0% found this document useful (0 votes)
6 views10 pages

Information Security Lecture 4

The document provides an overview of cryptography, emphasizing its importance in securing sensitive information and its applications in various fields like online banking and secure messaging. It distinguishes between symmetric cryptography, which uses a single key for both encryption and decryption, and asymmetric cryptography, which employs a public and private key system. The document also outlines the advantages and disadvantages of each type, along with real-world examples and use cases.

Uploaded by

bsf23000703
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views10 pages

Information Security Lecture 4

The document provides an overview of cryptography, emphasizing its importance in securing sensitive information and its applications in various fields like online banking and secure messaging. It distinguishes between symmetric cryptography, which uses a single key for both encryption and decryption, and asymmetric cryptography, which employs a public and private key system. The document also outlines the advantages and disadvantages of each type, along with real-world examples and use cases.

Uploaded by

bsf23000703
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

HIRA ZAMAN

INFORMATION SECURITY DEPARTMENT OF COMPUTER SCIENCE,

LECTURE 4 THE UNIVERSITY OF EDUCATION, LAHORE

ATTOCK CAMPUS
SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY

• What is Cryptography?
• The practice of securing information by converting it into an unreadable format.
• Why is it Important?
• Protects sensitive data from unauthorized access.
• Where is it Used?
• Online banking, secure messaging (WhatsApp), VPNs, and digital signatures.
TYPES OF CRYPTOGRAPHY

 Cryptography is divided into two main types:

1. Symmetric Cryptography – Uses one key for both encryption and decryption.
2. Asymmetric Cryptography – Uses two keys (public and private) for encryption and
decryption.
SYMMETRIC CRYPTOGRAPHY

• Definition: A single secret key is used for both encrypting and decrypting data.
• How it Works:
• Sender and receiver share the same key.
• Data is encrypted with the key and decrypted with the same key.
• Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard).
• Real-World Example: Encrypting Wi-Fi networks using WPA2 security.
ADVANTAGES AND DISADVANTAGES OF SYMMETRIC CRYPTOGRAPHY

• Advantages:
• Fast and efficient for encrypting large amounts of data.
• Requires less computational power.
• Disadvantages:
• Key distribution is challenging; if the key is intercepted, security is compromised.
• Not scalable for large systems.
ASYMMETRIC CRYPTOGRAPHY

• Definition: Uses two keys – a public key for encryption and a private key for decryption.
• How it Works:
• Sender encrypts the message using the receiver’s public key.
• Only the receiver can decrypt it using their private key.
• Examples: RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Cryptography).
• Real-World Example: Secure email communication using PGP encryption.
ADVANTAGES AND DISADVANTAGES OF ASYMMETRIC CRYPTOGRAPHY

• Advantages:
• More secure since private keys are never shared.
• Ideal for digital signatures and secure online transactions.
• Disadvantages:
• Slower than symmetric encryption.
• Requires more computational power.
KEY DIFFERENCES BETWEEN SYMMETRIC AND ASYMMETRIC
CRYPTOGRAPHY

Feature Symmetric Cryptography Asymmetric Cryptography


1 (same key for encryption &
Number of Keys 2 (public & private keys)
decryption)
Speed Faster Slower
Less secure due to key More secure since private key
Security
sharing is never shared
Example AES, DES RSA, ECC
REAL-WORLD USE CASES

• Symmetric Cryptography: Used for securing database files, VPNs, and Wi-Fi networks.
• Asymmetric Cryptography: Used in digital signatures, secure email, and SSL/TLS for
websites.

You might also like