{"id":174,"date":"2021-02-10T03:35:24","date_gmt":"2021-02-10T03:35:24","guid":{"rendered":"http:\/\/learnlearn.uk\/igcsecs\/?page_id=174"},"modified":"2021-02-10T03:43:31","modified_gmt":"2021-02-10T03:43:31","slug":"symmetric-asymmetric-encryption","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/","title":{"rendered":"Symmetric &#038; Asymmetric Encryption"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Symmetric <\/h2>\n<div class=\"tabcontent\">\n\n<h3>Symmetric Encryption<\/h3>\n<p>When we want to communicate securely between two devices we need a shared secret key that the two computers share.<\/p>\n<p>The sender encrypts the data with their copy of the key and then sends the data to the recipient, who uses the key to decrypt the data the send has sent.<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Asymmetric Encryption<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Asymmetric Encryption<\/h3>\n<p>When we connect to websites that we haven&#8217;t been to before then we have a problem in that we don&#8217;t have a shared key in which to perform encryption\/decryption. We need a way of create a shared secret key, without sending the key to the other person in plain text, as this would leave you open to a man in the middle attack. In order to solve this problem we need to use Asymmetric encryption.<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=jJrICB_HvuI\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Unplugged: The show. Part 9: Public key encryption\" title=\"Play video &quot;Unplugged: The show. Part 9: Public key encryption&quot;\">https:\/\/www.youtube.com\/watch?v=jJrICB_HvuI<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=jJrICB_HvuI\" title=\"Unplugged: The show. Part 9: Public key encryption\">Unplugged: The show. Part 9: Public key encryption (https:\/\/www.youtube.com\/watch?v=jJrICB_HvuI)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Secret Key Exchange (Diffie-Hellman) - Computerphile\" title=\"Play video &quot;Secret Key Exchange (Diffie-Hellman) - Computerphile&quot;\">https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI\" title=\"Secret Key Exchange (Diffie-Hellman) - Computerphile\">Secret Key Exchange (Diffie-Hellman) &#8211; Computerphile (https:\/\/www.youtube.com\/watch?v=NmM9HA2MQGI)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">SSL &amp; TLS<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Secure Sockets Layer and Transport Layer Security<\/h3>\n<p>The standard protocol for connecting securely to a website is SSL\/TLS. SSL was invented by Netscape back in the earl 1990s to allow internet shopping and secure logins to websites. Over the following years SSL was improved, security flaws were fixed and the wider industry adopted the technology. In the late 1990s a major improvement was released for SSL and it was renamed TLS (SSL 3.1 &#8212;&gt; TLS 1.0).<\/p>\n<p><strong>TLS Protocol Steps<\/strong><\/p>\n<ol>\n<li>The sender and receiver agree on what protocols and encryption techniques are going to be used. They usually agree on a standard collection of protocols known as a cypher suite.<\/li>\n<li>Both parties create a private key.<\/li>\n<li>Both parties use mathematical one way functions to create public keys from their private keys.<\/li>\n<li>Both parties send their public keys to each other.<\/li>\n<li>Both parties combine their private keys with the other person&#8217;s public key to create a shared key.<\/li>\n<li>The computers then switch to standard symmetric key using the shared key that they have just created.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Symmetric Encryption When we want to communicate securely between two devices we need a shared secret key that the two computers share. The sender encrypts the data with their copy of the key and then sends the data to the recipient, who uses the key to decrypt the data the send has sent. &nbsp; Asymmetric&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Symmetric &#038; Asymmetric Encryption<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symmetric &amp; Asymmetric Encryption | IGCSE Computer Science | Learnlearn.uk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symmetric &amp; Asymmetric Encryption | IGCSE Computer Science | Learnlearn.uk\" \/>\n<meta property=\"og:description\" content=\"Symmetric Encryption When we want to communicate securely between two devices we need a shared secret key that the two computers share. The sender encrypts the data with their copy of the key and then sends the data to the recipient, who uses the key to decrypt the data the send has sent. &nbsp; Asymmetric&hellip;&nbsp;Read More &raquo;Symmetric &#038; Asymmetric Encryption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"IGCSE Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-10T03:43:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/\",\"name\":\"Symmetric & Asymmetric Encryption | IGCSE Computer Science | Learnlearn.uk\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#website\"},\"datePublished\":\"2021-02-10T03:35:24+00:00\",\"dateModified\":\"2021-02-10T03:43:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IGCSE Computer Science Course\",\"item\":\"https:\/\/learnlearn.uk\/igcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Symmetric &#038; Asymmetric Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/\",\"name\":\"IGCSE Computer Science\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/igcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#organization\",\"name\":\"IGCSE Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png\",\"width\":710,\"height\":98,\"caption\":\"IGCSE Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Symmetric & Asymmetric Encryption | IGCSE Computer Science | Learnlearn.uk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/","og_locale":"en_GB","og_type":"article","og_title":"Symmetric & Asymmetric Encryption | IGCSE Computer Science | Learnlearn.uk","og_description":"Symmetric Encryption When we want to communicate securely between two devices we need a shared secret key that the two computers share. The sender encrypts the data with their copy of the key and then sends the data to the recipient, who uses the key to decrypt the data the send has sent. &nbsp; Asymmetric&hellip;&nbsp;Read More &raquo;Symmetric &#038; Asymmetric Encryption","og_url":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/","og_site_name":"IGCSE Computer Science","article_modified_time":"2021-02-10T03:43:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/","url":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/","name":"Symmetric & Asymmetric Encryption | IGCSE Computer Science | Learnlearn.uk","isPartOf":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/#website"},"datePublished":"2021-02-10T03:35:24+00:00","dateModified":"2021-02-10T03:43:31+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/igcsecs\/symmetric-asymmetric-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IGCSE Computer Science Course","item":"https:\/\/learnlearn.uk\/igcsecs\/"},{"@type":"ListItem","position":2,"name":"Symmetric &#038; Asymmetric Encryption"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/igcsecs\/#website","url":"https:\/\/learnlearn.uk\/igcsecs\/","name":"IGCSE Computer Science","description":"","publisher":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/igcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/igcsecs\/#organization","name":"IGCSE Computer Science","url":"https:\/\/learnlearn.uk\/igcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png","contentUrl":"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png","width":710,"height":98,"caption":"IGCSE Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/igcsecs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Symmetric Encryption When we want to communicate securely between two devices we need a shared secret key that the two computers share. The sender encrypts the data with their copy of the key and then sends the data to the recipient, who uses the key to decrypt the data the send has sent. &nbsp; Asymmetric&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages\/174"}],"collection":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/comments?post=174"}],"version-history":[{"count":3,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages\/174\/revisions"}],"predecessor-version":[{"id":178,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages\/174\/revisions\/178"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/media?parent=174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}