Symmetric and Asymmetric Encryption
Visit for more Learning Resources
30.2
Symmetric-key cryptography
30.3
In symmetric-key cryptography, the same key is used
by the sender(for encryption) and the receiver (for
decryption).
The key is shared.
Algorithm: DES,3DES
Note
Symmetric-key cryptography
• Advantages:
– Simple
– Faster
• Disadvantages:
– Key must exchanges in secure way
– Easy for hacker to get a key as it is passed in
unsecure way.
30.5
Figure 30.4 Asymmetric-key cryptography
30.6
An asymmetric-key (or public-key) cipher uses two
keys: one private (To encrypt data) and one public(To
decrypt data).
Note
• Asymmetric Key Cryptography (Public Key Cryptography)
– 2 different keys are used
– Users get the Key from an Certificate Authority
Advantages
1. More Secured
2. Authentication
Disadvantages
1. Relatively Complex
30.8
Figure 30.6 Comparison between two categories of cryptography
• Asymmetric encryption use two keys, one to encrypt the
data, and another key to decrypt the data.
• These keys are generated together
• . One is named as Public key and is distributed freely. The
other is named as Private Key and it is kept hidden.
• Both Sender & Recipient has to share their Public Keys for
Encryption and has to use their Private Keys for Decryption.
How it WORKS…….?
 Asymmetric encryption use two keys:
Public Key - to encrypt the data
Private Key - to decrypt the data
 These keys are generated together.
 The Public key(s) is distributed freely between the sender and receiver.
 The other is named as Private Key and it is kept hidden.
 The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
Key Points in Asymmetric Encryption
Asymmetric Encryption Algorithms
RSA:
Digital Signature Algorithm:
Diffie-Helman:.
© 2013, Triad Square InfoSec Pvt. Ltd
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means that you can
encrypt the message with my public key and only I can decrypt it with my private key.
Non-repudiation means that you can "sign" the message with your private key and I can
verify that it came from you with your public key.)
De-Merits:
Asymmetric Encryption algorithms are comparatively complex.
Time consuming process for Encryption and Decryption.
MERITS & DE-MERITS
© 2013, Triad Square InfoSec
Pvt. Ltd
For more detail contact us

Symmetric and Asymmetric Encryption.ppt

  • 1.
    Symmetric and AsymmetricEncryption Visit for more Learning Resources
  • 2.
  • 3.
    30.3 In symmetric-key cryptography,the same key is used by the sender(for encryption) and the receiver (for decryption). The key is shared. Algorithm: DES,3DES Note
  • 4.
    Symmetric-key cryptography • Advantages: –Simple – Faster • Disadvantages: – Key must exchanges in secure way – Easy for hacker to get a key as it is passed in unsecure way.
  • 5.
  • 6.
    30.6 An asymmetric-key (orpublic-key) cipher uses two keys: one private (To encrypt data) and one public(To decrypt data). Note
  • 7.
    • Asymmetric KeyCryptography (Public Key Cryptography) – 2 different keys are used – Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex
  • 8.
    30.8 Figure 30.6 Comparisonbetween two categories of cryptography
  • 9.
    • Asymmetric encryptionuse two keys, one to encrypt the data, and another key to decrypt the data. • These keys are generated together • . One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden. • Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption.
  • 10.
  • 11.
     Asymmetric encryptionuse two keys: Public Key - to encrypt the data Private Key - to decrypt the data  These keys are generated together.  The Public key(s) is distributed freely between the sender and receiver.  The other is named as Private Key and it is kept hidden.  The Private Key is only used for Decryption and will not be shared between the sender and receiver. Key Points in Asymmetric Encryption
  • 12.
    Asymmetric Encryption Algorithms RSA: DigitalSignature Algorithm: Diffie-Helman:. © 2013, Triad Square InfoSec Pvt. Ltd
  • 13.
    Merits:  Two partiesdon't need to have their private keys already shared in order to communicate using encryption.  Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. MERITS & DE-MERITS © 2013, Triad Square InfoSec Pvt. Ltd
  • 14.
    For more detailcontact us