{"id":265,"date":"2022-11-28T19:43:57","date_gmt":"2022-11-28T19:43:57","guid":{"rendered":"http:\/\/learnlearn.uk\/ibcs\/?page_id=265"},"modified":"2022-11-28T19:43:57","modified_gmt":"2022-11-28T19:43:57","slug":"asymmetric-encryption","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/","title":{"rendered":"Asymmetric Encryption"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Introduction<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Introduction to Asymmetric Encryption<\/h3>\n<p><strong>The Problem with symmetric encryption<\/strong><\/p>\n<p>Symmetric encryption is great for encrypting data when both the sender and receiver are in possession of the shared symmetric key. However this form of encryption requires the key to be shared before use. This is a problem on open networks such as the internet as often you will need to communicate with websites or individuals who you don&#8217;t know. You can&#8217;t send the shared key across the network unencrypted as an eavesdropper could intercept the communication and retrieve the key.<\/p>\n<p>We need a method of encryption that can provide secure communication between two parties that are unknown to each other. In this instance we need to use Asymmetric Encryption.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Encryption Process<\/h2>\n<div class=\"tabcontent\">\n\n<p>Asymmetric encryption uses public key and private key pairs in order to solve the problem. These two encryption keys are generated together and are mathematically related, with the private key being the key that decrypts any data encrypted with the public key.<\/p>\n<div id=\"attachment_2271\" style=\"width: 1329px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-2271\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-2271\" src=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/asymmetric-key-encryption-a-level-cie-9618.png\" alt=\"\" width=\"1319\" height=\"577\" \/><p id=\"caption-attachment-2271\" class=\"wp-caption-text\">The Asymmetric Encryption Process<\/p><\/div>\n<p><strong>The Public Key<\/strong><\/p>\n<p>This key is shared publicly and is used by the sender to encrypt the data they wish to send to the receiver.<\/p>\n<p><strong>The Private Key<\/strong><\/p>\n<p>This key is kept secret by the receiver and it is never shared as it is the key that is used to decrypt the encrypted data.<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Basic Videos<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Asymmetric Message Sending<\/h3>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=8I7BNgD2Yag\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Public Key Encryption (Asymmetric Key Encryption)\" title=\"Play video &quot;Public Key Encryption (Asymmetric Key Encryption)&quot;\">https:\/\/www.youtube.com\/watch?v=8I7BNgD2Yag<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=8I7BNgD2Yag\" title=\"Public Key Encryption (Asymmetric Key Encryption)\">Public Key Encryption (Asymmetric Key Encryption) (https:\/\/www.youtube.com\/watch?v=8I7BNgD2Yag)<\/a><\/noscript><\/div>\n<\/div>\n\n<\/div><h2 class=\"tabtitle\">Advanced Videos<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Asymmetric Encryption Videos<\/h3>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Public Key Cryptography - Computerphile\" title=\"Play video &quot;Public Key Cryptography - Computerphile&quot;\">https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4\" title=\"Public Key Cryptography - Computerphile\">Public Key Cryptography &#8211; Computerphile (https:\/\/www.youtube.com\/watch?v=GSIDS_lvRv4)<\/a><\/noscript><\/div>\n<\/div>\n<h3>Diffie-Hellman Key Exchange<\/h3>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Secret Key Exchange (Diffie-Hellman) - Computerphile\" title=\"Play video &quot;Secret Key Exchange (Diffie-Hellman) - Computerphile&quot;\">https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI\" title=\"Secret Key Exchange (Diffie-Hellman) - Computerphile\">Secret Key Exchange (Diffie-Hellman) &#8211; Computerphile (https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI)<\/a><\/noscript><\/div>\n<\/div>\n<p><strong>Mathematics<\/strong><\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=Yjrfm_oRO0w\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Diffie Hellman -the Mathematics bit- Computerphile\" title=\"Play video &quot;Diffie Hellman -the Mathematics bit- Computerphile&quot;\">https:\/\/www.youtube.com\/watch?v=Yjrfm_oRO0w<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=Yjrfm_oRO0w\" title=\"Diffie Hellman -the Mathematics bit- Computerphile\">Diffie Hellman -the Mathematics bit- Computerphile (https:\/\/www.youtube.com\/watch?v=Yjrfm_oRO0w)<\/a><\/noscript><\/div>\n<\/div>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=NF1pwjL9-DE\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Elliptic Curves - Computerphile\" title=\"Play video &quot;Elliptic Curves - Computerphile&quot;\">https:\/\/www.youtube.com\/watch?v=NF1pwjL9-DE<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=NF1pwjL9-DE\" title=\"Elliptic Curves - Computerphile\">Elliptic Curves &#8211; Computerphile (https:\/\/www.youtube.com\/watch?v=NF1pwjL9-DE)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Resources<\/h3>\n<p><a href=\"http:\/\/books.gigatux.nl\/mirror\/securitytools\/ddu\/ch09lev1sec1.html\">In depth guide to symmetric and asymmetric encryption<\/a><\/p>\n<p><a href=\"https:\/\/docs.google.com\/presentation\/d\/1CUKe1cctmW3YDoky9KnJlrkFEeWM494KCfDvzPFA5nw\/edit?usp=sharing\">Teacher Presentation<\/a><\/p>\n<p><strong>Past Paper Questions<\/strong><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2021-may-june-9608-s21-qp-31-pdf\">May June 21 Question 6 Paper 31<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-may-june-2020-9608-s20-qp-31-pdf\">Summer 