0% found this document useful (0 votes)
2 views

Lecture-12program to detect double space

The lecture by Dr. Shafiq Hussain introduces encryption as a method of protecting information by converting plaintext into ciphertext using algorithms and keys. It covers symmetric encryption, which relies on a single shared key for both encryption and decryption, and discusses its importance in various applications such as online banking and data security. The lecture also differentiates between stream ciphers and block ciphers, highlighting their respective processes and uses.

Uploaded by

MUHAMMAD AHMAD
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lecture-12program to detect double space

The lecture by Dr. Shafiq Hussain introduces encryption as a method of protecting information by converting plaintext into ciphertext using algorithms and keys. It covers symmetric encryption, which relies on a single shared key for both encryption and decryption, and discusses its importance in various applications such as online banking and data security. The lecture also differentiates between stream ciphers and block ciphers, highlighting their respective processes and uses.

Uploaded by

MUHAMMAD AHMAD
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Information Security

Lecture # 12

Dr. Shafiq Hussain


Associate Professor & Chairperson
Department of Computer Science

1
Objectives
• Introduction to Encryption.

2
Encryption
• Encryption is the process of information protection
by transforming readable data, often referred to as
plaintext, into an unreadable format known as
ciphertext, using an algorithm and an encryption key.

3
Encryption (Cont..)
• If data falls into an unauthorized party’s hands, it
cannot be read without having the correct encryption
keys to decrypt the data.

4
Encryption (Cont..)
• Using an algorithm that is based on a mathematical
formula, encryption “scrambles” or encrypts an
organization’s data, making it unreadable.

5
Encryption (Cont..)
• When a user wants to unscramble the data, they then
use a designated encryption key to decrypt the
information.

• In its encrypted state, data is referred to as


“ciphertext” and in its readable form it’s called
“plaintext.”

6
Encryption (Cont..)
• To give you an idea of just how complex and
advanced encryption algorithms are, it would take a
normal computer around 300 trillion years to break
an RSA-2048 bit encryption key , using what’s called
a brute force attack.

7
Encryption (Cont..)
• Encryption is the science of encrypting and
decrypting data to prevent unauthorized access.

8
Encryption (Cont..)
• Encryption is the process of making the plaintext
unreadable to any third party, which generates the
ciphertext.

• Decryption is the process of reversing the encrypted


text to its original readable format, i.e., plaintext.

9
Encryption (Cont..)
There are two types of encryption in cryptography:

• Symmetric Encryption
• Asymmetric Encryption

10
Symmetric Encryption
• Symmetric Encryption algorithm relies on a single
key for encryption and decryption of information.

• Both the sender and receiver of the message need to


have a pre-shared secret key that they will use to
convert the plaintext into ciphertext and vice versa.

11
Symmetric Encryption (Cont..)

12
Symmetric Encryption (Cont..)
• The key which is being used for encrypting the
original message is decrypting the ciphertext.

• The key must be kept private and be known only to


the sender and the receiver.

13
Symmetric Encryption (Cont..)

14
Symmetric Encryption (Cont..)
• Step 1: Paul and Jane decide on a common key to be
used

• Step 2: Paul sends the secret encryption key to Jane


or vice versa

• Step 3: Paul uses the private key to encrypt the


original message

15
Symmetric Encryption (Cont..)
• Step 4: Paul sends the encrypted message to Jane

• Step 5: Jane uses the secret key to decrypt the


message that was already present with her

16
Symmetric Encryption (Cont..)
• Symmetric encryption is essential for many day-to-
day activities on the internet, ranging from safe
online browsing to banking applications.

17
Symmetric Encryption (Cont..)

18
Symmetric Encryption (Cont..)
Payment Applications:
• Many online banking and payment applications
require the verification of personally identifiable
information before proceeding with their transactions.

• It helps in predicting the correct information to


prevent fraudulent activities and cybercrime.

19
Symmetric Encryption (Cont..)
Securing Data at Rest:
• When a website or organization stores personal
information regarding their users or the company
itself, it is protected using Symmetric encryption.

• This is done to prevent all kinds of snooping from


either outside hackers or disgruntled employees
inside the office, looking to steal crucial information.

20
Symmetric Encryption (Cont..)
SSL/TLS Handshake:
• Symmetric encryption plays a significant role in
verifying website server authenticity, exchanging the
necessary encryption keys required, and generating a
session using those keys to ensure maximum security,
instead of the rather insecure HTTP website format.

21
Symmetric Encryption (Cont..)
• Symmetric Key Cryptography is also Called Private
Key Cryptography.

22
Symmetric Encryption (Cont..)
Two types of ciphers can be used in symmetric
algorithms. These two types are:

• Stream Ciphers
• Block Ciphers

23
Symmetric Encryption (Cont..)
Stream Ciphers:
• Stream ciphers are the algorithms that encrypt basic
information, one byte/bit at a time.

• You use a bitstream generation algorithm to create a


binary key and encrypt the plaintext.

24
Symmetric Encryption (Cont..)
Stream Ciphers:
The process for encryption and decryption using stream
ciphers are as follows :

• Get the plaintext to be encrypted.

• Create a binary key using the bitstream generation


algorithm.

25
Symmetric Encryption (Cont..)
Stream Ciphers:

• Perform XOR operation on the plaintext using the


generated binary key.

• The output becomes the ciphertext.

• Perform XOR operations on the ciphertext using the


same key to get back the plaintext.

26
Symmetric Encryption (Cont..)

27
Symmetric Encryption (Cont..)
Stream Ciphers:

• The most well-known stream ciphers are RC-4,


SALSA and PANAMA.

28
Symmetric Encryption (Cont..)
Block Ciphers:
• On the other hand, block ciphers dissect the raw
information into chunks of data of a fixed size.

• The size depends on the exact cipher being used.

29
Symmetric Encryption (Cont..)
Block Ciphers:
• A 128-bit block cipher will break the plaintext into
blocks of 128-bit each and encrypt those blocks
instead of a single digit.

30
Symmetric Encryption (Cont..)
Block Ciphers:
• These ciphers are slower but much more tamper-
proof and are used in some of the most common
algorithms being employed today.

31
Symmetric Encryption (Cont..)

32
Symmetric Encryption (Cont..)

33
Symmetric Encryption (Cont..)
• Today, the most popular symmetric-key algorithms
like AES, DES, and 3DES are block cipher
methodology subsets.

34
Symmetric Encryption (Cont..)
Advantages of Using Symmetric Key Cryptography:

35
Questions
Any Question Please?

You can contact me at: [email protected]

Your Query will be answered within one working day.

36
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown

37
Thanks

38

You might also like