Search Header Logo
Unit 2 Data transmission and encryption T4 Encryption

Unit 2 Data transmission and encryption T4 Encryption

Assessment

Presentation

Computers

10th Grade

Practice Problem

Easy

Created by

Michael Harrington

Used 9+ times

FREE Resource

11 Slides • 16 Questions

1

Unit 2 Data transmission and encryption T4 Encryption

By Michael Harrington

2

media

3

media

4

Fill in the Blanks

5

Fill in the Blanks

6

media

7

media

8

Open Ended

Why do you think there is need a for encryption?

9

media

10

media

11

Labelling

In symmetric encryption, a key is first shared between the sender and receiver

Add the correct labels

Drag labels to their correct position on the image
Sender
Encrypted text
Plaintext received
encryption
Receiver
password
Plaintext sent
Secret shared key

12

Open Ended

What happens to the encryption key in symmetric encryption?

13

media

14

media

15

Open Ended

In asymmetric encryption, two keys are created by the receiver - what are they called?

16

Labelling

Asymmetric encryption

Add the correct labels

Drag labels to their correct position on the image

Plaintext - Right

Public Key

Lock

The lazy dog

The quick fox

Plaintext - Left

Generated

Private Key

Symetric

Encrypted text

17

media

18

Multiple Choice

Web pages that are shared using HTTPS make use of encryption - What do these letters stand for?

1

Hypertext transfer secure protocol

2

Hypertext Harrington protocol secure

3

Hyper transfertext protocol secure

4

Hypertext transfer protocol secure

19

media

20

Multiple Choice

which is -

encode data into an unreadable form

1

Encrypt

2

Decrypt

3

Public key

4

Symmetric encryption

5

Asymmetric encryption

21

Multiple Choice

which is a

a public key is used to encrypt the data; a private key is used to decrypt the data

1

Encrypt

2

Decrypt

3

Public key

4

Symmetric encryption

5

Asymmetric encryption

22

Multiple Choice

which is a -

a key that anyone may see and use to encrypt data before it is sent to someone

1

Encrypt

2

Decrypt

3

Public key

4

Symmetric encryption

5

Asymmetric encryption

23

Multiple Choice

which is a

decode encrypted data back into plaintext

1

Encrypt

2

Decrypt

3

Public key

4

Symmetric encryption

5

Asymmetric encryption

24

Multiple Choice

which is a

a private shared key is used to encrypt and decrypt the data

1

Encrypt

2

Decrypt

3

Public key

4

Symmetric encryption

5

Asymmetric encryption

25

Labelling

Asymmetric encryption

Both keys are generated by the receiver

Add the correct labels

Drag labels to their correct position on the image

Green Key

Padlock

Plaintext sent

Plaintext received

Sender

Red Key

Public key

Receiver

Private key

Encrypted text

26

Reorder

Question image

Reorder the following steps as they occur:

See the diagram which shows how asymmetric encryption is used when transmitting a web page from a server to a user using HTTPS.

Each number is a step

Request the web browser's public key access

Browser sends public key

The server combines the web page with the public key to encrypt the web page

The encrypted page is transmitted

The web broswer's private key is combined with the encrypted web page to decrypt it

1
2
3
4
5

27

Open Ended

Find out what the word symmetry means (if you do not know). Now explain how this word symmetry will help you remember which encryption is which.

Unit 2 Data transmission and encryption T4 Encryption

By Michael Harrington

Show answer

Auto Play

Slide 1 / 27

SLIDE