Symmetric Encryption LN2
Symmetric Encryption LN2
Single Key Usage: The same key is used for encryption and
decryption.
Fast and Efficient: It is computationally less expensive than
asymmetric encryption.
Secure Key Sharing: Both parties must securely share the key
before communication can begin.
Key Size: The encryption's security depends on the key's size.
Longer keys provide stronger security.
1. Block Ciphers:
o Data is divided into fixed-size blocks (e.g., 64 or 128 bits) and
encrypted one block at a time. On the other hand, block
ciphers divide the raw data into pieces of a fixed size. The size
is determined by the cipher used. Instead of a single digit, a
128-bit block cipher divides the plaintext into blocks of 128
bits each and encrypts those blocks. These ciphers are slower
but far more tamper-proof and used in some of today's most
popular algorithms.
o Examples:
2. Stream Ciphers:
Data is encrypted one bit or byte at a time rather than in
blocks. The algorithms encrypt basic information one byte/bit
at a time known as stream ciphers. You utilize a bitstream
generation algorithm to generate a binary key and encrypt the
plaintext. The following is the procedure for encrypting and
decrypting data using stream ciphers: