Ch4 Symmetric Encryption
Ch4 Symmetric Encryption
• Payment Applications:
• Many online banking and payment applications require the verification of
personally identifiable information before proceeding with their
transactions. It helps in predicting the correct information to prevent
fraudulent activities and cybercrime.
• Securing Data at Rest:
• When a website or organization stores personal information regarding their
users or the company itself, it is protected using Symmetric encryption.
This is done to prevent all kinds of snooping from either outside hackers or
disgruntled employees inside the office, looking to steal crucial information.
Where is Symmetric Key Cryptography Used?
• SSL/TLS Handshake:
• provided you manage to keep the keys secret, you still have to
choose what kind of ciphers you want to use to encrypt the
information. In symmetric-key cryptography, there are broadly two
categories of ciphers that you can employ. Have a look at what they
are in the following section.
• Two types of ciphers can be used in symmetric algorithms. These two
types are:
• Stream Ciphers
• Block Ciphers
1. Stream Ciphers
Stream ciphers are the algorithms that encrypt basic information, one byte/bit at a
time. You use a bitstream generation algorithm to create a binary key and encrypt the
plaintext.
• The process for encryption and decryption using stream ciphers are as follows :
• Get the plaintext to be encrypted.
• Create a binary key using the bitstream generation algorithm.
• Perform XOR operation on the plaintext using the generated binary key.
• The output becomes the ciphertext.
• Perform XOR operations on the ciphertext using the same key to get back the
plaintext.
The most well-known stream ciphers are RC-4, SALSA
and PANAMA.
2. Block Ciphers