Data Encryption
Data Encryption
AGENDA
• A cryptosystem involves a set of rules for how to encrypt the plaintext and
decrypt the ciphertext. The encryption and decryption rules, called
algorithms, often use a device called a key, denoted by K.
• The resulting ciphertext depends on the original plaintext message, the
algorithm, and the key value.
• We write this dependence as C = E(K, P).
Symmetric and Asymmetric Encryption
• The two most common encryption methods are symmetric and asymmetric
encryption. The names refer to whether or not the same key is used for
encryption and decryption.
1) Symmetric encryption
In a symmetric way, the encryption and decryption keys are the same, so P = D(K, E(K,
P)), meaning that the same key, K, is used both to encrypt a message and later to decrypt it.
This form is called conventional key or single-key or secret key encryption because D and E
are mirror-image processes
Symmetric and Asymmetric Encryption
• A variety of encryption algorithms are available, each intended for a specific use. The most
well-known symmetric encryption algorithms are as follows:
1) Data Encryption Standards (DES): DES is a low-level encryption block cipher algorithm
that converts plain text into blocks of 64 bits and converts them to ciphertext using keys of
48 bits
2) Triple DES: Triple DES runs DES encryption three different times by encrypting,
decrypting, and then encrypting data again
3) Advanced Encryption Standard (AES): AES is often referred to as the gold standard for data
encryption and is used worldwide as the U.S. government standard
Asymmetric Encryption
• Encryption algorithms of this form are called asymmetric or public key because
converting C back to P involves a series of steps and two key that are different from the
steps of E .
• encryption and decryption keys come in pairs. Then, a decryption key, K D, inverts the
encryption of key KE , so that P = D(KD, E(KE ,P)).
Asymmetric Encryption
• A variety of encryption algorithms are available, each intended for a specific use. The
most well-known Asymmetric encryption algorithms are as follows:
1) RSA: RSA, named after computer scientists Ron Rivest, Adi Shamir, and Leonard
Adleman, is a popular algorithm used to encrypt data with a public key and decrypt
with a private key for secure data transmission [4].
2) Public key infrastructure (PKI): PKI is a way of governing encryption keys through the
issuance and management of digital certificates [4].
Two key trade-offs between symmetric and asymmetric
encryption
• There are two key trade-offs between symmetric and asymmetric
encryption: speed and security.
• Symmetric encryption is quicker because the keys used in symmetric
cryptography are the same for encryption and decryption unlike A
symmetric.
• Asymmetric encryption is slow but more secure because it employs two
distinct keys: a public key that is only used to encrypt communications,
making it safe for anybody to possess, and a private key that is never
disclosed. Because the private key is never shared, it ensures that only the
intended receiver may decrypt encoded communications and generate a
tamper-proof digital signature
Types of database encryption