0% found this document useful (0 votes)
3 views

Lecture-13 program to detect double space

The lecture by Dr. Shafiq Hussain introduces asymmetric encryption, which utilizes a public key for encryption and a private key for decryption, ensuring secure communication without the need for key sharing. It discusses the applications of asymmetric key cryptography, including digital signatures, TLS/SSL handshakes, and cryptocurrency transactions, highlighting its advantages such as no key sharing, proof of ownership, and tamper-proof communication. The RSA encryption algorithm is emphasized as a widely adopted method in various industries for secure data transmission and document signing.

Uploaded by

MUHAMMAD AHMAD
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Lecture-13 program to detect double space

The lecture by Dr. Shafiq Hussain introduces asymmetric encryption, which utilizes a public key for encryption and a private key for decryption, ensuring secure communication without the need for key sharing. It discusses the applications of asymmetric key cryptography, including digital signatures, TLS/SSL handshakes, and cryptocurrency transactions, highlighting its advantages such as no key sharing, proof of ownership, and tamper-proof communication. The RSA encryption algorithm is emphasized as a widely adopted method in various industries for secure data transmission and document signing.

Uploaded by

MUHAMMAD AHMAD
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Information Security

Lecture # 13

Dr. Shafiq Hussain


Associate Professor & Chairperson
Department of Computer Science

1
Objectives
• Introduction to Cryptography.

2
Asymmetric Encryption
• Asymmetric encryption algorithms use two different
keys for encryption and decryption.

• The key used for encryption is the public key, and the
key used for decryption is the private key. Both the
keys must belong to the receiver.

3
Asymmetric Encryption (Cont..)

4
Asymmetric Encryption (Cont..)
• For example, if Alice needs to send a message to Bob,
both the keys, private and public, must belong to
Bob.

5
Asymmetric Encryption (Cont..)

6
Asymmetric Encryption (Cont..)
The process for the above image is as follows:
• Step 1: Alice uses Bob’s public key to encrypt the
message

• Step 2: The encrypted message is sent to Bob

• Step 3: Bob uses his private key to decrypt the


message

7
Asymmetric Encryption (Cont..)
The process for the above image is as follows:
• Step 1: Alice uses Bob’s public key to encrypt the
message

• Step 2: The encrypted message is sent to Bob

• Step 3: Bob uses his private key to decrypt the


message

8
Asymmetric Encryption (Cont..)
To understand the asymmetric key cryptography
architecture clearly, consider the process of sending and
receiving letters via physical mailboxes.

9
Asymmetric Encryption (Cont..)
Anyone who has the postal address of the receiver
(public key in our case) can send any message they
want.

10
Asymmetric Encryption (Cont..)
However, only the receiver can read all his/her
messages thanks to the mailbox key that no other person
can have.

11
Asymmetric Encryption (Cont..)

12
Asymmetric Encryption (Cont..)
• This eliminates the need to exchange any secret key
between sender and receiver, thereby reducing the
window of exploitation.

13
Asymmetric Encryption (Cont..)
• Asymmetric key cryptography has found use in many
authentication domains thanks to its thorough identity
verification process. Some applications are as
follows:

14
Asymmetric Encryption (Cont..)

15
Asymmetric Encryption (Cont..)
Digital signatures:
• Verification of document origin and signature
authenticity is possible today thanks to asymmetric
key cryptography.

16
Asymmetric Encryption (Cont..)
TLS/SSL handshake:
• Asymmetric key cryptography plays a significant role
in verifying website server authenticity, exchanging
the necessary encryption keys required, and
generating a session using those keys to ensure
maximum security. Instead of the rather insecure
HTTP website format.

17
Asymmetric Encryption (Cont..)
Crypto-currency:
• Asymmetric key cryptography uses blockchain
technology to authorize cryptocurrency transactions
and maintain the integrity of its decentralized
architecture.

18
Asymmetric Encryption (Cont..)
Key sharing:
• This cryptography category can also be used to
exchange secret keys for symmetric encryption since
keeping such keys private is of utmost importance in
its system.

19
Asymmetric Encryption (Cont..)
• Asymmetric Key Cryptography is also Called Public
Key Cryptography.

• Asymmetric key cryptography is also called public-


key cryptography because of its open nature.

20
Asymmetric Encryption (Cont..)
RSA Encryption:
• RSA encryption is an asymmetric encryption
algorithm named after its founders (Rivest, Shamir &
Adleman) that uses block cipher methodology to
encrypt data.

21
Asymmetric Encryption (Cont..)
RSA Encryption:
• It has been adopted worldwide in many industries like
VPNs, chat applications, browser authorization, and
email encryption, to name a few.

22
Asymmetric Encryption (Cont..)
RSA Encryption:
• RSA algorithm is also used for the signing of
documents, where the sender can sign a document
using his own private key, and the receiver verifies
the document using the sender’s public key.

23
Asymmetric Encryption (Cont..)
RSA Encryption:
• Since both keys are mathematically linked, it is
impossible to replace either of the keys with a
fraudulent piece.

24
Asymmetric Encryption (Cont..)
Advantages of Using Asymmetric Key
Cryptography:

25
Asymmetric Encryption (Cont..)
Advantages of Using Asymmetric Key Cryptography:

No key sharing:
• Asymmetric key cryptography overcomes the biggest
flaw of symmetric key cryptography since it doesn’t
need to exchange any keys that can decrypt data.

26
Asymmetric Encryption (Cont..)
Advantages of Using Asymmetric Key Cryptography:

Proof of owner:
• Since it links the private and public keys together, a
message is decrypted using a private key.

• It stands as evidence that the message originated from


the rightful owner who has the private key.

27
Asymmetric Encryption (Cont..)
Advantages of Using Asymmetric Key Cryptography:

Longer key lengths:


• Asymmetric encryption algorithms have key sizes up
to 4096 bits that significantly increase the cipher and
ciphertext security.

28
Asymmetric Encryption (Cont..)
Advantages of Using Asymmetric Key Cryptography:

Tamper-proof:
• Hackers can’t modify data during transmission since
doing so will prevent the receiver's private key from
decrypting the message, thus informing the receiver
that the message has been meddled with.

29
Questions
Any Question Please?

You can contact me at: [email protected]

Your Query will be answered within one working day.

30
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown

31
Thanks

32

You might also like