Encryption is the conversion of data into secret code. Encryption is used to protect data from unauthorized access. Simple encryptions may substitute letters for numbers or rotating letters in the alphabet. Complex encryptions may make use of sophisticated computer algorithms. To read an encrypted file, we need the right decryption key. We can use the decryption key to transcribe the encrypted data back to its original form. There are two types of encryption - asymmetric encryption (public-key encryption) and symmetric encryption. Asymmetric encryption uses two keys - a public key known to everyone to encrypt messages and a private key known only to the recipient to decrypt the message. The message is encrypted by the public key and can be decrypted by the corresponding private key. Symmetric encryption uses the same key to encrypt and decrypt the message. |

Encryption is the conversion of data into secret code. Encryption is used to protect data from unauthorized access. Simple encryptions may substitute letters for numbers or rotating letters in the alphabet. Complex encryptions may make use of sophisticated computer algorithms. To read an encrypted file, we need the right decryption key. We can use the decryption key to transcribe the encrypted data back to its original form. There are two types of encryption - asymmetric encryption (public-key encryption) and symmetric encryption. Asymmetric encryption uses two keys - a public key known to everyone to encrypt messages and a private key known only to the recipient to decrypt the message. The message is encrypted by the public key and can be decrypted by the corresponding private key. Symmetric encryption uses the same key to encrypt and decrypt the message. |

**Level:**

**Duration:**

Encryption is the conversion of data into secret code. Encryption is used to protect data from unauthorized access. Simple encryptions may substitute letters for numbers or rotating letters in the alphabet. Complex encryptions may make use of sophisticated computer algorithms. To read an encrypted file, we need the right decryption key. We can use the decryption key to transcribe the encrypted data back to its original form. There are two types of encryption - asymmetric encryption (public-key encryption) and symmetric encryption. Asymmetric encryption uses two keys - a public key known to everyone to encrypt messages and a private key known only to the recipient to decrypt the message. The message is encrypted by the public key and can be decrypted by the corresponding private key. Symmetric encryption uses the same key to encrypt and decrypt the message. |

**Level:**

**Duration:**

Resources

Essential Information

- Teachers
- Students
- Knowledge Base - Laws and Legislation
- IT Security - Antivirus Software
- IT Security - Cookies
- IT Security - Encryption
- IT Security - Filtering Software
- IT Security - Firewall
- IT Security - POP3
- IT Security - Public Key Infrastructure (PKI)
- IT Security - Secure Sockets Layer
- IT Security - Two Factors Authentication
- IT Security - Wireless connection

- Parents

Lesson Plans

- 01 - 'What and Why' in the use of Internet
- 02 - Overview of CESY
- 03 - Networking Basics
- 04 - Crime Rating
- 05 - Intellectual Property Rights
- 06 - Net-community
- 07 - Reliability of information and trustworthiness of humankind on the Internet
- 08 - Overuse of the Internet
- 09 - Advancement of technology
- 10 - Promotion of Cyber Ethics in school context and at home

Alternative Approach