Encryption (CIE IGCSE Computer Science)

Topic Questions

1
Sme Calculator
5 marks

Complete the sentences about symmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

               algorithm      cipher        copied         delete          key            plain

              private            public        standard      stolen    understood    unreadable

The data before encryption is known as .................................................. text.

To scramble the data, an encryption .................................................., which is a type of .................................................., is used.

The data after encryption is known as .................................................. text.

Encryption prevents the data from being .................................................. by a hacker.

[5]

Did this page help you?

2
Sme Calculator
5 marks

Elsa writes a paragraph in an examination about encryption.

There are several terms missing from the paragraph.

Complete the paragraph using the list of given terms. Not all terms may need to be used.

Some terms may be used more than once.

  • algorithm
  • alphanumeric
  • cookie
  • cypher
  • key
  • padlock
  • plain
  • word processed

The data is encrypted using a .......................................... This is an ....................................... that is used to scramble the data. The data before encryption is known as ........................................ text. When the data has been encrypted it is known as ......................... text. To read the encrypted data it needs to be decrypted using a .................................... .

[5]

Did this page help you?

3a
Sme Calculator
4 marks

In a simple symmetric encryption system, each letter of the alphabet is substituted with another.

The plain text message:

The quick brown fox jumps over the lazy dog.

becomes the cypher text message:

Zag towvs jumpy dmh coilr mngu zag bfke qmx.

a)

i)
Decode this cypher text message.

Agbbm Pmubq

[2]

ii)
Convert these words to cypher text.

Computer Science

[2]

3b
Sme Calculator
2 marks
b)
Both the person who sends the message and the person who receives it need to know what the substitution key is, and they need to keep this secret. A copy of the substitution key has been sent using SSL transmission.

i)
What is meant by SSL?
[1]
ii)
How does SSL keep the copy of the key secret during transmission?
[1]

Did this page help you?