Examo
PracticeAbout
Homecomputer-scienceEncryption
0984

Encryption

Data Transmission · 4 question types

Practise
Download PDF

0984 Topics

Types and Methods of Data Transmission4%
Error Detection5%
Encryption4%
  1. What Encryption Is
  2. Two Big Families: Symmetric vs Asymmetric
  3. Symmetric Encryption
  4. Asymmetric Encryption
  5. The Caesar Cipher

Frequency legend

High (≥14%)
Above avg (10 to 13%)
Average (<10%)

Exam Frequency Analysis

Past paper frequency (2018 to 2024)

This topic accounts for approximately 4% of your exam marks.

increasing
Rare
Increasing4%

Symmetric vs asymmetric encryption questions are growing as cybersecurity becomes more prominent.

When data crosses a network, anyone who can intercept the cable or radio signal could potentially read it. Encryption stops that by scrambling the data into a form that only the intended recipient can unscramble.

Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable, scrambled data) using an algorithm and a key, so that only someone with the correct key can convert the ciphertext back into plaintext.

The five terms that matter most:

TermMeaning
PlaintextThe original, readable data before encryption
CiphertextThe scrambled, unreadable data after encryption
Encryption algorithmThe mathematical procedure that turns plaintext into ciphertext (and back)
KeyA piece of secret information (usually a binary string of a fixed length) that controls how the algorithm scrambles the data
DecryptionThe reverse process: turning ciphertext back into plaintext using the key

Encryption does not stop an attacker from intercepting the data. It only stops them from understanding it.

Why encryption matters more on wireless than wired networks

Both wired and wireless networks need encryption, but wireless networks are especially exposed because the signal travels through the air and can be picked up by any nearby radio receiver. Anyone within range of a Wi-Fi access point can in principle capture the radio waves. On a wired network, an attacker would have to physically tap into the cable to intercept anything.

Wireless networks therefore use dedicated security protocols such as WPA2 (Wi-Fi Protected Access 2) to encrypt all traffic between the device and the access point.

How a Wi-Fi network encrypts data

A typical wireless connection works like this:

  1. The Wi-Fi network is identified by an SSID (Service Set Identifier), which is the name of the network.
  2. The user enters the SSID and a password when joining the network.
  3. The SSID and password are combined to derive a master key.
  4. Every device on the network has the same master key.
  5. The master key never travels across the network. Lacking the key, an eavesdropper sees the captured packets only as scrambled bytes.
  6. Data sent from a device is encrypted with the master key into ciphertext before transmission.
  7. The receiving end decrypts the ciphertext using the same master key.

Previous

Side-by-side: Which Method Does What

Next

Two Big Families: Symmetric vs Asymmetric