SlideShare a Scribd company logo
Symmetric &
Asymmetric encryption

© 2013, Triad Square InfoSec Pvt. Ltd
SYMMETRIC ENCRYPTION

 An encryption system in which the sender and receiver
of a message share a single, common key that is used to
encrypt and decrypt the message.
 In other terms, Data is encrypted and decrypted using
the same key.
 Symmetric-key cryptography is sometimes called secretkey cryptography.

© 2013, Triad Square InfoSec Pvt. Ltd
SYMMETRIC ENCRYPTION (cont..)

(Plain text)

(Plain text)

Hello world

Hello world
(cipher text)

#%giuyrwkmns:{?

Encryption

Decryption
Shared same secret key
© 2013, Triad Square InfoSec Pvt. Ltd
 Symmetric-key systems are simpler and faster, but their
main drawback is that the two parties must somehow
exchange the key in a secure way. Public-key encryption
avoids this problem because the public key can be
distributed in a non-secure way, and the private key is
never transmitted, Public-key encryption avoids this
problem because the public key can be distributed in a
non-secure way, and the private key is never
transmitted.

 Examples of symmetric algorithms are DES, 3DES and
AES
© 2013, Triad Square InfoSec Pvt. Ltd
 The most popular symmetric-key system is the Data
Encryption Standard (DES).
 DES uses 56-bit keys, they are short enough to be easily
brute-forced by modern hardware and it is recommended
that DES should not to be used.
 Triple DES (or 3DES) uses 128 bits key length, the same
algorithm, applied three times to produce strong
encryption.
© 2013, Triad Square InfoSec Pvt. Ltd
MERITS & DE-MERITS
Merits:
SIMPLER
FASTER

De-Merits:
Two parties must somehow exchange the key in a secure way.
Public key is distributed in a non-secure way b/n Client/Server.
Easy for hackers to get the key as it is shared in unsecure way.
© 2013, Triad Square InfoSec Pvt. Ltd
Asymmetric encryption:
Asymmetric encryption use two keys, one to encrypt the
data, and another key to decrypt the data. These keys are
generated together. One is named as Public key and is
distributed freely. The other is named as Private Key and it
is kept hidden.
Both Sender & Recipient has to share their Public Keys for
Encryption and has to use their Private Keys for
Decryption.
© 2013, Triad Square InfoSec Pvt. Ltd
How it WORKS…….?

© 2013, Triad Square InfoSec Pvt. Ltd
Key Points in Asymmetric Encryption

 Asymmetric encryption use two keys:
Public Key - to encrypt the data
Private Key - to decrypt the data
 These keys are generated together.
 The Public key(s) is distributed freely between the sender and
receiver.
 The other is named as Private Key and it is kept hidden.
 The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
© 2013, Triad Square InfoSec Pvt. Ltd
Asymmetric Encryption Algorithms
RSA: Rivest-Shamir-Adleman is the most commonly used asymmetric algorithm
(public key algorithm). It can be used both for encryption and for digital signatures.
Digital Signature Algorithm: The standard defines DSS to use the SHA-1 hash
function exclusively to compute message. The main problem with DSA is the fixed
subgroup size (the order of the generator element), which limits the security to

around only 80 bits. Hardware attacks can be menacing to some implementations of
DSS. However, it is widely used and accepted as a good algorithm.
Diffie-Helman: Diffie-Hellman is the first asymmetric encryption algorithm,
invented in 1976, using discrete logarithms in a finite field. Allows two users to
exchange a secret key over an insecure medium without any prior secrets.
© 2013, Triad Square InfoSec Pvt. Ltd
Asymmetric Encryption Algorithms
ElGamal: The ElGamal is a public key cipher - an asymmetric key encryption
algorithm for public-key cryptography which is based on the Diffie-Hellman key

agreement. ElGamal is the predecessor of DSA.
ECDSA: Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature
Algorithm (DSA) which operates on elliptic curve groups. As with Elliptic Curve
Cryptography in general, the bit size of the public key believed to be need ECDSA

is about twice the size of the security level, in bits.
XTR: It is based on the primitive underlying the very first public key cryptosystem,
the Diffie-Hellman key agreement protocol. Some advantages of XTR are its fast
key generation (much faster than RSA), small key sizes (much smaller than RSA,
comparable with ECC for current security settings), and speed.
© 2013, Triad Square InfoSec Pvt. Ltd
MERITS & DE-MERITS
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means that
you can encrypt the message with my public key and only I can decrypt it with my
private key. Non-repudiation means that you can "sign" the message with your

private key and I can verify that it came from you with your public key.)

De-Merits:
Asymmetric Encryption algorithms are comparatively complex.
Time consuming process for Encryption and Decryption.

© 2013, Triad Square InfoSec Pvt. Ltd
Ad

More Related Content

What's hot (20)

Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 

Viewers also liked (6)

13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Certification authority
Certification   authorityCertification   authority
Certification authority
proser tech
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
Fatma Ala'a
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Certification authority
Certification   authorityCertification   authority
Certification authority
proser tech
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
Fatma Ala'a
 
Ad

Similar to Symmetric and asymmetric key (20)

DIS- Symmetric and Asymmetric Encryption.ppt
DIS- Symmetric and Asymmetric Encryption.pptDIS- Symmetric and Asymmetric Encryption.ppt
DIS- Symmetric and Asymmetric Encryption.ppt
senthilkumarm93
 
Symmetric and Asymmetric Encryption infosec.ppt
Symmetric and Asymmetric Encryption infosec.pptSymmetric and Asymmetric Encryption infosec.ppt
Symmetric and Asymmetric Encryption infosec.ppt
AhamedTuani
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
cryptography
cryptographycryptography
cryptography
swatihans
 
IoT_3 going for the task of uploading .pptx
IoT_3 going for the task of uploading .pptxIoT_3 going for the task of uploading .pptx
IoT_3 going for the task of uploading .pptx
MuhammadWaqasHaider4
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
SayeeKumarMadhesh
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Tokenization vs Encryption Difference Explained.pdf
Tokenization vs Encryption Difference  Explained.pdfTokenization vs Encryption Difference  Explained.pdf
Tokenization vs Encryption Difference Explained.pdf
imoliviabennett
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
Prateek Pandey
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
IJNSA Journal
 
DIS- Symmetric and Asymmetric Encryption.ppt
DIS- Symmetric and Asymmetric Encryption.pptDIS- Symmetric and Asymmetric Encryption.ppt
DIS- Symmetric and Asymmetric Encryption.ppt
senthilkumarm93
 
Symmetric and Asymmetric Encryption infosec.ppt
Symmetric and Asymmetric Encryption infosec.pptSymmetric and Asymmetric Encryption infosec.ppt
Symmetric and Asymmetric Encryption infosec.ppt
AhamedTuani
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
cryptography
cryptographycryptography
cryptography
swatihans
 
IoT_3 going for the task of uploading .pptx
IoT_3 going for the task of uploading .pptxIoT_3 going for the task of uploading .pptx
IoT_3 going for the task of uploading .pptx
MuhammadWaqasHaider4
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
SayeeKumarMadhesh
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Tokenization vs Encryption Difference Explained.pdf
Tokenization vs Encryption Difference  Explained.pdfTokenization vs Encryption Difference  Explained.pdf
Tokenization vs Encryption Difference Explained.pdf
imoliviabennett
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
IJNSA Journal
 
Ad

Recently uploaded (20)

Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 

Symmetric and asymmetric key

  • 1. Symmetric & Asymmetric encryption © 2013, Triad Square InfoSec Pvt. Ltd
  • 2. SYMMETRIC ENCRYPTION  An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message.  In other terms, Data is encrypted and decrypted using the same key.  Symmetric-key cryptography is sometimes called secretkey cryptography. © 2013, Triad Square InfoSec Pvt. Ltd
  • 3. SYMMETRIC ENCRYPTION (cont..) (Plain text) (Plain text) Hello world Hello world (cipher text) #%giuyrwkmns:{? Encryption Decryption Shared same secret key © 2013, Triad Square InfoSec Pvt. Ltd
  • 4.  Symmetric-key systems are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted, Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted.  Examples of symmetric algorithms are DES, 3DES and AES © 2013, Triad Square InfoSec Pvt. Ltd
  • 5.  The most popular symmetric-key system is the Data Encryption Standard (DES).  DES uses 56-bit keys, they are short enough to be easily brute-forced by modern hardware and it is recommended that DES should not to be used.  Triple DES (or 3DES) uses 128 bits key length, the same algorithm, applied three times to produce strong encryption. © 2013, Triad Square InfoSec Pvt. Ltd
  • 6. MERITS & DE-MERITS Merits: SIMPLER FASTER De-Merits: Two parties must somehow exchange the key in a secure way. Public key is distributed in a non-secure way b/n Client/Server. Easy for hackers to get the key as it is shared in unsecure way. © 2013, Triad Square InfoSec Pvt. Ltd
  • 7. Asymmetric encryption: Asymmetric encryption use two keys, one to encrypt the data, and another key to decrypt the data. These keys are generated together. One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden. Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption. © 2013, Triad Square InfoSec Pvt. Ltd
  • 8. How it WORKS…….? © 2013, Triad Square InfoSec Pvt. Ltd
  • 9. Key Points in Asymmetric Encryption  Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data  These keys are generated together.  The Public key(s) is distributed freely between the sender and receiver.  The other is named as Private Key and it is kept hidden.  The Private Key is only used for Decryption and will not be shared between the sender and receiver. © 2013, Triad Square InfoSec Pvt. Ltd
  • 10. Asymmetric Encryption Algorithms RSA: Rivest-Shamir-Adleman is the most commonly used asymmetric algorithm (public key algorithm). It can be used both for encryption and for digital signatures. Digital Signature Algorithm: The standard defines DSS to use the SHA-1 hash function exclusively to compute message. The main problem with DSA is the fixed subgroup size (the order of the generator element), which limits the security to around only 80 bits. Hardware attacks can be menacing to some implementations of DSS. However, it is widely used and accepted as a good algorithm. Diffie-Helman: Diffie-Hellman is the first asymmetric encryption algorithm, invented in 1976, using discrete logarithms in a finite field. Allows two users to exchange a secret key over an insecure medium without any prior secrets. © 2013, Triad Square InfoSec Pvt. Ltd
  • 11. Asymmetric Encryption Algorithms ElGamal: The ElGamal is a public key cipher - an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. ElGamal is the predecessor of DSA. ECDSA: Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which operates on elliptic curve groups. As with Elliptic Curve Cryptography in general, the bit size of the public key believed to be need ECDSA is about twice the size of the security level, in bits. XTR: It is based on the primitive underlying the very first public key cryptosystem, the Diffie-Hellman key agreement protocol. Some advantages of XTR are its fast key generation (much faster than RSA), small key sizes (much smaller than RSA, comparable with ECC for current security settings), and speed. © 2013, Triad Square InfoSec Pvt. Ltd
  • 12. MERITS & DE-MERITS Merits:  Two parties don't need to have their private keys already shared in order to communicate using encryption.  Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. © 2013, Triad Square InfoSec Pvt. Ltd