Starter

Write as many single words that come to mind when you hear the word “encryption”.

Encryption

Learning Intentions

  • Understand and be able to explain the terms ‘encryption’ and ‘decryption’

  • Understand the purpose, advantages and disadvantages of encryption

Success Criteria

  • I can explain the term encryption
  • I can explain the need for encryption

What is encryption?

  • “the process of converting information or data into a code, especially to prevent unauthorized access.”

What is encryption?

  • “the process of converting information or data into a code, especially to prevent unauthorized access.”

Converting from one value to another

  • Conversion is an important part of computer science.

  • Any computer program is written in text and converted (properly known as compiled) into something else.

Converting from one value to another

  • Encryption involves conversion where an input value goes in and is processed into an output value.
     
  • Encryption involves transforming a human readable piece of data into something that is unreadable. 
     
  • For example using an encryption method: 
     
testword => ty/c3NIfUnz6jrZAU9jDeg==

Caesar Cipher

  • In around 50 BC, the Roman dictator Julius Caesar developed his own encryption method for communication with his front line commanders.
  • This became known as the Caesar Cipher and was one of the earliest types of encryption.
     

Caesar Cipher

  • It works by shifting each character in the alphabet along. Caesar used a shift of three so A became D and B became E and F became I.
  • By shifting the characters back the way the message could be decrypted and read.
  • Spaces remain the same!
  • If we shift each character in the alphabet along 4 we get:
     

Caesar Cipher

  • Complete the Caesar cipher part of the worksheet using a shift of four.
     

Caesar Cipher

  • Now encrypt the following:
    1. Today it is going to rain
       
    2. Meet me under the clock tower
       
    3. Go to Paris
       
Using a shift of 7

avkhf pa pz nvpun av yhpu

tlla tl bukly aol jsvjr avdly

nv av whypz

Reveal

Reveal

Reveal

Encryption is about being able to share information safely

  • During World War II encryption and decryption were very big parts of everyday battles to ensure that the enemy did not manage to get hold of vital information.

  • The Germans invented a machine called an Enigma machine that was used to encipher and decipher messages.

     

The world wide web

  • Have you ever noticed the little padlock at the top of the browser?

 

  • Most of the world’s websites are now encrypted using public and private key encryption. We are not going to go into too much detail about this, however.
  • In a nutshell, all that public key and private key encryption means is that all the data transmitted between the user’s web browser and the web server is encrypted.

Cookies

  • Browser cookies are small pieces of data that websites send and receive to and from the computer that has requested the website. They contain small amounts of data such as preferences or settings.

  • Cookies can be used to track a computer system by adding a small piece of data that uniquely identifies the computer system (not the user).

Cookies

  • These tracking cookies can then figure out things about the user such as the pages they visit on the website (although there are other ways for them to do this, so disabling cookies does not prevent the user being tracked), their interests and the computer system being used.

Your job is to encrypt a message that is up to 15 characters long using a Caesar cipher. Use a shift that you think is suitable.

Pass your message on to the next person but make sure to tell them the first letter of your message.

Now using the first letter, figure out the shift and then the message.

Task

JB
Cybersecurity : 4.1 Encryption
© J Balfour
Tools