2020 Paper 31 &#8211; Question 8<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2019-may-june-9608-s19-qp-31-pdf\">Summer 2019 Paper 31 &#8211; Question 5<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2019-may-june-9608-s19-qp-32-pdf\">Summer 2019 Paper 32 &#8211; Question 8<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2018-oct-nov-9608-w18-qp-32-pdf\">Winter 2018 Paper 32 &#8211; Question 6<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2018-may-june-9608-s18-qp-32-pdf\">Summer 2018 &#8211; Paper 32 &#8211; Question 5<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2017-jun-9608-s17-qp-31-pdf\">Summer 2017 Paper 31 &#8211; Qn2C\u00a0<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2016-nov-9608-w16-qp-31-pdf\">Winter 2016 Paper 31 &#8211; Qn6<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2016-jun-9608-s16-qp-31-pdf\">Summer 2016 Paper 31 &#8211; Qn2C (Email encryption)<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2016-jun-9608-s16-qp-33-pdf\">Summer 2016 Paper 33 &#8211; Qn2<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Asymmetric Encryption The Problem with symmetric encryption Symmetric encryption is great for encrypting data when both the sender and receiver are in possession of the shared symmetric key. However this form of encryption requires the key to be shared before use. This is a problem on open networks such as the internet as&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Asymmetric Encryption<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Asymmetric Encryption - IB Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Asymmetric Encryption - IB Computer Science\" \/>\n<meta property=\"og:description\" content=\"Introduction to Asymmetric Encryption The Problem with symmetric encryption Symmetric encryption is great for encrypting data when both the sender and receiver are in possession of the shared symmetric key. However this form of encryption requires the key to be shared before use. This is a problem on open networks such as the internet as&hellip;&nbsp;Read More &raquo;Asymmetric Encryption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"IB Computer Science\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/asymmetric-key-encryption-a-level-cie-9618.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/\",\"name\":\"Asymmetric Encryption - IB Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\"},\"datePublished\":\"2022-11-28T19:43:57+00:00\",\"dateModified\":\"2022-11-28T19:43:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IB Computer Science\",\"item\":\"https:\/\/learnlearn.uk\/ibcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Asymmetric Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"name\":\"IB Computer Science\",\"description\":\"- learnlearn..uk\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\",\"name\":\"IB Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"width\":300,\"height\":41,\"caption\":\"IB Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Asymmetric Encryption - IB Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/","og_locale":"en_GB","og_type":"article","og_title":"Asymmetric Encryption - IB Computer Science","og_description":"Introduction to Asymmetric Encryption The Problem with symmetric encryption Symmetric encryption is great for encrypting data when both the sender and receiver are in possession of the shared symmetric key. However this form of encryption requires the key to be shared before use. This is a problem on open networks such as the internet as&hellip;&nbsp;Read More &raquo;Asymmetric Encryption","og_url":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/","og_site_name":"IB Computer Science","og_image":[{"url":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2022\/03\/asymmetric-key-encryption-a-level-cie-9618.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/","url":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/","name":"Asymmetric Encryption - IB Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#website"},"datePublished":"2022-11-28T19:43:57+00:00","dateModified":"2022-11-28T19:43:57+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/ibcs\/asymmetric-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IB Computer Science","item":"https:\/\/learnlearn.uk\/ibcs\/"},{"@type":"ListItem","position":2,"name":"Asymmetric Encryption"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/ibcs\/#website","url":"https:\/\/learnlearn.uk\/ibcs\/","name":"IB Computer Science","description":"- learnlearn..uk","publisher":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/ibcs\/#organization","name":"IB Computer Science","url":"https:\/\/learnlearn.uk\/ibcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","contentUrl":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","width":300,"height":41,"caption":"IB Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/ibcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Introduction to Asymmetric Encryption The Problem with symmetric encryption Symmetric encryption is great for encrypting data when both the sender and receiver are in possession of the shared symmetric key. However this form of encryption requires the key to be shared before use. This is a problem on open networks such as the internet as&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/265"}],"collection":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/comments?post=265"}],"version-history":[{"count":1,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/265\/revisions"}],"predecessor-version":[{"id":268,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/265\/revisions\/268"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/media?parent=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}