Suche senden
Hochladen
Symmetric and asymmetric key
•
Als PPTX, PDF herunterladen
•
26 gefällt mir
•
30,460 views
Triad Square InfoSec
Folgen
Technologie
Bildung
Melden
Teilen
Melden
Teilen
1 von 12
Jetzt herunterladen
Empfohlen
Cryptography
Cryptography
Sidharth Mohapatra
Cryptography
Cryptography
jayashri kolekar
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
block ciphers
block ciphers
Asad Ali
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
Cryptography.ppt
Cryptography.ppt
kusum sharma
Introduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Cryptography.ppt
Cryptography.ppt
Uday Meena
Empfohlen
Cryptography
Cryptography
Sidharth Mohapatra
Cryptography
Cryptography
jayashri kolekar
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
block ciphers
block ciphers
Asad Ali
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
Cryptography.ppt
Cryptography.ppt
kusum sharma
Introduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Cryptography.ppt
Cryptography.ppt
Uday Meena
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Substitution techniques
Substitution techniques
vinitha96
Cryptography
Cryptography
Sagar Janagonda
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
Key management and distribution
Key management and distribution
Riya Choudhary
Cryptography
Cryptography
Kalyani Government Engineering College
6. cryptography
6. cryptography
7wounders
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
Cryptography
Cryptography
Darshini Parikh
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
Information and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
Asymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
Cryptography
Cryptography
subodh pawar
RSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Weitere ähnliche Inhalte
Was ist angesagt?
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Substitution techniques
Substitution techniques
vinitha96
Cryptography
Cryptography
Sagar Janagonda
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
Key management and distribution
Key management and distribution
Riya Choudhary
Cryptography
Cryptography
Kalyani Government Engineering College
6. cryptography
6. cryptography
7wounders
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
Cryptography
Cryptography
Darshini Parikh
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
Information and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
Asymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
Cryptography
Cryptography
subodh pawar
RSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
Was ist angesagt?
(20)
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
Substitution techniques
Substitution techniques
Cryptography
Cryptography
Block cipher modes of operation
Block cipher modes of operation
Key management and distribution
Key management and distribution
Cryptography
Cryptography
6. cryptography
6. cryptography
Cryptographic algorithms
Cryptographic algorithms
Cryptography
Cryptography
Double DES & Triple DES
Double DES & Triple DES
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Information and network security 13 playfair cipher
Information and network security 13 playfair cipher
symmetric key encryption algorithms
symmetric key encryption algorithms
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Asymmetric Cryptography
Asymmetric Cryptography
Cryptography
Cryptography
RSA ALGORITHM
RSA ALGORITHM
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Ähnlich wie Symmetric and asymmetric key
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
HassanAli980906
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
cryptography
cryptography
swatihans
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
SayeeKumarMadhesh
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
Cryptography
Cryptography
Vicky Kamboj
Public key algorithm
Public key algorithm
Prateek Pandey
Unit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Encryption in Cryptography
Encryption in Cryptography
Uttara University
Encryption by fastech
Encryption by fastech
Abdulafeez Fasasi
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
IJNSA Journal
How encryption works
How encryption works
aizu_u-11911
$ii7oi5i-12
$ii7oi5i-12
Hideyuki Sato
Data encryption
Data encryption
Balvant Biradar
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
Ähnlich wie Symmetric and asymmetric key
(20)
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
DES- Data Encryption Standard
DES- Data Encryption Standard
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
cryptography
cryptography
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Cryptography
Cryptography
Public key algorithm
Public key algorithm
Unit 7 : Network Security
Unit 7 : Network Security
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
Encryption in Cryptography
Encryption in Cryptography
Encryption by fastech
Encryption by fastech
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
How encryption works
How encryption works
$ii7oi5i-12
$ii7oi5i-12
Data encryption
Data encryption
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Kürzlich hochgeladen
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Kürzlich hochgeladen
(20)
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Symmetric and asymmetric key
1.
Symmetric & Asymmetric encryption ©
2013, Triad Square InfoSec Pvt. Ltd
2.
SYMMETRIC ENCRYPTION An
encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. In other terms, Data is encrypted and decrypted using the same key. Symmetric-key cryptography is sometimes called secretkey cryptography. © 2013, Triad Square InfoSec Pvt. Ltd
3.
SYMMETRIC ENCRYPTION (cont..) (Plain
text) (Plain text) Hello world Hello world (cipher text) #%giuyrwkmns:{? Encryption Decryption Shared same secret key © 2013, Triad Square InfoSec Pvt. Ltd
4.
Symmetric-key systems
are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted, Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted. Examples of symmetric algorithms are DES, 3DES and AES © 2013, Triad Square InfoSec Pvt. Ltd
5.
The most
popular symmetric-key system is the Data Encryption Standard (DES). DES uses 56-bit keys, they are short enough to be easily brute-forced by modern hardware and it is recommended that DES should not to be used. Triple DES (or 3DES) uses 128 bits key length, the same algorithm, applied three times to produce strong encryption. © 2013, Triad Square InfoSec Pvt. Ltd
6.
MERITS & DE-MERITS Merits: SIMPLER FASTER De-Merits: Two
parties must somehow exchange the key in a secure way. Public key is distributed in a non-secure way b/n Client/Server. Easy for hackers to get the key as it is shared in unsecure way. © 2013, Triad Square InfoSec Pvt. Ltd
7.
Asymmetric encryption: Asymmetric encryption
use two keys, one to encrypt the data, and another key to decrypt the data. These keys are generated together. One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden. Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption. © 2013, Triad Square InfoSec Pvt. Ltd
8.
How it WORKS…….? ©
2013, Triad Square InfoSec Pvt. Ltd
9.
Key Points in
Asymmetric Encryption Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data These keys are generated together. The Public key(s) is distributed freely between the sender and receiver. The other is named as Private Key and it is kept hidden. The Private Key is only used for Decryption and will not be shared between the sender and receiver. © 2013, Triad Square InfoSec Pvt. Ltd
10.
Asymmetric Encryption Algorithms RSA:
Rivest-Shamir-Adleman is the most commonly used asymmetric algorithm (public key algorithm). It can be used both for encryption and for digital signatures. Digital Signature Algorithm: The standard defines DSS to use the SHA-1 hash function exclusively to compute message. The main problem with DSA is the fixed subgroup size (the order of the generator element), which limits the security to around only 80 bits. Hardware attacks can be menacing to some implementations of DSS. However, it is widely used and accepted as a good algorithm. Diffie-Helman: Diffie-Hellman is the first asymmetric encryption algorithm, invented in 1976, using discrete logarithms in a finite field. Allows two users to exchange a secret key over an insecure medium without any prior secrets. © 2013, Triad Square InfoSec Pvt. Ltd
11.
Asymmetric Encryption Algorithms ElGamal:
The ElGamal is a public key cipher - an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. ElGamal is the predecessor of DSA. ECDSA: Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which operates on elliptic curve groups. As with Elliptic Curve Cryptography in general, the bit size of the public key believed to be need ECDSA is about twice the size of the security level, in bits. XTR: It is based on the primitive underlying the very first public key cryptosystem, the Diffie-Hellman key agreement protocol. Some advantages of XTR are its fast key generation (much faster than RSA), small key sizes (much smaller than RSA, comparable with ECC for current security settings), and speed. © 2013, Triad Square InfoSec Pvt. Ltd
12.
MERITS & DE-MERITS Merits:
Two parties don't need to have their private keys already shared in order to communicate using encryption. Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. © 2013, Triad Square InfoSec Pvt. Ltd
Jetzt herunterladen