SlideShare a Scribd company logo
6
Most read
9
Most read
10
Most read
SUBMITTED TO:-
MR. ANIL DANGI
(Assistant prof. )
SUBMITTED BY:-
AJAY KUMAR DAS
COURSE:-B.TECH(CSE)
MUR1800226
CONTENTS
1. Introduction.
2. Basic terminology.
3. Symmetric cipher model.
4. Security requirements
5. Security mathematics
6. Cryptography
7. Cryptanalysis
8. Brute – force- attack
9. Advantage of symmetric cryptosystem.
10.Disadvantage of symmetric cryptosystem.
Introduction
• Symmetric encryption, also referred to as conventional
encryption or single-key encryption, was the only type of
encryption in use prior to the development of public-key
encryption in the 1970s.
• It remains by far the most widely used of the two types
of encryption.
• An original message is known as the plaintext, while the
coded message is called the ciphertext.
• The process of converting from plaintext to ciphertext
is known as enciphering or encryption; restoring the
plaintext from the ciphertext is deciphering or
decryption. Many schemes used for encryption
constitute the area of study known as cryptography.
• Such a scheme is known as a cryptographic system or
a cipher.
• Techniques used for deciphering a message without
any knowledge of the enciphering details fall into the
area of cryptanalysis. Cryptanalysis is what the
layperson calls “breaking the code”.
Some Basic Terminology
• Plaintext - original message.
•Ciphertext - coded message .
•Cipher - algorithm for transforming plaintext to
ciphertext.
• key - info used in cipher known only to sender/receiver
•Encipher (encrypt) - converting plaintext to ciphertext.
•Decipher (decrypt) - recovering ciphertext from
plaintext
•Cryptography - study of encryption principles/methods.
•Cryptanalysis (codebreaking) - study of principles/
methods of deciphering ciphertext without knowing key.
•Cryptology -field of both cryptography and
cryptanalysis.
symmetric cipher model.pptx
symmetric cipher model.pptx
symmetric cipher model.pptx
Cryptography
• The type of operations used for transforming plaintext
to ciphertext.
All encryption algorithms are based on two general
principles:
• Substitution, in which each element in the plaintext
(bit, letter, group of bits or letters) is mapped into another
element.
• Transposition, in which elements in the plaintext are
rearranged. Most systems, referred to as product systems,
involve multiple stages of substitutions and transpositions.
•The number of keys used.
If both sender and receiver use the same key, the
system is referred to as symmetric, single key, secret-key, or
conventional encryption. If the sender and receiver use
different keys, the system is referred to as asymmetric,
two-key, or public key encryption.
• The way in which the plaintext is processed.
A block cipher processes the input one block of
elements at a time, producing an output block for each
input block.
A stream cipher processes the input elements
continuously, producing output one element at a time, as it
goes along.
Cryptanalysis
• The objective of attacking an encryption system is to
recover the key in use rather then simply to recover the
plaintext of a single ciphertext.
• There are two general approaches to attacking a
conventional encryption scheme:
Cryptanalysis
Brute-force attack
Cryptanalysis:
Cryptanalytic attacks rely on the nature of the algorithm
plus perhaps some knowledge of the general
characteristics of the plaintext or even some sample
plaintext-ciphertext pairs. This type of attack exploits the
characteristic of the algorithm to attempt to deduce a
specific plaintext or to deduce the key being used.
•Brute-force attack:
The attacker tries every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained. On
average, half of all possible keys must be tried to achieve
success.
If either type of attack succeeds in deducing the key, the
effect is catastrophic: All future and past messages encrypted
with that key are compromised.
Advantages of Symmetric Cryptosystem
• A symmetric cryptosystem is faster.
• In Symmetric Cryptosystems, encrypted data can be
transferred on the link even if there is a possibility that the
data will be intercepted.
• Since there is no key transmitted with the data, the
chances of data being decrypted are null.
• A symmetric cryptosystem uses password authentication
to prove the receiver’s identity.
• A system only which possesses the secret key can decrypt
a message.
Disadvantages of Symmetric Cryptosystem
• Symmetric cryptosystems have a problem of key
transportation. The secret key is to be transmitted to the
receiving system before the actual message is to be
transmitted.
• Every means of electronic communication is insecure as it is
impossible to guarantee that no one will be able to tap
communication channels.
• So the only secure way of exchanging keys would be
exchanging them personally.
• Cannot provide digital signatures that cannot be repudiated
symmetric cipher model.pptx

