Symmetric and asymmetric encryption methods are compared. Symmetric encryption uses a single shared key for encryption and decryption while asymmetric encryption uses two separate keys: a public key for encryption and a private key for decryption. The main advantages of symmetric encryption are that it is simple and fast but key distribution is insecure. Asymmetric encryption is more secure for key distribution since users only need to share public keys, but it is more complex computationally.
This slide introduces symmetric and asymmetric encryption as essential concepts in cryptography.
Discusses symmetric-key cryptography where the same key is used for both encryption and decryption. Key terms include DES, 3DES, advantages, and disadvantages.
Defines asymmetric-key cryptography using a public and private key, explaining how they work together for secure communication.
Lists asymmetric encryption algorithms (RSA, Digital Signature, Diffie-Hellman) and discusses their merits and demerits.
This slide provides contact information for additional details about the presented cryptography topics.
30.3
In symmetric-key cryptography,the same key is used
by the sender(for encryption) and the receiver (for
decryption).
The key is shared.
Algorithm: DES,3DES
Note
4.
Symmetric-key cryptography
• Advantages:
–Simple
– Faster
• Disadvantages:
– Key must exchanges in secure way
– Easy for hacker to get a key as it is passed in
unsecure way.
30.6
An asymmetric-key (orpublic-key) cipher uses two
keys: one private (To encrypt data) and one public(To
decrypt data).
Note
7.
• Asymmetric KeyCryptography (Public Key Cryptography)
– 2 different keys are used
– Users get the Key from an Certificate Authority
Advantages
1. More Secured
2. Authentication
Disadvantages
1. Relatively Complex
• Asymmetric encryptionuse two keys, one to encrypt the
data, and another key to decrypt the data.
• These keys are generated together
• . One is named as Public key and is distributed freely. The
other is named as Private Key and it is kept hidden.
• Both Sender & Recipient has to share their Public Keys for
Encryption and has to use their Private Keys for Decryption.
Asymmetric encryptionuse two keys:
Public Key - to encrypt the data
Private Key - to decrypt the data
These keys are generated together.
The Public key(s) is distributed freely between the sender and receiver.
The other is named as Private Key and it is kept hidden.
The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
Key Points in Asymmetric Encryption