Encryption
is the conversion of electronic data into another form, called cipher text,
which cannot be easily understood by anyone except authorized parties.
The word encryption comes from the Greek word kryptos, meaning hidden or secret. SSL (Secure Sockets Layer) is standard security technologies for establishing an encrypted links between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook). It allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. To establish this secure connection, the browser and the server need an SSL Certificate.
Symmetric Encryption
Symmetric encryption (or pre-shared key encryption) uses a single key to both encrypt and decrypt data. Both the sender and the receiver need the same key to communicate.
The word encryption comes from the Greek word kryptos, meaning hidden or secret. SSL (Secure Sockets Layer) is standard security technologies for establishing an encrypted links between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook). It allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. To establish this secure connection, the browser and the server need an SSL Certificate.
Symmetric Encryption
Symmetric encryption (or pre-shared key encryption) uses a single key to both encrypt and decrypt data. Both the sender and the receiver need the same key to communicate.
Specimen Paper 2015
Q1) In a simple symmetric encryption system, each letter of the alphabet is substituted with another.
The plain text message:
The quick brown fox jumps over the lazy dog.
becomes the cypher text message:
Zag towns jumpy dmh coilp mngu zag bfke qmx.
(a) (i) Decode this cypher text message.
Agbbm Pmubq
Q1) In a simple symmetric encryption system, each letter of the alphabet is substituted with another.
The plain text message:
The quick brown fox jumps over the lazy dog.
becomes the cypher text message:
Zag towns jumpy dmh coilp mngu zag bfke qmx.
(a) (i) Decode this cypher text message.
Agbbm Pmubq
.................................................................................................................................
[2]
(ii) Convert these words to cypher text.
Computer Science
................................................................................................................................. [2]
(b) Both the person who sends the message and the person who receives it need to
know what the substitution key is, and they need to keep this secret. A copy of the
substitution key has been sent using SSL transmission.
Explain why this keeps the copy of the key secret during transmission.
........................................................................................................................................................................................................................................................................ [2]
Q 37) Summer 2014. P12
(ii) Convert these words to cypher text.
Computer Science
................................................................................................................................. [2]
(b) Both the person who sends the message and the person who receives it need to
know what the substitution key is, and they need to keep this secret. A copy of the
substitution key has been sent using SSL transmission.
Explain why this keeps the copy of the key secret during transmission.
........................................................................................................................................................................................................................................................................ [2]
Q 37) Summer 2014. P12
16 An encryption system
gives each letter of the alphabet a value:
A = 1, B = 2, C = 3, ……… ,
Y = 25, Z = 26.
Each letter is stored in a
12-bit binary register. The letter “S” (19th letter) is stored as:
A 4-bit register is used to
store the encryption key. This register shows how many places the bits are
shifted to the left in the 12-bit register when it is encrypted. So,
means each bit in the
12-bit register is shifted 5 places to the left and the register now becomes:
Therefore, the letter “S”
would be transmitted with the 4-bit register and the 12-bit register as
follows:
(a) “W” is the 23rd letter
of the alphabet.
(i) Show how this letter
would be stored in the 12-bit register before encryption:
(ii) The 4-bit register
contains the following value:
Show how the letter “W” is
now stored in the 12-bit register in encrypted form:
(b) Find which letter of
the alphabet has been encrypted here. (Show all your working.)
(c) (i) What is the largest
encryption key that can be stored in the 4-bit register?
(ii) Convert this into
denary (base 10).
(iii) If this encryption
key were used, what problem would it cause? [3]
(b) What is
meant by encryption?
............................................................................................................................................................................................................................................................................ [2]
............................................................................................................................................................................................................................................................................ [2]
(c) (i) A
student wrote “I would make backup copies of my data to guard against viruses”.
Why is the student’s statement not necessarily true?
.................................................................................................................................................................................................................................................................................... [2]
.................................................................................................................................................................................................................................................................................... [2]
(ii) The same student also wrote “Encryption
would stop a hacker accessing the data
in my computer files”. Why is the student’s statement incorrect?
..................................................................................................................................................................................................................................................................................... [2]
in my computer files”. Why is the student’s statement incorrect?
..................................................................................................................................................................................................................................................................................... [2]
Summer 2010
Q4) A company has set up an Internet website to
sell their electrical goods online.
(a) Give two features you would expect to see on the website.
................................................................................................................................................................................................................................................................................... [2]
(a) Give two features you would expect to see on the website.
................................................................................................................................................................................................................................................................................... [2]
(b) Payments for goods can be made by
credit/debit cards. Data from the cards is
encrypted.
(i) What is encryption?
(ii) Why is data encrypted? .............................................................................................................................. [2]
encrypted.
(i) What is encryption?
(ii) Why is data encrypted? .............................................................................................................................. [2]
(c) Apart from credit card fraud, people have
other fears about buying from the Internet. Describe one of these fears. ............................................................................................................................
[2]
Q5) The student is interested in how simple encryption could be
applied to a text message. One of the simplest forms of encryption is a method
of ‘substitution’ where each character has a unique substitute character.
The student uses this method with the following character substitutions:
The student uses this method with the following character substitutions:
Message character
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
Substitute character
|
P
|
L
|
F
|
N
|
O
|
C
|
Q
|
U
|
D
|
Z
|
V
|
G
|
I
|
Message character
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
|
Substitute character
|
X
|
M
|
W
|
J
|
B
|
K
|
E
|
A
|
H
|
S
|
Y
|
R
|
T
|
Assume all messages are made up from the upper-case characters only.
Show the string after the message ATSEVEN is encrypted. ........................................................................................................................................................................................................................................................................ [2]
Show the string after the message ATSEVEN is encrypted. ........................................................................................................................................................................................................................................................................ [2]
Q6) The
encryption of data is widely used in computing.
(a) One application is online banking.
State two other applications where encryption is used.
Describe the reason for encrypting the data for each application.
Application 1 ................................................................................................................
Reason.......................................................................................................................
Application 2................................................................................................................
Reason ..................................................................................................................... [4]
(b) Explain the terms plain text and cipher text.
Plain text .......................................................................................................................
Cipher text ................................................................................................................[2]
(c) Symmetric encryption uses a single key.
Explain how a message is encrypted and decrypted using symmetric encryption. ........................................................................................................................................................................................................................................................................................... [3]
(a) One application is online banking.
State two other applications where encryption is used.
Describe the reason for encrypting the data for each application.
Application 1 ................................................................................................................
Reason.......................................................................................................................
Application 2................................................................................................................
Reason ..................................................................................................................... [4]
(b) Explain the terms plain text and cipher text.
Plain text .......................................................................................................................
Cipher text ................................................................................................................[2]
(c) Symmetric encryption uses a single key.
Explain how a message is encrypted and decrypted using symmetric encryption. ........................................................................................................................................................................................................................................................................................... [3]
(d) Authorisation and authentication are processes designed to
protect the computer system and data.Give one technique used for each.
Authorisation .................................................................................................................
Authentication ......................................................................................................... [2]
Authorisation .................................................................................................................
Authentication ......................................................................................................... [2]
Winter 2014 P13
Data
sent across the Internet are frequently encrypted. The following flowchart
shows a basic encryption method (Note: the → symbol
in the flowchart means “is replaced by”).
(c)
Many customers shop online. Apart from
encryption, describe three other
security features built into many online shopping websites.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
0 comments:
Post a Comment