COMPUTER SYSTEMS
TOPIC 4B: PRECAUTIONS
LEARNING INTENTIONS
Describe how encryption is used to secure transmission of data:
• use of public and private keys
• digital certificates
• digital signatures
ENCRYPTION
Encryption is when data is encoded into another form. If data is intercepted then the data is meaningless until it is deciphered using a key.
There are two types of encryption in widespread use today:
symmetric and asymmetric encryption.
SYMMETRIC
In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one.
PROBLEM SYMMETRIC
When these keys are shared over an unsecured connection, they are vulnerable to being intercepted by malicious third parties.
ASYMMETRIC (PUBLIC KEY)
Two encryption keys (public and private) are used to scramble data so that it cannot be intercepted.
Public key - known by everyone and is used to encrypt the message.
Private key - known only by the recipient and is used to decrypt the message.
DIGITAL CERTIFICATES
A Digital Certificate is an electronic "password" that allows a person, organisation to exchange data securely over the Internet using the public key infrastructure.
Digital Certificate is also known as a public key certificate or identity certificate.
The Internet is an open communications network that was not originally designed with security in mind.
DIGITAL SIGNATURE