CONVENTIONAL ENCRYPTION

1,292 views 11 slides Feb 26, 2021
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

CONVENTIONAL ENCRYPTION


Slide Content

CONVENTIONAL
ENCRYPTION
Prof. NeerajBhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan

INTRODUCTION TOCONVENTIONAL
ENCRYPTION
CONVENTIONALENCRYPTIONARECRYPTOGRAPHIC
SYSTEMWHICHUSESSAMEKEYUSEDBYSENDERTO
ENCRYPTMESSAGEANDBYRECEIVERTODECRYPT
MESSAGE.ITWASONLYTYPEOFENCRYPTIONINUSE
PRIORTODEVELOPMENTOFPUBLIC-KEYENCRYPTION.
ITISSTILLMUCHPREFERREDOFTHETWOTYPESOF
ENCRYPTIONSYSTEMSDUETOITSSIMPLICITY.ITISA
RELATIVELYFASTPROCESSSINCEITUSESASINGLEKEY
FORBOTHENCRYPTIONANDDECRYPTIONINTHIS
ENCRYPTIONMODEL,THESENDERENCRYPTSPLAINTEXT
USINGRECEIVER’SSECRETKEY,WHICHCANBELATER
USEDBYRECEIVERTODECRYPTCIPHERTEXT.

BELOWISFIGURETHAT
ILLUSTRATETHISCONCEPT.

EXPLANATION :
SUPPOSEAWANTSTOSENDAMESSAGETOB,THATMESSAGEISCALLED
PLAINTEXT.NOW,TOAVOIDHACKERSTOREADPLAINTEXT,PLAINTEXTIS
ENCRYPTEDUSINGALGORITHMANDASECRETKEY(AT1).THIS
ENCRYPTEDPLAINTEXTISCALLEDCIPHERTEXT.USINGSAMESECRETKEY
ANDENCRYPTIONALGORITHMRUNINREVERSE(AT2),BCANGET
PLAINTEXTOFAANDTHUSMESSAGEISREADANDSECURITYIS
MAINTAINED.
THEIDEATHATUSESINTHISTECHNIQUEISVERYOLDANDTHAT’SWHY
THISMODEL ISCALLED CONVENTIONAL ENCRYPTION

A CONVENTIONALENCRYPTIONHASMAINLY5 INGREDIENTS
•Plaintext–thusmessageisreadandsecurityismaintained.
•Encryptionalgorithm–Encryptionalgorithmperformsvarious
transformationsonplaintexttoconvertitintociphertext.
•Secretkey–Secretkeyisalsoaninputtothealgorithm.The
encryptionalgorithmwillproducedifferentoutputbasedon
thekeysusedatthattime.
•Ciphertext–Itcontainsencryptedinformationbecauseit
containsaformoforiginalplaintextthatisunreadablebya
humanorcomputerwithoutproperciphertodecryptit.Itis
outputfromalgorithm.
•Decryptionalgorithm–Thisisusedtorunencryption
algorithminreverse.CiphertextandSecretkeyisinputhere
anditproducesplaintextasoutput.

ADVANTAGESOFCONVENTIONALENCRYPTION
1.Simple :
This type of encryption is easy to carry out.
2.Useslesscomputerresources:
Conventionalencryptiondoesnotrequirealotofcomputer
resourceswhencomparedtopublickeyencryption.
3.Fast:
Conventionalencryptionismuchfasterthanasymmetric
keyencryption.

DISADVANTAGESOFCONVENTIONALENCRYPTION
1.Originandauthenticityofmessagecannotbeguaranteed,
sincebothsenderandreceiverusethesamekey,messages
cannotbeverifiedtohavecomefromaparticularuser.
2.Itisn’tmuchsecuredwhencomparedtopublickey
encryption.Ifthereceiverlostthekey,he/shecantdecrypt
theandthusthewhole
3.Thisschemedoesnotscalewelltoalargenumberofusers
becauseboththesenderandthereceivertoagreeonasecret
keybeforetransmission.

SYMMETRICENCRYPTION:

SYMMETRICENCRYPTIONISAFORMOFCRYPTOSYSTEMINWHICH
ENCRYPTIONANDDECRYPTIONAREPERFORMEDUSINGTHESAMEKEY. ITIS
ALSOKNOWNASCONVENTIONALENCRYPTION.
Two requirements for secure use of symmetric encryption:
–A strong encryption algorithm
–A secret key known only to sender / receiver
Y = EK(X)
X = DK(Y)
.assume encryption algorithm is known
.implies a secure channel to distribute key

Asourceproducesamessageinplaintext,X=[X1,X2…XM]whereMarethe
numberoflettersinthemessage.AkeyoftheformK=[K1,K2…KJ]isgenerated.If
thekeyisgeneratedatthesource,thenitmustbeprovidedtothedestinationby
meansofsomesecurechannel.
WiththemessageXandtheencryptionkeyKasinput,theencryptionalgorithm
formstheciphertextY=[Y1,Y2,YN].Thiscanbeexpressedas
Y = EK(X)
Theintendedreceiver,inpossessionofthekey,isabletoinvert
thetransformation:
X = DK(Y)
Anopponent,observingYbutnothavingaccesstoKorX,mayattempttorecoverX
orKorboth.Itisassumedthattheopponentknowstheencryptionanddecryption
algorithmsIftheopponentisinterestedinonlythisparticularmessage,thenthe
focusofeffortistorecoverbygeneratingaplaintextestimate.Ofteniftheopponent
isinterestedinbeingabletoreadfuturemessagesaswell,inwhichcaseanattempt
ismadetorecoverKbygeneratinganestimate.

ASSIGNMENT
Q1. Explain the Conventional Encryption model in Detail?
Tags