0% found this document useful (0 votes)
3 views9 pages

Cryptography

The document presents an overview of symmetric key cryptography, detailing its history, core principles, and common algorithms such as AES and DES. It highlights the challenges of key distribution and the importance of security best practices. Additionally, it discusses real-world applications and future trends in cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views9 pages

Cryptography

The document presents an overview of symmetric key cryptography, detailing its history, core principles, and common algorithms such as AES and DES. It highlights the challenges of key distribution and the importance of security best practices. Additionally, it discusses real-world applications and future trends in cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

NAME : NIRAJ KUMAR

BRANCH :- IT - ‘B’

COLLEGE ROLL NO.: 214078299

UNIVERSITY ROLL:- 12500221073

SUBJECT: Network Security and Cryptography

PAPER CODE:- (PECIT-801B)


Introduction to Symmetric
Key Cryptography
A deep dive into the core principles, common algorithms, and real-
world applications of this fundamental cryptography method. This
presentation explores the history, advantages, challenges, and future
of symmetric key cryptography.

by Niraj Kumar
History of Secret Codes and
Ciphers
1 Ancient Times
Early forms of cryptography used for military and diplomatic
purposes. Julius Caesar's cipher was one of the first known
examples.

2 Medieval Era
Sophisticated ciphers and code books emerged, including the
Enigma machine used by Nazi Germany during World War II.

3 Modern Era
The development of computers revolutionized cryptography. The
rise of symmetric key algorithms like DES and AES.
Core Principles: Same Key for Encryption and
Decryption
Encryption Decryption

Transforming plain text into an unreadable format using a Reversing the encryption process to retrieve the original
secret key. message using the same secret key.
Common Symmetric Algorithms (AES, DES, 3DES)

AES DES 3DES


Advanced Encryption Standard, Data Encryption Standard, older Triple DES, an enhancement of
widely adopted, considered secure algorithm, vulnerable to modern DES, provides stronger security
for modern applications. attacks. but is less efficient than AES.
Block Ciphers vs Stream Ciphers
Block Ciphers Stream Ciphers

Encrypt data in fixed-size blocks, often used for secure Encrypt data bit-by-bit, typically used for real-time
communication. applications, such as secure audio and video streaming.
Key Distribution Challenge:
The Achilles' Heel
Securely Sharing
The difficulty of distributing the secret key without
compromising its confidentiality.

Compromised Key
If the key is intercepted, all encrypted data is vulnerable
to decryption.
Real-world Applications and
Use Cases

Password Protection Secure Data Encryption


Communication

Financial
Transactions
Security Best Practices and Future Trends
1 Regular Key Updates 2 Strong Key Management Systems

3 Hybrid Cryptography Combining Symmetric and 4 Post-quantum Cryptography


Asymmetric Techniques

You might also like