Cryptography

Req 6a — Encryption Uses

6a.
Research and explain to your counselor three situations where encryption is used in cybersecurity. For each situation, describe what kind of encryption is used and why it is important.

Encryption is the art of turning readable information into scrambled nonsense that only authorized people can unscramble. It has been used for thousands of years — Julius Caesar shifted letters in his military messages, and the Enigma machine encrypted Nazi communications in World War II. Today, encryption is everywhere. Every time you see a padlock icon in your browser, encryption is at work.

How Encryption Works (The Short Version)

Encryption uses a key (a piece of mathematical information) to scramble data. Only someone with the correct key can unscramble it. There are two main approaches:

Three Situations Where Encryption Is Used

Here are several real-world situations to consider for your counselor discussion. You need three — research these or find your own.

1. HTTPS Web Browsing

Every time you visit a website with “https://” in the URL and a padlock icon, your connection is encrypted using TLS (Transport Layer Security). This prevents anyone between you and the website — your ISP, a hacker on the same Wi-Fi, or a government — from reading the data you exchange.

You will explore this hands-on in Req 6b.

2. Messaging Apps (End-to-End Encryption)

Apps like Signal, WhatsApp, and iMessage use end-to-end encryption (E2EE), which means messages are encrypted on your device and only decrypted on the recipient’s device. Not even the app company can read your messages.

3. Full-Disk Encryption

Full-disk encryption scrambles everything on your hard drive or phone storage. If someone steals your device, they cannot read your files without your password — even if they remove the hard drive and connect it to another computer.

Other Situations to Consider

Preparing for Your Counselor

For each of your three situations, be ready to explain:

  1. What data is being protected and from whom
  2. What type of encryption is used (symmetric, asymmetric, or both)
  3. Why encryption is important in that specific situation — what would happen without it?
The Need for Encryption — Khan Academy Interactive lessons on why encryption exists, how it works, and where it is used in everyday life.
Diagram comparing symmetric encryption (one shared key) and asymmetric encryption (public and private key pair)