CONVENTIONAL
ENCRYPTION
Prof. NeerajBhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan
ADVANTAGESOFCONVENTIONALENCRYPTION
1.Simple :
This type of encryption is easy to carry out.
2.Useslesscomputerresources:
Conventionalencryptiondoesnotrequirealotofcomputer
resourceswhencomparedtopublickeyencryption.
3.Fast:
Conventionalencryptionismuchfasterthanasymmetric
keyencryption.
SYMMETRICENCRYPTIONISAFORMOFCRYPTOSYSTEMINWHICH
ENCRYPTIONANDDECRYPTIONAREPERFORMEDUSINGTHESAMEKEY. ITIS
ALSOKNOWNASCONVENTIONALENCRYPTION.
Two requirements for secure use of symmetric encryption:
–A strong encryption algorithm
–A secret key known only to sender / receiver
Y = EK(X)
X = DK(Y)
.assume encryption algorithm is known
.implies a secure channel to distribute key
Asourceproducesamessageinplaintext,X=[X1,X2…XM]whereMarethe
numberoflettersinthemessage.AkeyoftheformK=[K1,K2…KJ]isgenerated.If
thekeyisgeneratedatthesource,thenitmustbeprovidedtothedestinationby
meansofsomesecurechannel.
WiththemessageXandtheencryptionkeyKasinput,theencryptionalgorithm
formstheciphertextY=[Y1,Y2,YN].Thiscanbeexpressedas
Y = EK(X)
Theintendedreceiver,inpossessionofthekey,isabletoinvert
thetransformation:
X = DK(Y)
Anopponent,observingYbutnothavingaccesstoKorX,mayattempttorecoverX
orKorboth.Itisassumedthattheopponentknowstheencryptionanddecryption
algorithmsIftheopponentisinterestedinonlythisparticularmessage,thenthe
focusofeffortistorecoverbygeneratingaplaintextestimate.Ofteniftheopponent
isinterestedinbeingabletoreadfuturemessagesaswell,inwhichcaseanattempt
ismadetorecoverKbygeneratinganestimate.
ASSIGNMENT
Q1. Explain the Conventional Encryption model in Detail?