SlideShare a Scribd company logo
Cryptography -
Asymmetric
Encryption
5 minutes series
Abdul Manaf Vellakodath
Security Architect
Asymmetric Encryption - Overview
● There are many different Asymmetric
implementations around. Some of them
are:
○ Diffie-Hellman (Key Exchange)
○ RSA
○ Elliptic Curve
● RSA is the most popular commercially
used Asymmetric Algorithm from three
cryptographers:
○ Rivest
○ Shamir
● Diffie Hellman is a Key Exchange
mechanism
● RSA is also called Public Key encryption
due to its nature of keys
Encryption and Decryption using Asymmetric
Algorithm
Asymmetric
Key
Encryption
Algorithm
Plain
Text!
s8sdfdvsja9
qj7*jsdsf$ks
df.8sd*asfyl
dywkkeykk
Ciphertext
Decryption
Algorithm
Plain
Text!
Asymmetric
Key
< One key to encrypt and the other Key to
Decrypt>
RSA - Basic Premises
● The data encrypted with a Private Key can
only be decrypted with its corresponding
Public Key.
● The data encrypted with a Public Key can
only be decrypted with its corresponding
Private Key.
● The Sender has a Key called Private Key.
This key is secret. It is never transferred
out of his computer. Note: If someone
finds this key, he could impersonate the
sender.
● Everyone else, who wants to
communicate with the Sender is given a
key called the Public Key. Note: This key
is generated as part of the earlier Private
Key generation process.
● The Private and Public Keys comes in a
pair when we talk about RSA Public Key
encryption.
RSA Public Key Encryption - Features
● Integrity
○ Say:
■ M is the Message
■ MDh1 is the Message Digest (hash)
■ MDe is the encrypted (with the
Sender’s Private Key) form of MD
○ Send M and MDe to the Receiver.
○ Receiver will:
■ Decrypts the MDe to find the MDh1.
■ Generate MDh2 again from M.
● Confidentiality: Use the Public Key to
encrypt the message and send it to the
user. Receiver uses his Private Key
(secret) to decrypt the information, thus
passing information secretly, achieving
confidentiality.
● Non-repudiation: IF the Sender uses his
Private Key to encrypt a message, anyone
who has the respective Public Key could
decrypt his message. Since the Sender is
the only one possessing the Private Key,
only the Sender could have sent the
message. This is called non-repudiation.
RSA Encryption Algorithm
● Let us say:
○ Message = 65 (we want to encrypt this)
○ Public Key (n = 3233, e = 17)
○ Private Key (d = 2753)
● Encryption function:
i.e.
● Decryption function:
i.e.
Note: The encryption using the Private Key s
reversible using the Public Key. The reverse is
● Refer the following link to understand
how the RSA Keys are generated:
http://www.slideshare.net/AbdulManafV
ellakodat/cryptography-simplified-key-
generation-asymmetric-keys

More Related Content

PDF
Asymmetric Cryptography
PPT
Public Key Cryptography and RSA algorithm
PPTX
Different types of Symmetric key Cryptography
PPT
Digital Signature Recognition using RSA Algorithm
PPTX
Cryptography
PPT
Is case study
PPTX
Information and data security public key cryptography and rsa
PPT
Final ss2-digital-signature-group5
Asymmetric Cryptography
Public Key Cryptography and RSA algorithm
Different types of Symmetric key Cryptography
Digital Signature Recognition using RSA Algorithm
Cryptography
Is case study
Information and data security public key cryptography and rsa
Final ss2-digital-signature-group5

What's hot (20)

PPTX
Public key Cryptography & RSA
PPTX
RSA & MD5 algorithm
PPT
Public key cryptography and RSA
PPT
Rsa and diffie hellman algorithms
PPTX
Cryptography
PPTX
Encryption
PPTX
Cryptography and RSA algorithm
PPT
RSA Algorithm - Public Key Cryptography
DOCX
Cryptography
PPT
Cryptography
PPT
introduction to cryptography
PPTX
3 public key cryptography
PPT
(Crypto) DES And RSA Algorithms Overview
PPTX
Cryptography & Network Security By, Er. Swapnil Kaware
PPT
public-key cryptography Shamir
PPT
Digital signature
DOCX
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
PPTX
Cryptography using rsa cryptosystem
PDF
Public key Cryptography & RSA
RSA & MD5 algorithm
Public key cryptography and RSA
Rsa and diffie hellman algorithms
Cryptography
Encryption
Cryptography and RSA algorithm
RSA Algorithm - Public Key Cryptography
Cryptography
Cryptography
introduction to cryptography
3 public key cryptography
(Crypto) DES And RSA Algorithms Overview
Cryptography & Network Security By, Er. Swapnil Kaware
public-key cryptography Shamir
Digital signature
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
Cryptography using rsa cryptosystem
Ad

Viewers also liked (16)

