You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Encryption is one of the most important tools in cyber security. It protects data by converting readable information (plaintext) into an unreadable format (ciphertext) that can only be decoded with the correct key. This lesson covers symmetric and asymmetric encryption as required by the GCSE Computer Science specification.
Whenever data is stored or transmitted, there is a risk that it could be intercepted or accessed by unauthorised people. Encryption protects:
Without encryption:
| Term | Meaning |
|---|---|
| Plaintext | The original, readable data before encryption |
| Ciphertext | The encrypted, unreadable version of the data |
| Encryption | The process of converting plaintext to ciphertext |
| Decryption | The process of converting ciphertext back to plaintext |
| Key | A piece of data used by the encryption algorithm to encrypt or decrypt |
| Algorithm | The mathematical process used to perform encryption (e.g. AES, RSA) |
In symmetric encryption, the same key is used for both encryption and decryption. Both the sender and the receiver must have a copy of this shared secret key.
AES is the most widely used symmetric encryption algorithm today. It is used to protect data in Wi-Fi connections (WPA2/WPA3), file encryption (BitLocker, FileVault) and VPNs.
Asymmetric encryption uses a pair of keys: a public key and a private key. They are mathematically related but different. Data encrypted with the public key can only be decrypted with the corresponding private key, and vice versa.
RSA is the most well-known asymmetric encryption algorithm. It is used in HTTPS, email encryption (PGP) and digital certificates.
| Feature | Symmetric | Asymmetric |
|---|---|---|
| Number of keys | One (shared secret) | Two (public + private) |
| Speed | Fast | Slow |
| Key distribution | Difficult (must share secretly) | Easy (public key shared openly) |
| Best for | Encrypting large amounts of data | Encrypting small data, key exchange, digital signatures |
| Examples | AES, DES, Blowfish | RSA, ECC, Diffie-Hellman |
| Non-repudiation | No | Yes (via digital signatures) |
In practice, symmetric and asymmetric encryption are often used together. HTTPS (the protocol that secures web traffic) is a good example:
This combines the security of asymmetric encryption (for key exchange) with the speed of symmetric encryption (for data transfer).
Students sometimes confuse hashing with encryption. They are different:
| Feature | Encryption | Hashing |
|---|---|---|
| Reversible? | Yes (with the correct key) | No (one-way function) |
| Purpose | Protect data confidentiality | Verify data integrity / store passwords |
| Output | Ciphertext (same size as input) | Fixed-length hash (e.g. 256 bits) |
| Example use | Encrypting an email | Storing a password hash in a database |
Exam Tip: Encryption is reversible (you can get the plaintext back). Hashing is a one-way function — you cannot reverse a hash to get the original data. This distinction frequently appears in exam questions.
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.