Symmetric and Asymmetric Encryption

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Signatures. Anononymity and the Internet.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Encryption Methods By: Michael A. Scott
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
James Higdon, Sameer Sherwani
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Web Security.
Web Applications Security Cryptography 1
Digital Signatures.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
1. Public Key Encryption (A Simple Case)
Cryptography Dr. X.
Public-Key Cryptography and Message Authentication
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Privacy & Security.
Public Key Encryption Systems
e-Health Platform End 2 End encryption
Reactive Android Development
Introduction Used for communication to verify
Security.
Public-Key Cryptography and RSA
Uses Uses of cryptography Lab today on RSA
Cryptography and Security Technologies
Cryptography.
Asynchronous Cryptology: Implementations and Applications
IS3230 Access Security Unit 9 PKI and Encryption
Digital Signatures Last Updated: Oct 14, 2017.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
PART VII Security.
Security.
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Electronic Mail Security
NET 311 Information Security
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Install AD Certificate Services
Public-Key, Digital Signatures, Management, Security
Chapter -8 Digital Signatures
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Chapter 29 Cryptography and Network Security
Advanced Computer Networks
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Asymmetric Cryptographic Algorithms
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
Public Key Encryption Systems
Introduction to Cryptography
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Symmetric and Asymmetric Encryption Visit for more Learning Resources

Symmetric-key cryptography

Note In symmetric-key cryptography, the same key is used by the sender(for encryption) and the receiver (for decryption). The key is shared. Algorithm: DES,3DES

Symmetric-key cryptography Advantages: Simple Faster Disadvantages: Key must exchanges in secure way Easy for hacker to get a key as it is passed in unsecure way.

Figure 30.4 Asymmetric-key cryptography

Note An asymmetric-key (or public-key) cipher uses two keys: one private (To encrypt data) and one public(To decrypt data).

Asymmetric Key Cryptography (Public Key Cryptography) 2 different keys are used Users get the Key from an Certificate Authority Advantages More Secured Authentication Disadvantages Relatively Complex

Figure 30.6 Comparison between two categories of cryptography

Asymmetric encryption use two keys, one to encrypt the data, and another key to decrypt the data. These keys are generated together . One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden. Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption.

How it WORKS…….?

Asymmetric encryption use two keys: Public Key - to encrypt the data Key Points in Asymmetric Encryption Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data These keys are generated together. The Public key(s) is distributed freely between the sender and receiver. The other is named as Private Key and it is kept hidden. The Private Key is only used for Decryption and will not be shared between the sender and receiver.

Digital Signature Algorithm: Diffie-Helman:. Asymmetric Encryption Algorithms RSA: Digital Signature Algorithm: Diffie-Helman:. © 2013, Triad Square InfoSec Pvt. Ltd

MERITS & DE-MERITS Merits: Two parties don't need to have their private keys already shared in order to communicate using encryption. Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. © 2013, Triad Square InfoSec Pvt. Ltd

For more detail contact us