Chapter 2 3 - Symmetric and Asymmetric Encryption
Chapter 2 3 - Symmetric and Asymmetric Encryption
Cryptographic security depends on key distribution (how keys are shared securely) and computational
complexity (how hard it is to break encryption). Let's analyze these aspects for symmetric, asymmetric,
and hybrid cryptographic algorithms.
Problem: Both parties need the same secret key, but securely sharing it over a network is risky.
Solutions:
Pre-Shared Keys (PSK): Manually shared before communication (used in Wi-Fi WPA2).
Key Distribution Centers (KDCs): A trusted third party shares keys (used in Kerberos).
Diffie-Hellman Key Exchange: Securely establishes a shared key over an insecure channel.
Quantum Key Distribution (QKD): Uses quantum mechanics to share keys securely.
Example:
Weakness: If an attacker intercepts the symmetric key, they can decrypt all future messages.
Advantage: No need to share a private key; only the public key is distributed.
Problem: Man-in-the-middle (MITM) attacks can replace the real public key with a fake one.
Solutions:
Public Key Infrastructure (PKI): Digital certificates verify public keys (used in HTTPS, SSL/TLS).
Certificate Authorities (CAs): Trusted third parties sign and authenticate public keys.
Web of Trust (WoT): Used in PGP, users sign each other’s public keys.
Example:
• Email Encryption (PGP/GPG) – Uses PKI to verify public keys before encrypting messages.
Encryption & Decryption Complexity: O(1) constant time (depends on block size).
Brute-Force Attack Complexity: O(2ⁿ), where n = key size.
Example Complexity Analysis:
• RSA-2048 is safe for now, but quantum computers will break it.
• ECC provides equivalent security with smaller key sizes than RSA.
Quantum Threat:
• Shor’s Algorithm (Quantum Computing) can break RSA and ECC in polynomial time (O(n³)).
• AES remains safe against quantum attacks (Grover’s Algorithm only reduces security by half).
Uses asymmetry for key exchange (O(n³)) and symmetry for data encryption (O(1)).
TLS Example Complexity:
Computational
O(1) (Fast) O(n³) (Slow) Mixed (O(n³) + O(1))
Complexity
With quantum computing advancing, asymmetric cryptography like RSA and ECC will be broken. Future-
proof alternatives include:
Lattice-Based Cryptography (NTRU, Kyber) – Resistant to quantum attacks.
Hash-Based Signatures (SPHINCS+) – Secure post-quantum digital signatures.
Code-Based Cryptography (McEliece) – Extremely secure but large keys.