0% found this document useful (0 votes)
40 views8 pages

2 Symmetric Cipher Introduction 05-01-2024

Symmetric encryption algorithms use a single secret key known to both the sender and receiver. The key is used to encrypt plaintext into ciphertext and decrypt ciphertext back to plaintext. The basic components of symmetric encryption are the plaintext, encryption algorithm using a secret key, ciphertext, and decryption algorithm to recover the plaintext. Symmetric encryption algorithms operate using substitution and transposition techniques to encrypt data and must ensure the secret key is securely shared and protected.

Uploaded by

sankarperuri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views8 pages

2 Symmetric Cipher Introduction 05-01-2024

Symmetric encryption algorithms use a single secret key known to both the sender and receiver. The key is used to encrypt plaintext into ciphertext and decrypt ciphertext back to plaintext. The basic components of symmetric encryption are the plaintext, encryption algorithm using a secret key, ciphertext, and decryption algorithm to recover the plaintext. Symmetric encryption algorithms operate using substitution and transposition techniques to encrypt data and must ensure the secret key is securely shared and protected.

Uploaded by

sankarperuri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 8

Class 1

Module 2
Symmetric Encryption Algorithms

Topic 1
Symmetric key cryptographic
techniques_Introduction
Symmetric encryption
• It is also called as conventional encryption or single-key
encryption, was the only type of encryption in use prior to the
development of public key encryption in the 1970s.
Fundamental terms
• An original message is known as the plaintext, while the coded
message is called the ciphertext.
• The process of converting from plaintext to ciphertext is known
as enciphering or encryption.
• Restoring the plaintext from the ciphertext is deciphering or
decryption.
• The many schemes used for encryption constitute the area of
study known as cryptography. Such a scheme is known as a
cryptographic system.
• Techniques used for deciphering a message without any
knowledge of the enciphering details fall into the area of
cryptanalysis.
• The areas of cryptography and cryptanalysis together are called
cryptology.
Symmetric Cipher Model
Cont…
• Plaintext: This is the original intelligible message or data that
is fed into the algorithm as input.

• Encryption algorithm: It performs various substitutions and


transformations on the plaintext.
 Substitutions - plain text characters are replaced with other characters,
numbers and symbols and character’s identity is changed while its
position remains unchanged.
 Transformations - rearranges the position of the plain text’s characters
and the position of the character is changed but character’s identity is
not changed.

• Secret key: It is also input to the encryption algorithm. The key


is a value independent of the plaintext and of the algorithm.
The algorithm will produce a different output depending on
the specific key being used at the time.
Cont…
• Ciphertext: This is the scrambled message produced as
output. It depends on the plaintext and the secret key.

• Decryption algorithm: This is essentially the encryption


algorithm run in reverse. It takes the ciphertext and the
secret key and produces the original plaintext.
Requirements
• We need a strong encryption algorithm.
• Sender and receiver must have obtained copies of the secret key
in a secure fashion and must keep the key secure.
Cryptography
• The type of operations used for transforming plaintext to
ciphertext. All encryption algorithms are based on two general
principles:
– Substitution : mapped into another element
– Transposition : plaintext are rearranged.
• The number of keys used.
– symmetric, single-key, secret-key, or conventional encryption.
– asymmetric, two-key, or public-key encryption.
• The way in which the plaintext is processed.
– Block Cipher Converts the plain text into cipher text by taking
plain text’s block at a time.
– Stream Cipher Converts the plain text into cipher text by
taking 1 byte of plain text at a time.

You might also like