Lecture 10 Encryption
Lecture 10 Encryption
Lecture # 10
1
Objectives
• Introduction to Encryption.
2
Encryption
• Encryption is the process of information protection
by transforming readable data, often referred to as
plaintext, into an unreadable format known as
ciphertext, using an algorithm and an encryption key.
3
Encryption (Cont..)
• If data falls into an unauthorized party’s hands, it
cannot be read without having the correct encryption
keys to decrypt the data.
4
Encryption (Cont..)
• Using an algorithm that is based on a mathematical
formula, encryption “scrambles” or encrypts an
organization’s data, making it unreadable.
5
Encryption (Cont..)
• When a user wants to unscramble the data, they then
use a designated encryption key to decrypt the
information.
6
Encryption (Cont..)
• To give you an idea of just how complex and
advanced encryption algorithms are, it would take a
normal computer around 300 trillion years to break
an RSA-2048 bit encryption key , using what’s called
a brute force attack.
7
Encryption (Cont..)
• Encryption is the science of encrypting and
decrypting data to prevent unauthorized access.
8
Encryption (Cont..)
• Encryption is the process of making the plaintext
unreadable to any third party, which generates the
ciphertext.
9
Encryption (Cont..)
There are two types of encryption in cryptography:
• Symmetric Encryption
• Asymmetric Encryption
10
Symmetric Encryption
• Symmetric Encryption algorithm relies on a single
key for encryption and decryption of information.
11
Symmetric Encryption (Cont..)
12
Symmetric Encryption (Cont..)
• The key which is being used for encrypting the
original message is decrypting the ciphertext.
13
Symmetric Encryption (Cont..)
14
Symmetric Encryption (Cont..)
• Step 1: Paul and Jane decide on a common key to be
used
15
Symmetric Encryption (Cont..)
• Step 4: Paul sends the encrypted message to Jane
16
Symmetric Encryption (Cont..)
• Symmetric encryption is essential for many day-to-
day activities on the internet, ranging from safe
online browsing to banking applications.
17
Symmetric Encryption (Cont..)
18
Symmetric Encryption (Cont..)
Payment Applications:
• Many online banking and payment applications
require the verification of personally identifiable
information before proceeding with their transactions.
19
Symmetric Encryption (Cont..)
Securing Data at Rest:
• When a website or organization stores personal
information regarding their users or the company
itself, it is protected using Symmetric encryption.
20
Symmetric Encryption (Cont..)
SSL/TLS Handshake:
• Symmetric encryption plays a significant role in
verifying website server authenticity, exchanging the
necessary encryption keys required, and generating a
session using those keys to ensure maximum security,
instead of the rather insecure HTTP website format.
21
Symmetric Encryption (Cont..)
• Symmetric Key Cryptography is also Called Private
Key Cryptography.
22
Symmetric Encryption (Cont..)
Two types of ciphers can be used in symmetric
algorithms. These two types are:
• Stream Ciphers
• Block Ciphers
23
Symmetric Encryption (Cont..)
Stream Ciphers:
• Stream ciphers are the algorithms that encrypt basic
information, one byte/bit at a time.
24
Symmetric Encryption (Cont..)
Stream Ciphers:
The process for encryption and decryption using stream
ciphers are as follows :
25
Symmetric Encryption (Cont..)
Stream Ciphers:
26
Symmetric Encryption (Cont..)
27
Symmetric Encryption (Cont..)
Stream Ciphers:
28
Symmetric Encryption (Cont..)
Block Ciphers:
• On the other hand, block ciphers dissect the raw
information into chunks of data of a fixed size.
29
Symmetric Encryption (Cont..)
Block Ciphers:
• A 128-bit block cipher will break the plaintext into
blocks of 128-bit each and encrypt those blocks
instead of a single digit.
30
Symmetric Encryption (Cont..)
Block Ciphers:
• These ciphers are slower but much more tamper-
proof and are used in some of the most common
algorithms being employed today.
31
Symmetric Encryption (Cont..)
32
Symmetric Encryption (Cont..)
33
Symmetric Encryption (Cont..)
• Today, the most popular symmetric-key algorithms
like AES, DES, and 3DES are block cipher
methodology subsets.
34
Symmetric Encryption (Cont..)
Advantages of Using Symmetric Key Cryptography:
35
Questions
Any Question Please?
36
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown
37
Thanks
38