240 likes | 240 Views
This presentation on Symmetric Key Cryptography will acquaint you with the the process of symmetric encryption and decryption. Here, we take a small recap into cryptography, the working and applications of symmetric key cryptography, and it's advantages. We also have Stream Ciphers and Block ciphers explained, which form a major part of network security. <br><br>Learn more at: https://www.simplilearn.com/cyber-security-expert-master-program-training-course?utm_campaign=SymmetricKeyCryptography&utm_medium=Description&utm_source=Slideshare
E N D
What in It for You? What Is Cryptography? Applications of Symmetric Key Cryptography What Is Symmetric Key Cryptography? Private-Key Cryptography Types of encryption Advantages of Symmetric Key Cryptography
What Is Cryptography? Cryptography is the science of encrypting and decryption data to prevent unauthorized access. Encryption converts data from plaintext to Ciphertext. Decryption reverses the process of encryption to retrieve the original information. “Study” “Study” Encryption Decryption “G4*F#2” Plaintext Plaintext Ciphertext
Types of Encryption Encryption In Cryptography Symmetric Key Cryptography Asymmetric Key Cryptography
Types of Encryption Symmetric Key Cryptography
Applications of Symmetric Key Cryptography Banking applications to authenticate ID and transactions Server/Data Center information can be encrypted at rest HTTPS encryption with secure all-around browsing
What Is Symmetric Key Cryptography? Symmetric Key Cryptography relies on a single key for encryption and decryption of information. The key needs to be kept secret and be available with both the sender and receiver. Strength of encryption depends on the key size being used.
What Is Symmetric Key Cryptography? Secret Key Jane Paul
What Is Symmetric Key Cryptography? Jane Paul ‘I am ready’ ‘I am ready’ ‘H FI MBIRL’ ‘H FI MBIRL’ Ciphertext Plaintext
Private – Key Cryptography • Same Key for encryption and decryption means a single point of failure • Key needs to be kept secret at all times • Receiver/Third party can also generate messages with the same key, so authentication issue will arise should the secret key is leaked Secret Key
Types of Encryption – Stream Ciphers • Encrypt information one bit/byte at time • Quicker format of encryption • Data is converted to binary digits and encrypted sequentially • Popular algorithms – RC4, Salsa20 10010101 W^3K0# Binary Data Encryption Key Ciphertext
Types of Encryption – Stream Ciphers 1 0 0 1 0 1 0 1 Binary Data f (x) Algorithm Function 0 1 1 1 0 0 1 0 Random Encryption Key 1 0 1 1 1 0 0 1 W^3K0# Ciphertext
Types of Encryption – Block Ciphers • Information broken down to chunks/blocks of fixed size • Size of block depends on key size • The chunks are encrypted and later chained together • Popular algorithms – AES, DES, 3DES Binary Data 01011100 01101100 01001000 01100101 01101111 Block 1 Block 3 Block 4 Block 5 Block 2
Types of Encryption – Block Ciphers Each Block Encryption Key Encrypted Block 01001000 10101110 01110101 01100101 01101100 01001001 10110010 01011100 01101111 11101001
Types of Encryption – Block Ciphers 10101110 10110010 01001001 11101001 01110101 10101110 01110101 01001001 10110010 1101001 W$2M& Ciphertext
Advantages of Symmetric Key Cryptography Faster than Asymmetric Better Performance Metrics Optimized for bulk amounts of data Easier to set-up and implement