UNIT 2 TK
UNIT 2 TK
1. Plaintext: This is the original message or data that is fed into the algorithm
as input2.
2. Encryption Algorithm: It performs various substitutions and
transformations on the plaintext2.
3. Secret Key: The secret key is also input to the algorithm. The exact
substitutions and transformations performed by the algorithm depend on the
key2.
4. Ciphertext: This is the scrambled message produced as output. It depends
on the plaintext and the secret key2.
5. Decryption Algorithm: This is essentially the encryption algorithm run in
reverse. It takes the ciphertext and the same secret key and produces the
original plaintext2.
The security of symmetric encryption depends on the secrecy of the key, not the
secrecy of the algorithm2. We do not need to keep the algorithm secret; we need to
keep only the key secret2.
Symmetric encryption provides data privacy and confidentiality without the extra
complexity of multiple keys3. It’s useful for encrypting databases and files, where
you’re not exchanging data publicly between parties3. However, one of the
challenges with symmetric encryption is the secure distribution of the key, as
anyone who has the key can decrypt the data4.
Remember, the use of cryptographic hash functions like MD5 or SHA-1 for
message authentication has become a standard approach in many applications,
particularly Internet security protocols4. Though very easy to implement, these
mechanisms are usually based on ad hoc techniques that lack a sound security
analysis4.
The simplest method uses the symmetric or “secret key” system3. Here, data is
encrypted using a secret key, and then both the encoded message and secret key are
sent to the recipient for decryption3. Symmetric encryption heavily relies on the
fact that the keys “must” be kept secret1. Distributing the key in a secure way is
one of the primary challenges of symmetric encryption1. This is also known as the
"key distribution problem"1.