Main content
Computers and the Internet
Course: Computers and the Internet > Unit 4
Lesson 5: Data encryption techniquesThe need for encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers.
The Internet protocols send private data in packets on the same routes as everyone else's data, and unfortunately, attackers have figured out ways to look at the data whizzing around the Internet.
That's where encryption comes in: encrypting data means that we scramble the original data to hide the meaning of the text, while still making it possible for the data to be unscrambled using a secret key.
Encryption enables two people (or computers!) to share private information over open networks.
Now we'll dive into the two most common types of encryption used in securing Internet communications: symmetric encryption and public key encryption.
Want to join the conversation?
- Internet communications: symmetric encryption and public key encryption. WHAT is it(5 votes)
- Its explained in the next articles(6 votes)
- Do most poeple hack us night time or day time?(3 votes)
- Linus Media Group was hacked during night-time and morning, because Linus was sleeping.
If the hacker knows your sleep schedule, they will hack you while you sleep, no matter the time(2 votes)
- Why does the data have to be scrambled? Why can't there just be a way to hide it?(2 votes)
- because if you can send it you can find it(2 votes)
- How would this benefit me in my future(2 votes)
- That's for you to decide. It can only benefit you if you allow it too, and if you want it too.(2 votes)
- Does virus protection protect your computer from the data encryption?(4 votes)
- does this have to do whith covid(2 votes)
- This course makes me want to send a secret code to my besty in the mail(2 votes)
- what is the best encryption used today?(1 vote)
- There is no single best encryption algorithm. Each algorithm has its own strengths and weaknesses which makes some preferrable in certain situations over others. For example, AES encryption is much faster than RSA encryption. However, AES encryption requires you to get the key to the encrypted message recipient, and you need a new key for each message sender/receiver pair. With RSA encryption, you only need one public/private key pair per person and you can digitally sign files. However, RSA is very slow so it is not suitable to encrypt large amounts of data and it requires an established Public Key Infrastructure. The One-Time Pad is unbreakable and can be done by hand, however, the keys must be as long as the messages that are being encrypted and each key requires many securely-generated random numbers. Eliptic-Curve Cryptography uses smaller keys than RSA to provide the same level of security, but is more complicated to implement and the security greatly depends on the curve used.(2 votes)
- How does it all work?(1 vote)
- does virus protection protect your computer from the data encryption?(1 vote)
- does the have to whith covid?(0 votes)