10. Software protection


This is a method of scrambling data in such a way that only the people who have the 'secret key' to unlock the message can read it.

This is an example of ordinary text:

Humpty Dumpty sat on a wall.

Humpty Dumpty had a big fall.

This is what an encrypted code for the text would look like:



You obviously have to keep the "secret keys" safe from prying eyes.

Challenge see if you can find out one extra fact on this topic that we haven't already told you

Click on this link: Encryption