0% found this document useful (0 votes)
13 views

Ch4 Symmetric Encryption

Uploaded by

Najma baashe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Ch4 Symmetric Encryption

Uploaded by

Najma baashe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Symmetric Encryption

• There are three types of encryption in cryptography:


1.Symmetric Encryption
2.Asymmetric Encryption
3.Hash function
• Today we are going to focus on what is symmetric encryption.
What is Symmetric Encryption?
• Symmetric Encryption algorithm relies on a single key for encryption and
decryption of information. Both the sender and receiver of the message need
to have a pre-shared secret key that they will use to convert the plaintext into
ciphertext and vice versa.
• As shown below in the figure, the key which is being used for encrypting the
original message is decrypting the ciphertext. The key must be kept private
and be known only to the sender and the receiver.
Symmetric Encryption algorithm
• To sum it up, the entire process will be as shown below:
• Step 1: Paul and Jane decide on a common key to be used
• Step 2: Paul sends the secret encryption key to Jane
• Step 3: Paul uses the private key to encrypt the original message
• Step 4: Paul sends the encrypted message to Jane
• Step 5: Jane uses the secret key to decrypt the message that was already
present with her
• Following the above process, Paul and Jane communicate privately without the
fear of anyone lurking on the route. Since only both of them have the secret
key needed to encrypt and decrypt the message, no third party who can
intercept the encrypted message can break into it.
Where is Symmetric Key Cryptography Used?

• Symmetric encryption is essential for many day-to-day activities on the


internet, ranging from safe online browsing to banking applications. Some of
these applications are as follows-
Where is Symmetric Key Cryptography Used?

• Payment Applications:
• Many online banking and payment applications require the verification of
personally identifiable information before proceeding with their
transactions. It helps in predicting the correct information to prevent
fraudulent activities and cybercrime.
• Securing Data at Rest:
• When a website or organization stores personal information regarding their
users or the company itself, it is protected using Symmetric encryption.
This is done to prevent all kinds of snooping from either outside hackers or
disgruntled employees inside the office, looking to steal crucial information.
Where is Symmetric Key Cryptography Used?

• SSL/TLS Handshake:

• Symmetric encryption plays a significant role in verifying


website server authenticity, exchanging the necessary
encryption keys required, and generating a session using
those keys to ensure maximum security, instead of the
rather insecure HTTP website format.
Why is Symmetric Key Cryptography Called Private Key
Cryptography?

• With the entire architecture of Symmetric Cryptography depending on


the single key being used, you can understand why it’s of paramount
importance to keep the key secret on all occasions. If the sender
somehow transmits the secret key along with the ciphertext, anyone
can intercept the package and access the information. Consequently,
this encryption category is termed private key cryptography, since a big
part of the data’s integrity is riding on the promise that the users can
keep the keys secret.
What Are the Types of Ciphers Being Used?

• provided you manage to keep the keys secret, you still have to
choose what kind of ciphers you want to use to encrypt the
information. In symmetric-key cryptography, there are broadly two
categories of ciphers that you can employ. Have a look at what they
are in the following section.
• Two types of ciphers can be used in symmetric algorithms. These two
types are:
• Stream Ciphers
• Block Ciphers
1. Stream Ciphers

Stream ciphers are the algorithms that encrypt basic information, one byte/bit at a
time. You use a bitstream generation algorithm to create a binary key and encrypt the
plaintext.
• The process for encryption and decryption using stream ciphers are as follows :
• Get the plaintext to be encrypted.
• Create a binary key using the bitstream generation algorithm.
• Perform XOR operation on the plaintext using the generated binary key.
• The output becomes the ciphertext.
• Perform XOR operations on the ciphertext using the same key to get back the
plaintext.
The most well-known stream ciphers are RC-4, SALSA
and PANAMA.
2. Block Ciphers

is an encryption algorithm that takes a fixed size of input say b bits


and produces a ciphertext of b bits again. If the input is larger
than b bits it can be divided further.
• On the other hand, block ciphers dissect the raw information into chunks
of data of a fixed size. The size depends on the exact cipher being used. A
128-bit block cipher will break the plaintext into blocks of 128-bit each and
encrypt those blocks instead of a single digit. These ciphers are slower but
much more tamper-proof and are used in some of the most common
algorithms being employed today.
How does a private key work?

• Generating a new private key. Prior to encryption, generate a


new key that is as random as possible; encryption software is
typically used to generate private keys.
• Securely storing the private key. Once generated, the private
key must be stored securely. Depending on the application, keys
may be stored offline or on the computer used to generate,
encrypt and decrypt data. Private keys may be protected with a
password, encrypted or hashed for security -- or all three.
• Key exchange. The private key is used to decrypt, as well as to
encrypt, so using it for symmetric encryption requires a
key exchange to share that key securely with trusted parties
authorized to exchange secured data. Cryptographic software is
usually used to automate this process.
• Key management. Private key management is required to
prevent any individual key from being used for too long. It helps to
securely retire keys after their useful lifetime is reached.
Advantages of Using Symmetric Key Cryptography?

• Symmetric encryption has a few advantages over its counterpart,


asymmetric encryption, which uses two different keys to encrypt
and decrypt data. Some of these advantages are
Advantages of Using Symmetric Key Cryptography?

• Faster than Asymmetric: Symmetric encryption is relatively


quicker than asymmetric encryption. Using a single key for both
encryption and decryption makes it comparatively less complex.
• Better Performance: Symmetric Encryption has been found to
have a higher performance metric when compared to
asymmetric encryption. Fewer calculations help in the better
memory management of the host.
Advantages of Using Symmetric Key Cryptography?

• Better Optimization: Bulk amounts of data that need to be


encrypted are very well suited for symmetric algorithms. Since
they are much quicker, handling large amounts of data is simple
and easy to use in servers and data farms.
• Easy Implementation: With only a single key needed for both
encryption and decryption of data, setting up symmetric
infrastructure for an organization is relatively easy compared to
asymmetric encryption.
•END

You might also like