250 likes | 304 Views
In this presentation on Asymmetric Key Cryptography, we learn the ins & outs of asymmetric encryption and decryption. From learning the importance of asymmetric encryption, to it's applications, advantages and workflow, we cover all the bases and also take a look at why it's called public key cryptography. We learn about RSA Encryption which is a vital component of network security.<br><br>Learn more at: https://www.simplilearn.com/cyber-security-expert-master-program-training-course?utm_campaign=AsymmetricKeyCryptography&utm_medium=Description&utm_source=Slideshare<br>
E N D
Let us look at a story… Meet Joe
Joe wants to message Ryan and decides to use encryption in order to keep the messages private and secure. Joe Ryan
He can send the encrypted message to Ryan, but has doubts over sending the decryption key in-case someone intercepts it. Encrypted Message Joe Ryan
Anyone can read the message if they intercept the decryption key. Decryption Key Encrypted Message
The decryption key along with the encrypted message will reveal all the contents and Ryan will lose his privacy. Encrypted Message Original Message Decryption Key
If anyone intercepts the decryption key, the Ciphertext can easily be decoded. The Solution is Asymmetric Key Cryptography Encrypted Message Original Message Decryption Key
What Are We Learning Today? What Is Asymmetric Key Cryptography? Applications of Asymmetric Key Cryptography Why Asymmetric Cryptography Is Called Public Key Cryptography? RSA Encryption Advantages Over Symmetric Cryptography
What Is Asymmetric Key Cryptography? Asymmetric Key Cryptography uses two different keys for encryption and decryption. The key used for encryption is the public key, and the key used for decryption is the private key. PUBLIC KEY PRIVATE KEY ENCRYPTION DECRYPTION ENCRYPTED DATA
What Is Asymmetric Key Cryptography? For example, anyone who has your mailbox address can send you letters without any extra effort needed from your end. Random Person Personal Mailbox Random Person
What Is Asymmetric Key Cryptography? However, nobody other than you can access the contents of the mailbox since only you have the key that can unlock it. Random Person Random Person Owner with the private key
What Is Asymmetric Key Cryptography? Alice Bob “Call me today” “dh12#djdi2+rg” Using Bob’s Private key to decrypt Using Bob’s Public key to encrypt Call me today “dh12#djdi2+rg”
Applications of Asymmetric Key Cryptography Encrypted browsing sessions for better protection against hackers Digital Signatures to maintain authenticity of documents Sharing Keys for Symmetric Key Cryptography Managing Crypto-currency transactions securely
Why Asymmetric Cryptography Is Called Public Key Cryptography?
Why Asymmetric Cryptography Is Called Public Key Cryptography?
Why Asymmetric Cryptography Is Called Public Key Cryptography? Encryption Key Publicly Available
Why Asymmetric Cryptography Is Called Public Key Cryptography? Since the key needed to send a message is publicly available, Asymmetric Key Cryptography is also called Public Key Cryptography Encryption Key Decryption Key Publicly Available Privately Stored
RSA Encryption • Based on Asymmetric algorithm approach • Designed by Ron Rivest, Adi Shamir, Leonard Adleman • Most valuable when encrypting data in transit • Used with VPN services, email transfer, messaging applications etc.
Advantages Over Symmetric Cryptography No need of sharing secret keys Proof of owner’s authenticity Longer Key lengths mean stronger encryption Data can’t be modified in transit