You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
This lesson covers how data is protected during storage and transmission using encryption. At A-Level you must understand symmetric and asymmetric encryption, the role of keys, and how digital signatures and digital certificates ensure authenticity and integrity.
Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable scrambled data) using an algorithm and a key. Only someone with the correct key can decrypt the ciphertext back to plaintext.
Plaintext ──→ [Encryption Algorithm + Key] ──→ Ciphertext
Ciphertext ──→ [Decryption Algorithm + Key] ──→ Plaintext
In symmetric encryption, the same key is used for both encryption and decryption. Both the sender and receiver must share this secret key.
Sender Receiver
Plaintext ──→ [Encrypt with Key K] ──→ Ciphertext ──→ [Decrypt with Key K] ──→ Plaintext
| Advantage | Explanation |
|---|---|
| Fast | Symmetric algorithms are computationally efficient — suitable for encrypting large amounts of data |
| Simple | Only one key to manage per communication pair |
| Disadvantage | Explanation |
|---|---|
| Key distribution problem | The shared key must be transmitted securely to both parties. If intercepted, security is broken |
| Scalability | For n users to communicate securely in pairs, n(n-1)/2 keys are needed — this grows rapidly |
In asymmetric encryption, two mathematically related keys are used: a public key (shared openly) and a private key (kept secret).
Sender Receiver
Plaintext ──→ [Encrypt with Receiver's Public Key] ──→ Ciphertext
──→ [Decrypt with Receiver's Private Key] ──→ Plaintext
| Advantage | Explanation |
|---|---|
| No key distribution problem | Only public keys need to be shared — private keys are never transmitted |
| Scalability | Each user has one key pair; 2n keys for n users |
| Enables digital signatures | The private key can sign data; the public key verifies the signature |
| Disadvantage | Explanation |
|---|---|
| Slow | Asymmetric algorithms are computationally expensive — much slower than symmetric |
| Key management | Public keys must be verified as genuine (solved by digital certificates) |
In practice, both methods are combined:
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.