Note that your final mark will not be saved in the system.
12 - Data Representation GapFill
You must fill all the gaps before clicking ‘Check Answers!’
Encryption of text data involves processing – that's the unencrypted text – with some kind of – an algorithm that turns it into a form that does not make sense to a human reader. That form is called , and it must be subsequently before it can be put to any use.
There are various means of doing this, to varying degrees of sophistication. Some systems use one or more keys to encrypt and decrypt the data. In encryption, the same key is used to encrypt the data as to decrypt it. This form of encryption is often used for data storage and encrypting , in part because it's than the alternative method.
That alternative method, where security is a higher priority than speed, is called encryption, and it works slightly differently. When a host needs to encrypt a piece of data, it uses the key of the . That key cannot then decrypt the data. The encrypted data is sent, whereupon the recipient host uses the key of the in order to the data.