
Encryption
Presentation
•
Computers
•
KG - Professional Development
•
Practice Problem
•
Easy
Yefta Mandalika
Used 5+ times
FREE Resource
12 Slides • 5 Questions
1
Encryption
CompSci
2
Encryption
A method of securing data for storage or transmission that scrambles it and makes it meaningless.
Encryption is the process of converting readable data (plaintext) into an unreadable form (ciphertext) to prevent unauthorized access.
3
Why data need to be encrypted?
Encryption is used to protect sensitive data (e.g. passwords, credit card numbers) from hackers or interception during transmission.
4
Vocabulary
Plain text is the data before encryption takes place.
Encryption key is a type of algorithm that is used to encrypt data.
Cipher text is scrambled data and meaningless data.
5
Multiple Choice
Scrambled data and meaningless data.
Cipher text
Encryption key
Plain text
6
Open Ended
The data before encryption takes place is the meaning of?
7
Open Ended
What is the meaning of encryption key?
8
Symmetric Encryption
Symmetric encryption is the method that is uses the same key to encrypt and decrypt the data.
Simple Analogy:
Whatsapp - sending & receiving message
Padlock - every people need to have ONE key to open and close.
Symmetric encryption is:
9
Symmetric
Plain text is encrypted into cipher text using an encryption key.
The cipher text and the encryption key are sent separately to the receiving device.
The same key is then used to decrypt the cipher text back into its plain text from
The process for symmetric encryption is:
10
11
Asymmetric Encryption
Asymmetric encryption uses two keys: a public key and a private key.
Simple Analogy:
HTTPS - Website use Public key to encrypting our password and Private key to decrypting our password.
Mailbox - All people can send/drop a mail to us, but only us can open it.
Asymmetric encryption is:
12
Asymmetric Encryption
(a) Public key – a key that is shared openly and used to encrypt data.
(b) Private key – a secret key kept by the owner and used to decrypt data.
Public & private key
13
Asymmetric
Plain text is encrypted into cipher text using a public key. This is also a type of encryption algorithm.
The cipher text is transmitted to the receiving device.
The cipher text cannot be decrypted using the public key, it is decrypted using a private key.
The process for asymmetric encryption is:
14
15
Open Ended
Which type of encryption that is use same key to encrypt and decrypt data?
16
Multiple Choice
What type of encryption is this?
Symmetric
Asymmetric
17
Thank you...
Encryption
CompSci
Show answer
Auto Play
Slide 1 / 17
SLIDE
Similar Resources on Wayground
12 questions
Formatting Tags - Font Tag
Presentation
•
7th - 8th Grade
15 questions
Programming
Presentation
•
6th Grade
15 questions
Parts of a Computer
Presentation
•
3rd - 4th Grade
13 questions
Mengenal Koneksi Internet
Presentation
•
8th Grade
16 questions
Data Representation - Sound
Presentation
•
9th - 11th Grade
10 questions
Sistem komputer
Presentation
•
10th Grade
11 questions
Wordpad
Presentation
•
2nd - 3rd Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade