SlideShare a Scribd company logo
2
Most read
10
Most read
12
Most read
Symmetric &
Asymmetric encryption

Š 2013, Triad Square InfoSec Pvt. Ltd
SYMMETRIC ENCRYPTION

 An encryption system in which the sender and receiver
of a message share a single, common key that is used to
encrypt and decrypt the message.
 In other terms, Data is encrypted and decrypted using
the same key.
 Symmetric-key cryptography is sometimes called secretkey cryptography.

Š 2013, Triad Square InfoSec Pvt. Ltd
SYMMETRIC ENCRYPTION (cont..)

(Plain text)

(Plain text)

Hello world

Hello world
(cipher text)

#%giuyrwkmns:{?

Encryption

Decryption
Shared same secret key
Š 2013, Triad Square InfoSec Pvt. Ltd
 Symmetric-key systems are simpler and faster, but their
main drawback is that the two parties must somehow
exchange the key in a secure way. Public-key encryption
avoids this problem because the public key can be
distributed in a non-secure way, and the private key is
never transmitted, Public-key encryption avoids this
problem because the public key can be distributed in a
non-secure way, and the private key is never
transmitted.

 Examples of symmetric algorithms are DES, 3DES and
AES
Š 2013, Triad Square InfoSec Pvt. Ltd
 The most popular symmetric-key system is the Data
Encryption Standard (DES).
 DES uses 56-bit keys, they are short enough to be easily
brute-forced by modern hardware and it is recommended
that DES should not to be used.
 Triple DES (or 3DES) uses 128 bits key length, the same
algorithm, applied three times to produce strong
encryption.
Š 2013, Triad Square InfoSec Pvt. Ltd
MERITS & DE-MERITS
Merits:
SIMPLER
FASTER

De-Merits:
Two parties must somehow exchange the key in a secure way.
Public key is distributed in a non-secure way b/n Client/Server.
Easy for hackers to get the key as it is shared in unsecure way.
Š 2013, Triad Square InfoSec Pvt. Ltd
Asymmetric encryption:
Asymmetric encryption use two keys, one to encrypt the
data, and another key to decrypt the data. These keys are
generated together. One is named as Public key and is
distributed freely. The other is named as Private Key and it
is kept hidden.
Both Sender & Recipient has to share their Public Keys for
Encryption and has to use their Private Keys for
Decryption.
Š 2013, Triad Square InfoSec Pvt. Ltd
How it WORKS…….?

Š 2013, Triad Square InfoSec Pvt. Ltd
Key Points in Asymmetric Encryption

 Asymmetric encryption use two keys:
Public Key - to encrypt the data
Private Key - to decrypt the data
 These keys are generated together.
 The Public key(s) is distributed freely between the sender and
receiver.
 The other is named as Private Key and it is kept hidden.
 The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
Š 2013, Triad Square InfoSec Pvt. Ltd
Asymmetric Encryption Algorithms
RSA: Rivest-Shamir-Adleman is the most commonly used asymmetric algorithm
(public key algorithm). It can be used both for encryption and for digital signatures.
Digital Signature Algorithm: The standard defines DSS to use the SHA-1 hash
function exclusively to compute message. The main problem with DSA is the fixed
subgroup size (the order of the generator element), which limits the security to

around only 80 bits. Hardware attacks can be menacing to some implementations of
DSS. However, it is widely used and accepted as a good algorithm.
Diffie-Helman: Diffie-Hellman is the first asymmetric encryption algorithm,
invented in 1976, using discrete logarithms in a finite field. Allows two users to
exchange a secret key over an insecure medium without any prior secrets.
Š 2013, Triad Square InfoSec Pvt. Ltd
Asymmetric Encryption Algorithms
ElGamal: The ElGamal is a public key cipher - an asymmetric key encryption
algorithm for public-key cryptography which is based on the Diffie-Hellman key

agreement. ElGamal is the predecessor of DSA.
ECDSA: Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature
Algorithm (DSA) which operates on elliptic curve groups. As with Elliptic Curve
Cryptography in general, the bit size of the public key believed to be need ECDSA

is about twice the size of the security level, in bits.
XTR: It is based on the primitive underlying the very first public key cryptosystem,
the Diffie-Hellman key agreement protocol. Some advantages of XTR are its fast
key generation (much faster than RSA), small key sizes (much smaller than RSA,
comparable with ECC for current security settings), and speed.
Š 2013, Triad Square InfoSec Pvt. Ltd
MERITS & DE-MERITS
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means that
you can encrypt the message with my public key and only I can decrypt it with my
private key. Non-repudiation means that you can "sign" the message with your

private key and I can verify that it came from you with your public key.)

De-Merits:
Asymmetric Encryption algorithms are comparatively complex.
Time consuming process for Encryption and Decryption.

Š 2013, Triad Square InfoSec Pvt. Ltd

More Related Content

PPT
Cryptography
Suhepi Saputri
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PDF
Introduction to Cryptography
Seema Goel
 
PPTX
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
PPTX
Cryptography
subodh pawar
 
PPTX
Cryptography
prasham95
 
PDF
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
 
PPTX
Cryptography
Jens Patel
 
Cryptography
Suhepi Saputri
 
Cryptography and Network Security
Pa Van Tanku
 
Introduction to Cryptography
Seema Goel
 
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
Cryptography
subodh pawar
 
Cryptography
prasham95
 
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
 
Cryptography
Jens Patel
 

What's hot (20)

PPTX
Cryptography.ppt
kusum sharma
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Cryptography
jayashri kolekar
 
PPTX
Introduction to Cryptography
Md. Afif Al Mamun
 
PPT
block ciphers
Asad Ali
 
PPTX
cryptography
Abhijeet Singh
 
PPTX
Cryptography
Rutuja Solkar
 
PPT
overview of cryptographic techniques
Shubham Jain
 
PDF
Asymmetric Cryptography
UTD Computer Security Group
 
PPTX
Encryption ppt
Anil Neupane
 
PPTX
Cryptography and Information Security
Dr Naim R Kidwai
 
PPTX
Public Key Cryptosystem
Devakumar Kp
 
PPTX
Cryptography.ppt
Uday Meena
 
PPTX
Data encryption
Deepam Goyal
 
PPT
Secure Socket Layer
Naveen Kumar
 
PPTX
Key management
Sujata Regoti
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPTX
Block cipher modes of operation
harshit chavda
 
Cryptography.ppt
kusum sharma
 
Pgp pretty good privacy
Pawan Arya
 
Cryptography
Sidharth Mohapatra
 
Cryptography
jayashri kolekar
 
Introduction to Cryptography
Md. Afif Al Mamun
 
block ciphers
Asad Ali
 
cryptography
Abhijeet Singh
 
Cryptography
Rutuja Solkar
 
overview of cryptographic techniques
Shubham Jain
 
Asymmetric Cryptography
UTD Computer Security Group
 
Encryption ppt
Anil Neupane
 
Cryptography and Information Security
Dr Naim R Kidwai
 
Public Key Cryptosystem
Devakumar Kp
 
Cryptography.ppt
Uday Meena
 
Data encryption
Deepam Goyal
 
Secure Socket Layer
Naveen Kumar
 
Key management
Sujata Regoti
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Block cipher modes of operation
harshit chavda
 
Ad

Similar to Symmetric and asymmetric key (20)

PPT
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
PPT
Symmetric and Asymmetric Encryption infosec.ppt
AhamedTuani
 
PPT
DIS- Symmetric and Asymmetric Encryption.ppt
senthilkumarm93
 
PPTX
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
PPTX
Encryption
Adnan Malak
 
PDF
DES- Data Encryption Standard
IRJET Journal
 
PPT
cryptography
swatihans
 
PPT
Introduction to cryptography and Network Security
DhanapalM8
 
PPT
cryptography.ppt by karthika kumar hirehegaalla
hhjhona939
 
PPT
cryptography.pptcryptography.pptcryptography.ppt
ssuserc7a853
 
PDF
Basic Cryptography.pdf
Setiya Nugroho
 
PDF
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
PDF
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 
DOCX
Seminar report on symmetric key
Rajat Tripathi
 
PPTX
Cryptography
Muhammad Shoaib Saleem
 
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
 
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
 
PPTX
Data encryption
Balvant Biradar
 
PPTX
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
 
Symmetric and Asymmetric Encryption infosec.ppt
AhamedTuani
 
DIS- Symmetric and Asymmetric Encryption.ppt
senthilkumarm93
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Encryption
Adnan Malak
 
DES- Data Encryption Standard
IRJET Journal
 
cryptography
swatihans
 
Introduction to cryptography and Network Security
DhanapalM8
 
cryptography.ppt by karthika kumar hirehegaalla
hhjhona939
 
cryptography.pptcryptography.pptcryptography.ppt
ssuserc7a853
 
Basic Cryptography.pdf
Setiya Nugroho
 
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 
Seminar report on symmetric key
Rajat Tripathi
 
Cryptography
Muhammad Shoaib Saleem
 
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
 
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
 
Data encryption
Balvant Biradar
 
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Ad

Recently uploaded (20)

PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Doc9.....................................
SofiaCollazos
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 

Symmetric and asymmetric key

  • 1. Symmetric & Asymmetric encryption Š 2013, Triad Square InfoSec Pvt. Ltd
  • 2. SYMMETRIC ENCRYPTION  An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message.  In other terms, Data is encrypted and decrypted using the same key.  Symmetric-key cryptography is sometimes called secretkey cryptography. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 3. SYMMETRIC ENCRYPTION (cont..) (Plain text) (Plain text) Hello world Hello world (cipher text) #%giuyrwkmns:{? Encryption Decryption Shared same secret key Š 2013, Triad Square InfoSec Pvt. Ltd
  • 4.  Symmetric-key systems are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted, Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted.  Examples of symmetric algorithms are DES, 3DES and AES Š 2013, Triad Square InfoSec Pvt. Ltd
  • 5.  The most popular symmetric-key system is the Data Encryption Standard (DES).  DES uses 56-bit keys, they are short enough to be easily brute-forced by modern hardware and it is recommended that DES should not to be used.  Triple DES (or 3DES) uses 128 bits key length, the same algorithm, applied three times to produce strong encryption. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 6. MERITS & DE-MERITS Merits: SIMPLER FASTER De-Merits: Two parties must somehow exchange the key in a secure way. Public key is distributed in a non-secure way b/n Client/Server. Easy for hackers to get the key as it is shared in unsecure way. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 7. Asymmetric encryption: Asymmetric encryption use two keys, one to encrypt the data, and another key to decrypt the data. These keys are generated together. One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden. Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 8. How it WORKS…….? Š 2013, Triad Square InfoSec Pvt. Ltd
  • 9. Key Points in Asymmetric Encryption  Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data  These keys are generated together.  The Public key(s) is distributed freely between the sender and receiver.  The other is named as Private Key and it is kept hidden.  The Private Key is only used for Decryption and will not be shared between the sender and receiver. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 10. Asymmetric Encryption Algorithms RSA: Rivest-Shamir-Adleman is the most commonly used asymmetric algorithm (public key algorithm). It can be used both for encryption and for digital signatures. Digital Signature Algorithm: The standard defines DSS to use the SHA-1 hash function exclusively to compute message. The main problem with DSA is the fixed subgroup size (the order of the generator element), which limits the security to around only 80 bits. Hardware attacks can be menacing to some implementations of DSS. However, it is widely used and accepted as a good algorithm. Diffie-Helman: Diffie-Hellman is the first asymmetric encryption algorithm, invented in 1976, using discrete logarithms in a finite field. Allows two users to exchange a secret key over an insecure medium without any prior secrets. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 11. Asymmetric Encryption Algorithms ElGamal: The ElGamal is a public key cipher - an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. ElGamal is the predecessor of DSA. ECDSA: Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which operates on elliptic curve groups. As with Elliptic Curve Cryptography in general, the bit size of the public key believed to be need ECDSA is about twice the size of the security level, in bits. XTR: It is based on the primitive underlying the very first public key cryptosystem, the Diffie-Hellman key agreement protocol. Some advantages of XTR are its fast key generation (much faster than RSA), small key sizes (much smaller than RSA, comparable with ECC for current security settings), and speed. Š 2013, Triad Square InfoSec Pvt. Ltd
  • 12. MERITS & DE-MERITS Merits:  Two parties don't need to have their private keys already shared in order to communicate using encryption.  Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. Š 2013, Triad Square InfoSec Pvt. Ltd