Understand the need for and purpose of encryption when transmitting data (AO1, AO2).
Data travelling over a network can be intercepted by anyone who can access the transmission medium. Encryption protects that data by converting it into a form that cannot be understood without the correct key.
Three simple steps describe how data are protected during transmission.
Note: The mathematical notation C = E_K(P) and P = D_K(C) is shown only to illustrate the idea – the IGCSE exam does not require you to use or memorise such formulas.
| Type | Key usage (syllabus wording) | Typical algorithms (key lengths) | Advantages | Disadvantages / caveats |
|---|---|---|---|---|
| Symmetric (secret‑key) | Same key for encryption and decryption | AES‑128, AES‑256, DES (historical), 3DES | Fast, low computational cost – suitable for encrypting large amounts of data. | Key‑distribution problem – every party must share the secret key securely. DES’s 56‑bit key is no longer safe. |
| Asymmetric (public‑key) | Public key encrypts; private key decrypts | RSA 2048 (or larger), ECC (e.g., Curve25519) | Secure key exchange without a pre‑shared secret; supports digital signatures. | Slower and requires larger keys for comparable security; normally used only to exchange a symmetric session key. |
These numbers are illustrative only; the exam does not require memorising exact lengths.
Effective encryption relies on how keys are generated, stored, exchanged and revoked.
When assessing an encryption solution, consider each of the following criteria.
| Criterion | 0 marks | 1 mark | 2 marks |
|---|---|---|---|
| Confidentiality | No mention of secrecy. | Identifies that encryption provides secrecy. | Explains how the chosen method prevents unauthorised reading of data. |
| Integrity | No reference to tampering. | Mentions a hash/MAC. | Describes how the hash/MAC detects changes and why it is needed. |
| Authentication | Absent. | Notes that the method can verify identity. | Explains the mechanism (e.g., digital signature) and its benefit. |
| Performance | No comment on speed. | States that the method is “fast” or “slow”. | Provides a reasoned comparison (e.g., symmetric vs. asymmetric) and relevance to the scenario. |
| Key management | No discussion. | Identifies a key‑distribution issue. | Evaluates generation, storage, distribution and revocation in context. |
| Cost & future‑proofing | Ignored. | Mentions cost or future security. | Gives a balanced view of expense and whether the key length is up‑to‑date. |
Scenario: A school wants to send students’ exam results to parents over the Internet. The data must remain private and any tampering must be detectable. Which type of encryption would you recommend and why?
Students should:
“Which encryption method would you recommend for a small school network and why? Consider security, speed, and key management.”
Students discuss in pairs, then share ideas with the class, using the evaluation checklist and rubric to justify their choice.
Encryption is essential for protecting data during transmission. It provides confidentiality, helps detect tampering (integrity), can verify identity (authentication) and, when combined with digital signatures, offers non‑repudiation. Knowing the differences between symmetric (secret‑key) and asymmetric (public‑key) encryption, the relevance of key length, and the challenges of key management enables students to evaluate real‑world solutions such as HTTPS, VPNs, secure email, mobile banking and a school’s encrypted online learning platform.
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.