{"id":2243,"date":"2022-03-21T14:25:44","date_gmt":"2022-03-21T14:25:44","guid":{"rendered":"http:\/\/learnlearn.uk\/alevelcs\/?page_id=2243"},"modified":"2022-03-23T10:26:28","modified_gmt":"2022-03-23T10:26:28","slug":"symmetric-encryption","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/","title":{"rendered":"Symmetric Encryption"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Introduction<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Introduction to Encryption<\/h3>\n<p>What is encryption?<\/p>\n<p>Encryption is the processing of scrambled data so that only authorized people can view the contents. Unencrypted data, known as <em>plain-text,<\/em> is encoded(encrypted) into scrambled\u00a0<em>cypher-text\u00a0<\/em>using an\u00a0<em>encryption algorithm <\/em>and a pseudo-random<em>\u00a0encryption key.\u00a0<\/em>The data is then transmitted or stored and when the data needs to be accessed it is decrypted using the key.<\/p>\n<p><strong>Why do we need encryption?<\/strong><\/p>\n<p>The need for secrecy when storing and transmitting data has been an issue for thousands of years &#8211; the Roman Empire used the Caesar-cypher to send messages securely between generals and the Nazis used the Enigma Machine to encrypt their messages.<\/p>\n<p>However it is only since the widespread adoption of computer networks, and especially the internet, that encryption taken a central role in everyday life. Billions of people use the internet everyday for online shopping, banking and email. All of the data for these tasks is send across the internet, a publicly accessible network where data can be intercepted by anyone at any time and any data that is sent in plaintext can easily be read.<\/p>\n<p>It is essential that internet traffic is encrypted, so that when you enter your credit-card details for online shopping or your password for a website, anybody eavesdropping on the network cannot easily access that information.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Symmetric Encryption<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>What is symmetric encryption?<\/strong><\/p>\n<p>Symmetric encryption (also know as private key encryption) is a form of encryption whereby the same <em>private\/symmetric key<\/em> is used to both encrypt and decrypt the data.<\/p>\n<p>The plaintext data is passed to an encryption algorithm and the algorithm uses the key to encode the data into cypher-text. This data is then sent to the recipient who uses the same key to decrypt the data.<\/p>\n<div id=\"attachment_2262\" style=\"width: 1233px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-2262\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-2262\" src=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa.png\" alt=\"\" width=\"1223\" height=\"435\" srcset=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa.png 1223w, https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa-300x107.png 300w, https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa-768x273.png 768w, https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa-1024x364.png 1024w\" sizes=\"(max-width: 1223px) 100vw, 1223px\" \/><p id=\"caption-attachment-2262\" class=\"wp-caption-text\">With Symmetric Encryption the same key is used to both encrypt and decrypt the data<\/p><\/div>\n<p>This form of encryption is highly efficient and is generally effective as long as a sufficiently long encryption key is used (most websites currently use a 256bit key for standard encryption).<\/p>\n<p>It is important to note that encrypted data is never 100% secure and all standard encryption can be broken through the use of a brute-force attack, given sufficient computing power and time. However breaking 256 bit encryption would require huge amounts of computing power that is beyond the resources of most organisations and therefore is sufficient for everyday transmission of data such as passwords and credit card details.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Pros &amp; Cons<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Advantages &amp; Disadvantages of Symmetric Key Encryption<\/h3>\n<p><strong>Advantages<\/strong><\/p>\n<ul>\n<li>Symmetric key encryption used fairly fast algorithms which use relatively little processing power to encrypt and decrypt data. This makes it very useful when processing large amounts of data<\/li>\n<li>Symmetric key encryption requires only relatively short encryption key lengths (256bits)<\/li>\n<\/ul>\n<p><strong>Disadvantages<\/strong><\/p>\n<ul>\n<li>The strength of symmetric encryption relies on keeping the key secret. This means the in order to ensure long term security it is necessary to cycle through keys and perform key management.<\/li>\n<li>Symmetric encryption relies on a pre-shared key between two parties. This makes it unsuitable for secure communication between two parties if they haven&#8217;t shared a key in advance &#8211; for instance if you log onto an internet shopping website that you have never visited before. In this situation a different form of encryption is required &#8211; <a href=\"https:\/\/learnlearn.uk\/alevelcs\/asymmetric-encryption\/\">asymmetric encryption.