You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
This lesson covers encryption as a network security prevention method, as required by OCR J277 Section 1.4. Encryption is fundamental to protecting data both in transit (being sent across a network) and at rest (stored on a device).
Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) using a mathematical algorithm and a key. Only someone with the correct key can decrypt the ciphertext back into plaintext.
The following diagram shows the basic encryption and decryption process:
graph LR
A["Sender\n(Plaintext)"] --> B["Encrypt\nwith Key"]
B --> C["Ciphertext\n(transmitted)"]
C --> D["Decrypt\nwith Key"]
D --> E["Receiver\n(Plaintext)"]
| Term | Meaning |
|---|---|
| Plaintext | The original, readable data |
| Ciphertext | The encrypted, unreadable data |
| Encryption | Converting plaintext to ciphertext |
| Decryption | Converting ciphertext back to plaintext |
| Key | A value used by the algorithm to encrypt/decrypt data |
| Algorithm | The mathematical process used for encryption |
Encryption protects the confidentiality of data. Even if an attacker intercepts encrypted data, they cannot read it without the decryption key.
OCR Exam Tip: When explaining why encryption is important, always link it to confidentiality: "Encryption ensures that even if data is intercepted, it cannot be read without the decryption key."
In symmetric encryption, the same key is used for both encryption and decryption. Both the sender and receiver must possess the same secret key.
The main weakness of symmetric encryption is key distribution — how do you securely share the secret key with the receiver? If the key is intercepted during transmission, the attacker can decrypt all communications.
| Advantage | Disadvantage |
|---|---|
| Fast — less computationally intensive | Key must be shared securely |
| Suitable for encrypting large amounts of data | If the key is compromised, all data is vulnerable |
| Simple to implement | Does not scale well — each pair of users needs a unique key |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.