More Related Content

PPTX
RSA Algorithm
Srinadh Muvva
 
PPTX
Block cipher modes of operation
harshit chavda
 
PPTX
Confusion and Diffusion.pptx
bcanawakadalcollege
 
PPT
Elgamal Digital Signature
Sou Jana
 
PPTX
IP Security
Keshab Nath
 
PPT
Message authentication and hash function
omarShiekh1
 
PPT
Security Attacks.ppt
Zaheer720515
 
PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
RSA Algorithm
Srinadh Muvva
 
Block cipher modes of operation
harshit chavda
 
Confusion and Diffusion.pptx
bcanawakadalcollege
 
Elgamal Digital Signature
Sou Jana
 
IP Security
Keshab Nath
 
Message authentication and hash function
omarShiekh1
 
Security Attacks.ppt
Zaheer720515
 
2. public key cryptography and RSA
Dr.Florence Dayana
 

What's hot (20)

PPTX
Public Key Cryptosystem
Devakumar Kp
 
PPTX
Cryptography
Sidharth Mohapatra
 
PDF
Cs8792 cns - unit iv
ArthyR3
 
PPTX
RECURSIVE DESCENT PARSING
Jothi Lakshmi
 
PPT
block ciphers
Asad Ali
 
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
PPT
Design issues for the layers
jayaprakash
 
PPTX
Security Mechanisms
priya_trehan
 
PPT
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
PDF
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
 
PPT
Type Checking(Compiler Design) #ShareThisIfYouLike
United International University
 
PPTX
Transposition cipher techniques
SHUBHA CHATURVEDI
 
PPT
Message Authentication Code & HMAC
Krishna Gehlot
 
PPTX
RSA algorithm
Arpana shree
 
PPT
IPV4 Frame Format
Aditya Rawat
 
PDF
Network security - OSI Security Architecture
BharathiKrishna6
 
PPT
Sliding window protocol
Shehara Abeythunga
 
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
PPTX
2. Distributed Systems Hardware & Software concepts
Prajakta Rane
 
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Public Key Cryptosystem
Devakumar Kp
 
Cryptography
Sidharth Mohapatra
 
Cs8792 cns - unit iv
ArthyR3
 
RECURSIVE DESCENT PARSING
Jothi Lakshmi
 
block ciphers
Asad Ali
 
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Design issues for the layers
jayaprakash
 
Security Mechanisms
priya_trehan
 
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
SYMMETRIC CRYPTOGRAPHY
Santosh Naidu
 
Type Checking(Compiler Design) #ShareThisIfYouLike
United International University
 
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Message Authentication Code & HMAC
Krishna Gehlot
 
RSA algorithm
Arpana shree
 
IPV4 Frame Format
Aditya Rawat
 
Network security - OSI Security Architecture
BharathiKrishna6
 
Sliding window protocol
Shehara Abeythunga
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
2. Distributed Systems Hardware & Software concepts
Prajakta Rane
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Ad

Similar to symmetric cipher model.pptx (20)

PPTX
Symmetric ciphermodel
priyapavi96
 
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
gstagra
 
PPTX
NS Classical Encryption Techniqnbbghghgues.pptx
HumaKashafKhan
 
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
ThejasviniBoorla
 
PDF
Unit 1_Classical Encryption Techniques.pdf
KanchanPatil34
 
PPT
CRYPTOGRAPHY
SHUBHA CHATURVEDI
 
PPTX
Module 1.pptx
ShilpaShettyA1
 
PPTX
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
Shivakumar M
 
PPTX
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
PPTX
Cryptography & Network Security.pptx
sunil sharma
 
DOCX
Cryptography- "A Black Art"
Aditya Raina
 
PDF
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 
PDF
crypto-105058445051058480051448005540405
ukd789555
 
PPTX
Cryptography
Shafique Rehman
 
PPTX
Pavan
pavan kumar
 
PPT
Cns 13f-lec03- Classical Encryption Techniques
babak danyal
 
PPT
Classical Encryption Techniques in Network Security
babak danyal
 
PPT
Cryptography
gueste4c97e
 
Symmetric ciphermodel
priyapavi96
 
Detailed description about the concept of E Commerce UNIT IV.pptx
gstagra
 
NS Classical Encryption Techniqnbbghghgues.pptx
HumaKashafKhan
 
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
ThejasviniBoorla
 
Unit 1_Classical Encryption Techniques.pdf
KanchanPatil34
 
CRYPTOGRAPHY
SHUBHA CHATURVEDI
 
Module 1.pptx
ShilpaShettyA1
 
MODULE1_CLASSICALENCRYPTIONTECHNIQUES.pptx
Shivakumar M
 
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
Cryptography & Network Security.pptx
sunil sharma
 
Cryptography- "A Black Art"
Aditya Raina
 
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 
crypto-105058445051058480051448005540405
ukd789555
 