<\/a><\/li>\n<li><\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">Video<\/h2>\n<div class=\"tabcontent\">\n\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=vk3py9M2IfE\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Private Key Encryption (Symmetric Key Encryption)\" title=\"Play video &quot;Private Key Encryption (Symmetric Key Encryption)&quot;\">https:\/\/www.youtube.com\/watch?v=vk3py9M2IfE<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=vk3py9M2IfE\" title=\"Private Key Encryption (Symmetric Key Encryption)\">Private Key Encryption (Symmetric Key Encryption) (https:\/\/www.youtube.com\/watch?v=vk3py9M2IfE)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Encryption What is encryption? Encryption is the processing of scrambled data so that only authorized people can view the contents. Unencrypted data, known as plain-text, is encoded(encrypted) into scrambled\u00a0cypher-text\u00a0using an\u00a0encryption algorithm and a pseudo-random\u00a0encryption key.\u00a0The data is then transmitted or stored and when the data needs to be accessed it is decrypted using&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Symmetric Encryption<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":85,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symmetric Encryption - A Level Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symmetric Encryption - A Level Computer Science\" \/>\n<meta property=\"og:description\" content=\"Introduction to Encryption What is encryption? Encryption is the processing of scrambled data so that only authorized people can view the contents. Unencrypted data, known as plain-text, is encoded(encrypted) into scrambled\u00a0cypher-text\u00a0using an\u00a0encryption algorithm and a pseudo-random\u00a0encryption key.\u00a0The data is then transmitted or stored and when the data needs to be accessed it is decrypted using&hellip;&nbsp;Read More &raquo;Symmetric Encryption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"A Level Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-23T10:26:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/\",\"name\":\"Symmetric Encryption - A Level Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#website\"},\"datePublished\":\"2022-03-21T14:25:44+00:00\",\"dateModified\":\"2022-03-23T10:26:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"A Level Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/alevelcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Symmetric Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/\",\"name\":\"A Level Computer Science\",\"description\":\"CIE Specification\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/alevelcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#organization\",\"name\":\"A Level Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"A Level Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Symmetric Encryption - A Level Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/","og_locale":"en_GB","og_type":"article","og_title":"Symmetric Encryption - A Level Computer Science","og_description":"Introduction to Encryption What is encryption? Encryption is the processing of scrambled data so that only authorized people can view the contents. Unencrypted data, known as plain-text, is encoded(encrypted) into scrambled\u00a0cypher-text\u00a0using an\u00a0encryption algorithm and a pseudo-random\u00a0encryption key.\u00a0The data is then transmitted or stored and when the data needs to be accessed it is decrypted using&hellip;&nbsp;Read More &raquo;Symmetric Encryption","og_url":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/","og_site_name":"A Level Computer Science","article_modified_time":"2022-03-23T10:26:28+00:00","og_image":[{"url":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/symmetric-encryption-cie-alevel-computer-science-aqa.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/","url":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/","name":"Symmetric Encryption - A Level Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#website"},"datePublished":"2022-03-21T14:25:44+00:00","dateModified":"2022-03-23T10:26:28+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/alevelcs\/symmetric-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"A Level Computer Science Home","item":"https:\/\/learnlearn.uk\/alevelcs\/"},{"@type":"ListItem","position":2,"name":"Symmetric Encryption"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/alevelcs\/#website","url":"https:\/\/learnlearn.uk\/alevelcs\/","name":"A Level Computer Science","description":"CIE Specification","publisher":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/alevelcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/alevelcs\/#organization","name":"A Level Computer Science","url":"https:\/\/learnlearn.uk\/alevelcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"A Level Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/alevelcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Introduction to Encryption What is encryption? Encryption is the processing of scrambled data so that only authorized people can view the contents. Unencrypted data, known as plain-text, is encoded(encrypted) into scrambled\u00a0cypher-text\u00a0using an\u00a0encryption algorithm and a pseudo-random\u00a0encryption key.\u00a0The data is then transmitted or stored and when the data needs to be accessed it is decrypted using&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/2243"}],"collection":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/comments?post=2243"}],"version-history":[{"count":8,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/2243\/revisions"}],"predecessor-version":[{"id":2267,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/2243\/revisions\/2267"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/media?parent=2243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}