SlideShare a Scribd company logo
2
Most read
5
Most read
14
Most read
Symmetric and Asymmetric Encryption
Visit for more Learning Resources
30.2
Symmetric-key cryptography
30.3
In symmetric-key cryptography, the same key is used
by the sender(for encryption) and the receiver (for
decryption).
The key is shared.
Algorithm: DES,3DES
Note
Symmetric-key cryptography
• Advantages:
– Simple
– Faster
• Disadvantages:
– Key must exchanges in secure way
– Easy for hacker to get a key as it is passed in
unsecure way.
30.5
Figure 30.4 Asymmetric-key cryptography
30.6
An asymmetric-key (or public-key) cipher uses two
keys: one private (To encrypt data) and one public(To
decrypt data).
Note
• Asymmetric Key Cryptography (Public Key Cryptography)
– 2 different keys are used
– Users get the Key from an Certificate Authority
Advantages
1. More Secured
2. Authentication
Disadvantages
1. Relatively Complex
30.8
Figure 30.6 Comparison between two categories of cryptography
• Asymmetric encryption use two keys, one to encrypt the
data, and another key to decrypt the data.
• These keys are generated together
• . One is named as Public key and is distributed freely. The
other is named as Private Key and it is kept hidden.
• Both Sender & Recipient has to share their Public Keys for
Encryption and has to use their Private Keys for Decryption.
How it WORKS…….?
 Asymmetric encryption use two keys:
Public Key - to encrypt the data
Private Key - to decrypt the data
 These keys are generated together.
 The Public key(s) is distributed freely between the sender and receiver.
 The other is named as Private Key and it is kept hidden.
 The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
Key Points in Asymmetric Encryption
Asymmetric Encryption Algorithms
RSA:
Digital Signature Algorithm:
Diffie-Helman:.
© 2013, Triad Square InfoSec Pvt. Ltd
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means that you can
encrypt the message with my public key and only I can decrypt it with my private key.
Non-repudiation means that you can "sign" the message with your private key and I can
verify that it came from you with your public key.)
De-Merits:
Asymmetric Encryption algorithms are comparatively complex.
Time consuming process for Encryption and Decryption.
MERITS & DE-MERITS
© 2013, Triad Square InfoSec
Pvt. Ltd
For more detail contact us

More Related Content

PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
Symmetric and asymmetric key cryptography
PPTX
Hashing vs Encryption vs Encoding
PPTX
Encryption
PPT
overview of cryptographic techniques
PPT
cryptography
PPTX
Information Security (Digital Signatures)
PPTX
Symmetric and asymmetric key
What is Asymmetric Encryption? Understand with Simple Examples
Symmetric and asymmetric key cryptography
Hashing vs Encryption vs Encoding
Encryption
overview of cryptographic techniques
cryptography
Information Security (Digital Signatures)
Symmetric and asymmetric key

What's hot (20)

PPTX
Hash Function
PPTX
Public Key Cryptography
PDF
2. public key cryptography and RSA
PPT
Secure Socket Layer
PPT
Email Security : PGP & SMIME
PPT
Symmetric & Asymmetric Cryptography
PDF
IP Security
PPTX
Secure Socket Layer (SSL)
PPTX
Public Key Cryptosystem
PPT
PGP S/MIME
PPTX
Key management and distribution
PPT
Message authentication
 
PPTX
Network layer - design Issues
PPTX
Security services and mechanisms
PPTX
MD5 ALGORITHM.pptx
PPTX
Key Management and Distribution
PPTX
Block Cipher and Operation Modes
PPTX
SHA- Secure hashing algorithm
Hash Function
Public Key Cryptography
2. public key cryptography and RSA
Secure Socket Layer
Email Security : PGP & SMIME
Symmetric & Asymmetric Cryptography
IP Security
Secure Socket Layer (SSL)
Public Key Cryptosystem
PGP S/MIME
Key management and distribution
Message authentication
 
Network layer - design Issues
Security services and mechanisms
MD5 ALGORITHM.pptx
Key Management and Distribution
Block Cipher and Operation Modes
SHA- Secure hashing algorithm
Ad

Similar to Symmetric and Asymmetric Encryption.ppt (20)

