How is encryption used in everyday life?
✅ secure online information
✅ ensures secure file storage
Where do we see encryption happening, even if we don’t realise it?
How can encryption systems be attacked?
Encryption is used to keep digital information secret and secure. It works by turning readable data (plaintext) into unreadable code (ciphertext), which can only be unlocked using a key.
Examples of encryption in use:
Secure websites (HTTPS): Protects your data when shopping or banking online.
Messaging apps: End-to-end encryption keeps conversations private.
File storage and backups: Encrypts documents on USB drives or cloud services.
Wi-Fi networks: Encryption protects your connection from being intercepted.
This refers to how encryption is built into systems and tools. Good implementation follows secure standards and avoids weak keys or shortcuts that could lead to vulnerabilities.
AES encryption is implemented in software and hardware for speed and security.
RSA encryption is often used for exchanging keys securely in secure email and websites.
SHA-256 hashing is implemented in password storage systems.
Using outdated encryption algorithms
Hardcoding keys into software
Weak key management or insecure storage of keys
Encryption is everywhere, often working in the background to protect our digital lives.
You’ll find encryption:
In your phone and apps
During online logins
In streaming services
Inside IoT devices like smart locks or garage doors
In healthcare systems to protect patient data
Encryption isn’t perfect — attackers can try to break it through cryptanalysis.
Cryptographic attacks include:
Brute-force attacks: Trying every possible key until one works.
Man-in-the-middle attacks: Intercepting and possibly altering data between two parties.
Side-channel attacks: Gaining information from how a system behaves (like timing or power usage).
Exploiting weak algorithms or poor implementation.
Understanding how these attacks work helps us build better, safer systems.