PPTX
Cryptography - Simplified - Symmetric Encryption
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PPTX
Symmetric and asymmetric key
PPT
Java Symmetric
PPT
Blowfish Cryptosystem
PPT
Ch03 block-cipher-and-data-encryption-standard
PPT
Data encryption standard (des)
PPT
13 asymmetric key cryptography
PPTX
Reading_Lesson 7 Explicit and Implicit Claims in a Text
PPTX
Trible data encryption standard (3DES)
PPTX
Data Encryption Standard (DES)
PPTX
Cryptography
PPTX
Data encryption standard
PPTX
Cryptography
PPT
PPT - Powerful Presentation Techniques
Cryptography - Simplified - Symmetric Encryption
Advanced Encryption Standard (AES) Implementaion using Java
Symmetric and asymmetric key
Java Symmetric
Blowfish Cryptosystem
Ch03 block-cipher-and-data-encryption-standard
Data encryption standard (des)
13 asymmetric key cryptography
Reading_Lesson 7 Explicit and Implicit Claims in a Text
Trible data encryption standard (3DES)
Data Encryption Standard (DES)
Cryptography
Data encryption standard
Cryptography
PPT - Powerful Presentation Techniques
Ad

Similar to Cryptography - Simplified - Asymmetric Encryption (20)

PPTX
Cryptography
PDF
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
PPTX
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
PPTX
Encryption in Cryptography
PPTX
Public key algorithm
PPTX
CNS 3RD UNIT PPT.pptx
PPTX
Unit 7 : Network Security
PDF
RSA Algoritmn
PPT
Symmetric and Asymmetric Encryption.ppt
PPTX
Cyptography and network security unit 3-1
PDF
2. public key cryptography and RSA
PPT
Symmetric and Asymmetric Encryption infosec.ppt
PPTX
Module2.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PDF
RSA 32-bit Implementation Technique
PPT
Quan nguyen symmetric versus asymmetric cryptography
PPT
DIS- Symmetric and Asymmetric Encryption.ppt
Cryptography
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Encryption in Cryptography
Public key algorithm
CNS 3RD UNIT PPT.pptx
Unit 7 : Network Security
RSA Algoritmn
Symmetric and Asymmetric Encryption.ppt
Cyptography and network security unit 3-1
2. public key cryptography and RSA
Symmetric and Asymmetric Encryption infosec.ppt
Module2.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
RSA 32-bit Implementation Technique
Quan nguyen symmetric versus asymmetric cryptography
DIS- Symmetric and Asymmetric Encryption.ppt

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm

Cryptography - Simplified - Asymmetric Encryption

  • 1. Cryptography - Asymmetric Encryption 5 minutes series Abdul Manaf Vellakodath Security Architect
  • 2. Asymmetric Encryption - Overview ● There are many different Asymmetric implementations around. Some of them are: ○ Diffie-Hellman (Key Exchange) ○ RSA ○ Elliptic Curve ● RSA is the most popular commercially used Asymmetric Algorithm from three cryptographers: ○ Rivest ○ Shamir ● Diffie Hellman is a Key Exchange mechanism ● RSA is also called Public Key encryption due to its nature of keys
  • 3. Encryption and Decryption using Asymmetric Algorithm Asymmetric Key Encryption Algorithm Plain Text! s8sdfdvsja9 qj7*jsdsf$ks df.8sd*asfyl dywkkeykk Ciphertext Decryption Algorithm Plain Text! Asymmetric Key < One key to encrypt and the other Key to Decrypt>
  • 4. RSA - Basic Premises ● The data encrypted with a Private Key can only be decrypted with its corresponding Public Key. ● The data encrypted with a Public Key can only be decrypted with its corresponding Private Key. ● The Sender has a Key called Private Key. This key is secret. It is never transferred out of his computer. Note: If someone finds this key, he could impersonate the sender. ● Everyone else, who wants to communicate with the Sender is given a key called the Public Key. Note: This key is generated as part of the earlier Private Key generation process. ● The Private and Public Keys comes in a pair when we talk about RSA Public Key encryption.
  • 5. RSA Public Key Encryption - Features ● Integrity ○ Say: ■ M is the Message ■ MDh1 is the Message Digest (hash) ■ MDe is the encrypted (with the Sender’s Private Key) form of MD ○ Send M and MDe to the Receiver. ○ Receiver will: ■ Decrypts the MDe to find the MDh1. ■ Generate MDh2 again from M. ● Confidentiality: Use the Public Key to encrypt the message and send it to the user. Receiver uses his Private Key (secret) to decrypt the information, thus passing information secretly, achieving confidentiality. ● Non-repudiation: IF the Sender uses his Private Key to encrypt a message, anyone who has the respective Public Key could decrypt his message. Since the Sender is the only one possessing the Private Key, only the Sender could have sent the message. This is called non-repudiation.
  • 6. RSA Encryption Algorithm ● Let us say: ○ Message = 65 (we want to encrypt this) ○ Public Key (n = 3233, e = 17) ○ Private Key (d = 2753) ● Encryption function: i.e. ● Decryption function: i.e. Note: The encryption using the Private Key s reversible using the Public Key. The reverse is ● Refer the following link to understand how the RSA Keys are generated: http://www.slideshare.net/AbdulManafV ellakodat/cryptography-simplified-key- generation-asymmetric-keys