Symmetric Encryption
Symmetric Encryption
Plaintext – original message or data that is fed into the algorithm as input.
Encryption algorithm – performs various substitutions or transformations on plaintext.
Secret key –is also input to the encryption algorithm.
The exact substitutions/transformations performed by the algorithm depend on the
key .
Ciphertext – scrambled message produced at the output.
It depends on the plaintext and secret key. For a given message , two different keys will
produce two different ciphertexts.
Decryption algorithm – inverse of encryption algorithm
Two requirements for secure use of symmetric
encryption:
Substitution: in which each element in the plaintext (bit, letter, group of bits or letters)
is mapped into another element.
Transposition: in which elements in the plaintext are rearranged. The fundamental
requirement is that no information be lost.
Product: involve multiple stages of substitutions and transpositions.
Number of keys
Single-key or private: If both sender and receiver use the same key, the system is
referred to as symmetric, single-key, secret-key, or conventional encryption.
Two-key or public: If the sender and receiver use different keys, the system is referred
to as asymmetric, two-key, or public-key encryption
■ plaintext is processed • Block: A block cipher processes the input one block
of elements at a time, producing an output block for each input block. • Stream: A
stream cipher processes the input elements continuously, producing output one
element at a time, as it goes along.