100% found this document useful (1 vote)
71 views16 pages

Symmetric and Asymmetric Encryption: Presentation On

This document provides an overview of symmetric and asymmetric encryption. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses two different keys: a public key for encryption and a private key for decryption. The document discusses algorithms for each type such as DES, RSA, and Diffie-Hellman. It notes advantages of asymmetric encryption include secure key exchange and authentication, while disadvantages are greater complexity and processing time.

Uploaded by

Tupai Samanta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
71 views16 pages

Symmetric and Asymmetric Encryption: Presentation On

This document provides an overview of symmetric and asymmetric encryption. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses two different keys: a public key for encryption and a private key for decryption. The document discusses algorithms for each type such as DES, RSA, and Diffie-Hellman. It notes advantages of asymmetric encryption include secure key exchange and authentication, while disadvantages are greater complexity and processing time.

Uploaded by

Tupai Samanta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16

Presentation On

Symmetric and Asymmetric Encryption

Name :- Suman Samanta


University Roll No. :- 15800120043
University Reg. No. :- 201580100120020
Department :- CSE
Paper Name:- Cryptography And Network
Security Presentation By –
Paper Code:- PEC-CS801B Suman Samanta
Semester :- 8th
Concept- Symmetric And Asymmetric
Encryption
Content
1. Symmetric-key cryptography

2. Asymmetric-key cryptography
3. Asymmetric Encryption

4. How it WORKS

5. Asymmetric Encryption
Algorithms

6. MERITS & DE-MERITS


Symmetric-key cryptography
Note

In symmetric-key cryptography, the same key is used


by the sender(for encryption) and the receiver (for
decryption).
The key is shared.
Algorithm: DES,3DES
Symmetric-key cryptography

• Advantages:
– Simple
– Faster
• Disadvantages:
– Key must exchanges in secure way
– Easy for hacker to get a key as it is passed in
unsecure way.
Figure 30.4 Asymmetric-key cryptography
Note

An asymmetric-key (or public-key) cipher uses two


keys: one private (To encrypt data) and one public(To
decrypt data).
• Asymmetric Key Cryptography (Public Key Cryptography)
– 2 different keys are used
– Users get the Key from an Certificate Authority

Advantages
1. More Secured
2. Authentication

Disadvantages
1. Relatively Complex
Figure 30.6 Comparison between two categories of cryptography

30.9
• Asymmetric encryption use two keys, one to encrypt the data,
and another key to decrypt the data.
•These keys are generated together
•. One is named as Public key and is distributed freely. The other
is named as Private Key and it is kept hidden.
•Both Sender & Recipient has to share their Public Keys for
Encryption and has to use their Private Keys for Decryption.
 Asymmetric encryption use two keys:

Public Key - to encrypt the data

Private Key - to decrypt the data


 These keys are generated together.

 The Public key(s) is distributed freely between the sender and receiver.

 The other is named as Private Key and it is kept hidden.

 The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
RSA:
Digital Signature Algorithm:
Diffie-Helman:.
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means that you can
encrypt the message with my public key and only I can decrypt it with my private key.
Non-repudiation means that you can "sign" the message with your private key and I can
verify that it came from you with your public key.)

De-Merits:
Asymmetric Encryption algorithms are comparatively complex.
Time consuming process for Encryption and Decryption.
•THANK YOU

You might also like