Encryption
Unit 2 Data transmission and encryption

Symmetric encryption
• In symmetric encryption, a key is first shared
between the sender and receiver
• This key encrypts the data before it is transmitted
• The receiver uses the key to decrypt the data
Sender Receiver

The quick idEug94jvMz The quick


brown fox pr0Utjdnkcib brown fox
jumps over ntTD031BnZ jumps over
the lazy dog. inIpPdkfi82n the lazy dog.
Bnw
Plaintext Encrypted text Plaintext
Secret shared key Secret shared key
Encryption
Unit 2 Data transmission and encryption

Symmetric encryption uses


• The pre-shared key used to connect to a Wi-Fi
access point makes use of symmetric encryption
• Other uses for symmetric encryption include:
• Adding a password to a ZIP file which also encrypts the file
• Encrypting a hard drive or external storage device
Encryption
Unit 2 Data transmission and encryption

Worksheet 4
• Complete Task 1 on Worksheet 4
Encryption
Unit 2 Data transmission and encryption

Asymmetric encryption
• In asymmetric encryption, two keys are created by
the receiver
• The public key is accessible by anyone and used to
encrypt data
• The private key is kept secret by the receiver and used to
decrypt the data
• The technique is also known as public-key cryptography

• This means that anyone can


encrypt the data, but only the
receiver can decrypt it
• There is no need to share a secret key
as happens with symmetric encryption
Encryption
Unit 2 Data transmission and encryption

Asymmetric encryption
• Both keys are generated by the receiver
• Only the public key is shared with the sender
Public key Private key

Sender Receiver

The quick idEug94jvMz The quick


brown fox pr0Utjdnkcib brown fox
jumps over ntTD031BnZ jumps over
the lazy dog. inIpPdkfi82n the lazy dog.
Bnw
Plaintext Encrypted text Plaintext
Encryption
Unit 2 Data transmission and encryption

Web asymmetric encryption


• Web pages that are shared using HTTPS (Hypertext
transfer protocol secure) make use of encryption
• The encryption used is asymmetric encryption
• The browser and server share the necessary public keys to
encrypt the data
• They then use their private keys to decrypt the data

• If symmetric encryption were used, every website


you visit would first need to send the password
privately to you – for instance through a letter
• The sharing of a public key happens in a fraction of a second
and there is no risk if an eavesdropper discovers it
Encryption
Unit 2 Data transmission and encryption

Worksheet 4
• Complete Task 2 on Worksheet 4
Encryption
Unit 2 Data transmission and encryption

Plenary
• Explain to a partner the following terms:

Asymmetric Symmetric
Encryption
Encryption Encryption

Shared key Public key Private key

Decrypt Encrypt Plaintext


Encryption
Unit 2 Data transmission and encryption

Plenary
• Encryption – the process of encoding data in such a way that it
becomes unreadable
• Asymmetric encryption – a public key is used to encrypt the data; a private
key is used to decrypt the data
• Symmetric encryption – a private shared key is used to encrypt and decrypt
the data
• Shared key – the secret key that is used to encrypt and decrypt
the data
• Public key – a key that anyone may see and use to
encrypt data before it is sent to someone
• Private key – the key used to decrypt data
• Decrypt – decode encrypted data back into plaintext
• Encrypt – encode data into an unreadable form
• Plaintext – text that hasn’t been encrypted
Encryption
Unit 2 Data transmission and encryption

Copyright

© 2021 PG Online Limited

The contents of this unit are protected by copyright.

This unit and all the worksheets, PowerPoint presentations, teaching guides and other associated files
distributed with it are supplied to you by PG Online Limited under licence and may be used and copied by you
only in accordance with the terms of the licence. Except as expressly permitted by the licence, no part of the
materials distributed with this unit may be used, reproduced, stored in a retrieval system, or transmitted, in any
form or by any means, electronic or otherwise, without the prior written permission of PG Online Limited.

Licence agreement

This is a legal agreement between you, the end user, and PG Online Limited. This unit and all the worksheets,
PowerPoint presentations, teaching guides and other associated files distributed with it is licensed, not sold, to
you by PG Online Limited for use under the terms of the licence.

The materials distributed with this unit may be freely copied and used by members of a single institution on a
single site only. You are not permitted to share in any way any of the materials or part of the materials with any
third party, including users on another site or individuals who are members of a separate institution. You
acknowledge that the materials must remain with you, the licencing institution, and no part of the materials may
be transferred to another institution. You also agree not to procure, authorise, encourage, facilitate or enable any
third party to reproduce these materials in whole or in part without the prior permission of PG Online Limited.

You might also like