Cryptography
Shafique Rehman
 
Cns 13f-lec03- Classical Encryption Techniques
babak danyal
 
Classical Encryption Techniques in Network Security
babak danyal
 
Cryptography
gueste4c97e
 
Ad

More from Ajaykumar967485 (6)

PPTX
bus scheduler
Ajaykumar967485
 
PPTX
LEC_2_AI_INTRODUCTION - Copy.pptx
Ajaykumar967485
 
PPTX
digital electronics .pptx
Ajaykumar967485
 
PPTX
PresentationJava.pptx
Ajaykumar967485
 
PPTX
Presentation2.pptx
Ajaykumar967485
 
PPTX
INTELLIGENT AGENT
Ajaykumar967485
 
bus scheduler
Ajaykumar967485
 
LEC_2_AI_INTRODUCTION - Copy.pptx
Ajaykumar967485
 
digital electronics .pptx
Ajaykumar967485
 
PresentationJava.pptx
Ajaykumar967485
 
Presentation2.pptx
Ajaykumar967485
 
INTELLIGENT AGENT
Ajaykumar967485
 

Recently uploaded (20)

PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 

symmetric cipher model.pptx

  • 1. SUBMITTED TO:- MR. ANIL DANGI (Assistant prof. ) SUBMITTED BY:- AJAY KUMAR DAS COURSE:-B.TECH(CSE) MUR1800226
  • 2. CONTENTS 1. Introduction. 2. Basic terminology. 3. Symmetric cipher model. 4. Security requirements 5. Security mathematics 6. Cryptography 7. Cryptanalysis 8. Brute – force- attack 9. Advantage of symmetric cryptosystem. 10.Disadvantage of symmetric cryptosystem.
  • 3. Introduction • Symmetric encryption, also referred to as conventional encryption or single-key encryption, was the only type of encryption in use prior to the development of public-key encryption in the 1970s. • It remains by far the most widely used of the two types of encryption. • An original message is known as the plaintext, while the coded message is called the ciphertext.
  • 4. • The process of converting from plaintext to ciphertext is known as enciphering or encryption; restoring the plaintext from the ciphertext is deciphering or decryption. Many schemes used for encryption constitute the area of study known as cryptography. • Such a scheme is known as a cryptographic system or a cipher. • Techniques used for deciphering a message without any knowledge of the enciphering details fall into the area of cryptanalysis. Cryptanalysis is what the layperson calls “breaking the code”.
  • 5. Some Basic Terminology • Plaintext - original message. •Ciphertext - coded message . •Cipher - algorithm for transforming plaintext to ciphertext. • key - info used in cipher known only to sender/receiver •Encipher (encrypt) - converting plaintext to ciphertext. •Decipher (decrypt) - recovering ciphertext from plaintext •Cryptography - study of encryption principles/methods. •Cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key. •Cryptology -field of both cryptography and cryptanalysis.
  • 9. Cryptography • The type of operations used for transforming plaintext to ciphertext. All encryption algorithms are based on two general principles: • Substitution, in which each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element. • Transposition, in which elements in the plaintext are rearranged. Most systems, referred to as product systems, involve multiple stages of substitutions and transpositions.
  • 10. •The number of keys used. If both sender and receiver use the same key, the system is referred to as symmetric, single key, secret-key, or conventional encryption. If the sender and receiver use different keys, the system is referred to as asymmetric, two-key, or public key encryption. • The way in which the plaintext is processed. A block cipher processes the input one block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along.
  • 11. Cryptanalysis • The objective of attacking an encryption system is to recover the key in use rather then simply to recover the plaintext of a single ciphertext. • There are two general approaches to attacking a conventional encryption scheme: Cryptanalysis Brute-force attack Cryptanalysis: Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext-ciphertext pairs. This type of attack exploits the characteristic of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
  • 12. •Brute-force attack: The attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success. If either type of attack succeeds in deducing the key, the effect is catastrophic: All future and past messages encrypted with that key are compromised.
  • 13. Advantages of Symmetric Cryptosystem • A symmetric cryptosystem is faster. • In Symmetric Cryptosystems, encrypted data can be transferred on the link even if there is a possibility that the data will be intercepted. • Since there is no key transmitted with the data, the chances of data being decrypted are null. • A symmetric cryptosystem uses password authentication to prove the receiver’s identity. • A system only which possesses the secret key can decrypt a message.
  • 14. Disadvantages of Symmetric Cryptosystem • Symmetric cryptosystems have a problem of key transportation. The secret key is to be transmitted to the receiving system before the actual message is to be transmitted. • Every means of electronic communication is insecure as it is impossible to guarantee that no one will be able to tap communication channels. • So the only secure way of exchanging keys would be exchanging them personally. • Cannot provide digital signatures that cannot be repudiated