PPT
Symmetric and Asymmetric Encryption infosec.ppt
PPT
DIS- Symmetric and Asymmetric Encryption.ppt
PPTX
Lec # 7 Symmetric and asymmetric cryptography.pptx
PPTX
Encryption
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
Encryption ppt
PPTX
Assymmetric Cryptosystem in cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography - Simplified - Asymmetric Encryption
DOCX
Seminar report on symmetric key
PPTX
Cryptography.pptx
PPT
Quan nguyen symmetric versus asymmetric cryptography
PPTX
Cryptography
PPTX
Symmetric and Asymmetric Encryption
PPTX
PPTX
Basics of Cryptography presentation.pptx
PDF
Public key cryptography
Symmetric and Asymmetric Encryption infosec.ppt
DIS- Symmetric and Asymmetric Encryption.ppt
Lec # 7 Symmetric and asymmetric cryptography.pptx
Encryption
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Encryption ppt
Assymmetric Cryptosystem in cryptography
Cryptography
Cryptography
Cryptography - Simplified - Asymmetric Encryption
Seminar report on symmetric key
Cryptography.pptx
Quan nguyen symmetric versus asymmetric cryptography
Cryptography
Symmetric and Asymmetric Encryption
Basics of Cryptography presentation.pptx
Public key cryptography
Ad

Recently uploaded (20)

PPTX
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
PPTX
Session 11-13. Working Capital Management and Cash Budget.pptx
PPTX
Who’s winning the race to be the world’s first trillionaire.pptx
PDF
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
PPTX
EABDM Slides for Indifference curve.pptx
PDF
ECONOMICS AND ENTREPRENEURS LESSONSS AND
PDF
caregiving tools.pdf...........................
PDF
Blockchain Pesa Research by Samuel Mefane
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PDF
how_to_earn_50k_monthly_investment_guide.pdf
PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
PDF
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
PDF
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
PPTX
What is next for the Fractional CFO - August 2025
PPTX
Introduction to Customs (June 2025) v1.pptx
PPTX
Introduction to Managemeng Chapter 1..pptx
PDF
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
PPTX
Globalization-of-Religion. Contemporary World
PDF
Understanding University Research Expenditures (1)_compressed.pdf
PDF
Circular Flow of Income by Dr. S. Malini
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
Session 11-13. Working Capital Management and Cash Budget.pptx
Who’s winning the race to be the world’s first trillionaire.pptx
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
EABDM Slides for Indifference curve.pptx
ECONOMICS AND ENTREPRENEURS LESSONSS AND
caregiving tools.pdf...........................
Blockchain Pesa Research by Samuel Mefane
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
how_to_earn_50k_monthly_investment_guide.pdf
Copia de Minimal 3D Technology Consulting Presentation.pdf
Bitcoin Layer August 2025: Power Laws of Bitcoin: The Core and Bubbles
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
What is next for the Fractional CFO - August 2025
Introduction to Customs (June 2025) v1.pptx
Introduction to Managemeng Chapter 1..pptx
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
Globalization-of-Religion. Contemporary World
Understanding University Research Expenditures (1)_compressed.pdf
Circular Flow of Income by Dr. S. Malini

Symmetric and Asymmetric Encryption.ppt

  • 1. Symmetric and Asymmetric Encryption Visit for more Learning Resources
  • 3. 30.3 In symmetric-key cryptography, the same key is used by the sender(for encryption) and the receiver (for decryption). The key is shared. Algorithm: DES,3DES Note
  • 4. Symmetric-key cryptography • Advantages: – Simple – Faster • Disadvantages: – Key must exchanges in secure way – Easy for hacker to get a key as it is passed in unsecure way.
  • 6. 30.6 An asymmetric-key (or public-key) cipher uses two keys: one private (To encrypt data) and one public(To decrypt data). Note
  • 7. • Asymmetric Key Cryptography (Public Key Cryptography) – 2 different keys are used – Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex
  • 8. 30.8 Figure 30.6 Comparison between two categories of cryptography
  • 9. • Asymmetric encryption use two keys, one to encrypt the data, and another key to decrypt the data. • These keys are generated together • . One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden. • Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption.
  • 11.  Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data  These keys are generated together.  The Public key(s) is distributed freely between the sender and receiver.  The other is named as Private Key and it is kept hidden.  The Private Key is only used for Decryption and will not be shared between the sender and receiver. Key Points in Asymmetric Encryption
  • 12. Asymmetric Encryption Algorithms RSA: Digital Signature Algorithm: Diffie-Helman:. © 2013, Triad Square InfoSec Pvt. Ltd
  • 13. Merits:  Two parties don't need to have their private keys already shared in order to communicate using encryption.  Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. MERITS & DE-MERITS © 2013, Triad Square InfoSec Pvt. Ltd
  • 14. For more detail contact us