SlidePub
Home
Categories
Login
Register
Home
General
Symmetric and asymmetric key
Symmetric and asymmetric key
32,709 views
12 slides
Jan 29, 2014
Slide
1
of 12
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
About This Presentation
No description available for this slideshow.
Size:
1.04 MB
Language:
en
Added:
Jan 29, 2014
Slides:
12 pages
Slide Content
Slide 1
Symmetric & Asymmetric encryption © 2013, Triad Square InfoSec Pvt. Ltd
Slide 2
An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message . In other terms, Data is encrypted and decrypted using the same key. Symmetric-key cryptography is sometimes called secret-key cryptography. © 2013, Triad Square InfoSec Pvt. Ltd
Slide 3
Hello world E ncryption #% giuyrwkmns :{? Decryption Hello world (Plain text) (Plain text) (cipher text) Shared same secret key © 2013, Triad Square InfoSec Pvt. Ltd
Slide 4
Symmetric-key systems are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted, Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted. Examples of symmetric algorithms are DES , 3DES and AES © 2013, Triad Square InfoSec Pvt. Ltd
Slide 5
The most popular symmetric-key system is the Data Encryption Standard (DES ) . DES uses 56-bit keys, they are short enough to be easily brute-forced by modern hardware and it is recommended that DES should not to be used. Triple DES (or 3DES) uses 128 bits key length, the same algorithm, applied three times to produce strong encryption . © 2013, Triad Square InfoSec Pvt. Ltd
Slide 6
Merits: SIMPLER FASTER De-Merits: Two parties must somehow exchange the key in a secure way. Public key is distributed in a non-secure way b/n Client/Server. Easy for hackers to get the key as it is shared in unsecure way. © 2013, Triad Square InfoSec Pvt. Ltd
Slide 7
Asymmetric encryption: Asymmetric encryption use two keys, one to encrypt the data, and another key to decrypt the data. These keys are generated together. One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden . Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption. © 2013, Triad Square InfoSec Pvt. Ltd
Slide 8
© 2013, Triad Square InfoSec Pvt. Ltd
Slide 9
Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data These keys are generated together. The Public key(s) is distributed freely between the sender and receiver. The other is named as Private Key and it is kept hidden. The Private Key is only used for Decryption and will not be shared between the sender and receiver. © 2013, Triad Square InfoSec Pvt. Ltd
Slide 10
RSA : Rivest -Shamir- Adleman is the most commonly used asymmetric algorithm (public key algorithm). It can be used both for encryption and for digital signatures . Digital Signature Algorithm : The standard defines DSS to use the SHA-1 hash function exclusively to compute message. The main problem with DSA is the fixed subgroup size (the order of the generator element), which limits the security to around only 80 bits. Hardware attacks can be menacing to some implementations of DSS. However, it is widely used and accepted as a good algorithm . Diffie-Helman : Diffie -Hellman is the first asymmetric encryption algorithm, invented in 1976, using discrete logarithms in a finite field. Allows two users to exchange a secret key over an insecure medium without any prior secrets. © 2013, Triad Square InfoSec Pvt. Ltd
Slide 11
ElGamal : The ElGamal is a public key cipher - an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. ElGamal is the predecessor of DSA . ECDSA : Elliptic Curve DSA (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which operates on elliptic curve groups. As with Elliptic Curve Cryptography in general, the bit size of the public key believed to be need ECDSA is about twice the size of the security level, in bits . XTR : It is based on the primitive underlying the very first public key cryptosystem, the Diffie-Hellman key agreement protocol. Some advantages of XTR are its fast key generation (much faster than RSA), small key sizes (much smaller than RSA, comparable with ECC for current security settings), and speed. © 2013, Triad Square InfoSec Pvt. Ltd
Slide 12
Merits: Two parties don't need to have their private keys already shared in order to communicate using encryption. Authentication and Non-Repudiation are possible . (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. © 2013, Triad Square InfoSec Pvt. Ltd
Tags
Categories
General
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
32,709
Slides
12
Favorites
26
Age
4324 days
Related Slideshows
22
Pray For The Peace Of Jerusalem and You Will Prosper
RodolfoMoralesMarcuc
30 views
26
Don_t_Waste_Your_Life_God.....powerpoint
chalobrido8
32 views
31
VILLASUR_FACTORS_TO_CONSIDER_IN_PLATING_SALAD_10-13.pdf
JaiJai148317
30 views
14
Fertility awareness methods for women in the society
Isaiah47
29 views
35
Chapter 5 Arithmetic Functions Computer Organisation and Architecture
RitikSharma297999
26 views
5
syakira bhasa inggris (1) (1).pptx.......
ourcommunity56
28 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-12)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better