0% found this document useful (0 votes)
65 views

Symmetric and Asymmetric Encryption

The document discusses symmetric and asymmetric encryption. Symmetric encryption uses the same key to encrypt and decrypt messages, while asymmetric encryption uses a public key to encrypt and a private key to decrypt. The document provides examples of how symmetric encryption works and the process of encrypting and decrypting with asymmetric encryption using public and private keys.

Uploaded by

Neil Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Symmetric and Asymmetric Encryption

The document discusses symmetric and asymmetric encryption. Symmetric encryption uses the same key to encrypt and decrypt messages, while asymmetric encryption uses a public key to encrypt and a private key to decrypt. The document provides examples of how symmetric encryption works and the process of encrypting and decrypting with asymmetric encryption using public and private keys.

Uploaded by

Neil Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

2.

3 - Symmetric and asymmetric encryption


2.3.1 - The purpose of encryption
When data is transferred in any public place there is a chance of interception by a hacker.
The hacker is known as an eavesdropper and using encryption helps to minimise the risk.
Encryption alters the data into a form that is unreadable to whom it isn't meant to be sent to.
Cannot stop the data from being intercepted, but it stops it from making sense to the hacker.
Encryption is particularly important if the data is sensitive or confidential. (Eg, credit card and
bank details)

Plaintext and ciphertext:


Original data being is the plaintext, once it has gone through the encryption algorithm, it
produces ciphertext.

Plaintext - encryption algorithm - ciphertext passing internet - decryption algorithm - plaintext

Key terms:
Plaintext: the original data being sent from sender to the receiver is known as plaintext
Ciphertext: an encryption algorithm is applied on the plain text. The text produced after this
the process is called ciphertext
Encryption algorithm/key: key or algorithm used to convert the plain text into ciphertext is
called encryption algorithm or key.
Decryption algorithm: key or algorithm used to convert cipher text into plaintext is called
decryption algorithm or key.

2.3.2 - Asymmetric and symmetric encryption


Symmetric encryption:
Symmetric uses an encryption key; the same key is used to encrypt and decrypt the
encoded message. Symmetric encryption uses the same key to encrypt and decrypt the
message. 10 digit denary encryption key (1 x 10^10 possible codes) and a decryption key.

Suppose encryption key used is: 4 2 9 1 3 6 2 8 5 6


This means every letter is shifted across the alphabet +4, +2, +9, +1 and so on.

C O M P U T E R

4 2 9 1 3 6 2 8

G Q V Q X Z G Z
Plaintext on the top line of the figure - ciphertext shown on the bottom

However modern computers could crack this encryption code this encryption key. We now
use 256 bit binary encryption keys that give 2^256 (approximately 1.2 x 10^77) possible
codes. Even this may not be enough as we head towards quantum computers.

Drawbacks of using symmetric encryption:


Modern computers could crack the encryption key in seconds.
Since a single key is used to encrypt and decrypt, the security is always a concern.
Asymmetric encryption:
Asymmetric encryption was developed to overcome the security problems associated with
symmetric encryption. It makes use of two keys called the public (made available to
everyone) and private key (only known to the computer user). Both types of keys are used to
encrypt and decrypt messages.

1) Jane uses an algorithm to generate a matching pair of keys (private and public) that must
be kept on their computers, matching pairs of keys are mathematically similar but cannot be
derived from each other.

2) Jane now sends her public key to Tom

3) Tom now uses Jane’s public key to encrypt the document he wishes to send to her. He
then sends his encrypted document (ciphertext) back to Jane.

4) Jane uses her matching private key to unlock Tom’s document and decrypt it; this works
because the public key used to encrypt the document and the private key to decrypt it are a
matching pair generated on Jane’s computer. (Jane cannot use public key to decrypt the
message)

Jane can also exchange her public key with any number of people, so she is able to receive
encrypted messages (which have been encrypted with her public key) and she can decrypt
them using her matching private key.

If all of them want a two way communication then each of them have to generate their
matching private and public code.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy