Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
3 views

Lecture 10 Encryption

The document is a lecture on encryption, detailing its importance in protecting data by converting plaintext into ciphertext using algorithms and keys. It discusses symmetric encryption, which relies on a single key for both encryption and decryption, and highlights its applications in online banking and data security. Additionally, it covers the two types of ciphers used in symmetric algorithms: stream ciphers and block ciphers.

Uploaded by

Shahzaib Ahmad
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Lecture 10 Encryption

The document is a lecture on encryption, detailing its importance in protecting data by converting plaintext into ciphertext using algorithms and keys. It discusses symmetric encryption, which relies on a single key for both encryption and decryption, and highlights its applications in online banking and data security. Additionally, it covers the two types of ciphers used in symmetric algorithms: stream ciphers and block ciphers.

Uploaded by

Shahzaib Ahmad
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Cyber Security

Lecture # 10

Dr. Shafiq Hussain


Associate Professor & Chairperson
Department of Computer Science

1
Objectives
• Introduction to Encryption.

2
Encryption
• Encryption is the process of information protection
by transforming readable data, often referred to as
plaintext, into an unreadable format known as
ciphertext, using an algorithm and an encryption key.

3
Encryption (Cont..)
• If data falls into an unauthorized party’s hands, it
cannot be read without having the correct encryption
keys to decrypt the data.

4
Encryption (Cont..)
• Using an algorithm that is based on a mathematical
formula, encryption “scrambles” or encrypts an
organization’s data, making it unreadable.

5
Encryption (Cont..)
• When a user wants to unscramble the data, they then
use a designated encryption key to decrypt the
information.

• In its encrypted state, data is referred to as


“ciphertext” and in its readable form it’s called
“plaintext.”

6
Encryption (Cont..)
• To give you an idea of just how complex and
advanced encryption algorithms are, it would take a
normal computer around 300 trillion years to break
an RSA-2048 bit encryption key , using what’s called
a brute force attack.

7
Encryption (Cont..)
• Encryption is the science of encrypting and
decrypting data to prevent unauthorized access.

8
Encryption (Cont..)
• Encryption is the process of making the plaintext
unreadable to any third party, which generates the
ciphertext.

• Decryption is the process of reversing the encrypted


text to its original readable format, i.e., plaintext.

9
Encryption (Cont..)
There are two types of encryption in cryptography:

• Symmetric Encryption
• Asymmetric Encryption

10
Symmetric Encryption
• Symmetric Encryption algorithm relies on a single
key for encryption and decryption of information.

• Both the sender and receiver of the message need to


have a pre-shared secret key that they will use to
convert the plaintext into ciphertext and vice versa.

11
Symmetric Encryption (Cont..)

12
Symmetric Encryption (Cont..)
• The key which is being used for encrypting the
original message is decrypting the ciphertext.

• The key must be kept private and be known only to


the sender and the receiver.

13
Symmetric Encryption (Cont..)

14
Symmetric Encryption (Cont..)
• Step 1: Paul and Jane decide on a common key to be
used

• Step 2: Paul sends the secret encryption key to Jane


or vice versa

• Step 3: Paul uses the private key to encrypt the


original message

15
Symmetric Encryption (Cont..)
• Step 4: Paul sends the encrypted message to Jane

• Step 5: Jane uses the secret key to decrypt the


message that was already present with her

16
Symmetric Encryption (Cont..)
• Symmetric encryption is essential for many day-to-
day activities on the internet, ranging from safe
online browsing to banking applications.

17
Symmetric Encryption (Cont..)

18
Symmetric Encryption (Cont..)
Payment Applications:
• Many online banking and payment applications
require the verification of personally identifiable
information before proceeding with their transactions.

• It helps in predicting the correct information to


prevent fraudulent activities and cybercrime.

19
Symmetric Encryption (Cont..)
Securing Data at Rest:
• When a website or organization stores personal
information regarding their users or the company
itself, it is protected using Symmetric encryption.

• This is done to prevent all kinds of snooping from


either outside hackers or disgruntled employees
inside the office, looking to steal crucial information.

20
Symmetric Encryption (Cont..)
SSL/TLS Handshake:
• Symmetric encryption plays a significant role in
verifying website server authenticity, exchanging the
necessary encryption keys required, and generating a
session using those keys to ensure maximum security,
instead of the rather insecure HTTP website format.

21
Symmetric Encryption (Cont..)
• Symmetric Key Cryptography is also Called Private
Key Cryptography.

22
Symmetric Encryption (Cont..)
Two types of ciphers can be used in symmetric
algorithms. These two types are:

• Stream Ciphers
• Block Ciphers

23
Symmetric Encryption (Cont..)
Stream Ciphers:
• Stream ciphers are the algorithms that encrypt basic
information, one byte/bit at a time.

• You use a bitstream generation algorithm to create a


binary key and encrypt the plaintext.

24
Symmetric Encryption (Cont..)
Stream Ciphers:
The process for encryption and decryption using stream
ciphers are as follows :

• Get the plaintext to be encrypted.

• Create a binary key using the bitstream generation


algorithm.

25
Symmetric Encryption (Cont..)
Stream Ciphers:

• Perform XOR operation on the plaintext using the


generated binary key.

• The output becomes the ciphertext.

• Perform XOR operations on the ciphertext using the


same key to get back the plaintext.

26
Symmetric Encryption (Cont..)

27
Symmetric Encryption (Cont..)
Stream Ciphers:

• The most well-known stream ciphers are RC-4,


SALSA and PANAMA.

28
Symmetric Encryption (Cont..)
Block Ciphers:
• On the other hand, block ciphers dissect the raw
information into chunks of data of a fixed size.

• The size depends on the exact cipher being used.

29
Symmetric Encryption (Cont..)
Block Ciphers:
• A 128-bit block cipher will break the plaintext into
blocks of 128-bit each and encrypt those blocks
instead of a single digit.

30
Symmetric Encryption (Cont..)
Block Ciphers:
• These ciphers are slower but much more tamper-
proof and are used in some of the most common
algorithms being employed today.

31
Symmetric Encryption (Cont..)

32
Symmetric Encryption (Cont..)

33
Symmetric Encryption (Cont..)
• Today, the most popular symmetric-key algorithms
like AES, DES, and 3DES are block cipher
methodology subsets.

34
Symmetric Encryption (Cont..)
Advantages of Using Symmetric Key Cryptography:

35
Questions
Any Question Please?

You can contact me at: drshafiq@uosahiwal.edu.pk

Your Query will be answered within one working day.

36
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown

37
Thanks

38

You might also like