Resources | Subject Notes | Computer Science | Lesson Plan
Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) to protect its confidentiality. Decryption is the reverse process of converting ciphertext back to plaintext.
This is crucial for securing data transmitted over networks and stored on devices.
There are two main types of encryption:
Symmetric encryption algorithms are generally faster than asymmetric algorithms.
Algorithm | Description | Key Length | Example Use |
---|---|---|---|
AES (Advanced Encryption Standard) | A widely used and secure block cipher. | 128, 192, or 256 bits | Secure communication, data storage |
DES (Data Encryption Standard) | An older block cipher, now considered insecure due to its short key length. | 56 bits | Legacy systems |
Triple DES (3DES) | Applies DES three times to increase security. | 112 bits (effective) | Legacy systems, some older protocols |
Asymmetric encryption offers advantages in key distribution but is computationally more expensive.
Algorithm | Description | Key Length | Example Use |
---|---|---|---|
RSA (Rivest-Shamir-Adleman) | One of the most widely used asymmetric algorithms. | 2048 bits or higher | Secure communication, digital signatures |
ECC (Elliptic Curve Cryptography) | Provides strong security with shorter key lengths compared to RSA. | Various key lengths (e.g., 256 bits) | Mobile devices, resource-constrained environments |
Encryption protocols define the rules and procedures for establishing secure communication channels.
Digital certificates are used to verify the identity of entities (e.g., websites, individuals). They are issued by trusted Certificate Authorities (CAs).
A digital certificate contains:
When a client receives a digital certificate, it can verify the CA's signature using the CA's public key to ensure the certificate's authenticity.
The mathematical operations involved in encryption are complex and involve bitwise operations, substitutions, and permutations.