SlideShare a Scribd company logo
1 of 18
Secret Key
Cryptography
Contents
Introduction
What is Secret Key
Cryptography ?
Examples of Secret
Key Cryptography.
Uses of Secret Key
Cryptography.
Difference
Between Private
Key and Public Key.
Secret Key
Cryptographic
Algorithms.
Advanced
Encryption
Standard (AES)
Triple Data
Encryption
Standard (3DES)
Rivest Cipher 4
(RC4)
Advantages of
Secret Key
Cryptography.
Disadvantages of
Secret Key
Cryptography.
Introduction
Secret key cryptography is effective for communication over insecure
channels as the piece of information or parameter used helps the information
to encrypt and decrypt messages.
There are two different keys used for asymmetric encryption in which one is a
public key, the other is a secret key.
A secret key may also be known as a private key.
What is Secret Key Cryptography ?
THE SECRET KEY CRYPTOGRAPHY IS USED TO ENCRYPT
THE PLAINTEXT MESSAGE USING A SERIES OF BITS
CALLED THE SECRET KEY.
IT OFTEN USES THE SAME KEY TO DECIPHER THE
CORRESPONDING CIPHERTEXT MESSAGE AND TO
RETRIEVE THE INITIAL PLAIN TEXT BECAUSE BOTH
ENCRYPTING AND DECRYPTING DATA IS ACHIEVED
WITH THE SAME KEY, A SECRET KEY IS OFTEN CALLED
AS A SYMMETRIC KEY.
THE SECRET KEY IN CRYPTOGRAPHY IS ALSO AN INPUT
FOR ENCRYPTION ALGORITHM AS THIS IS THE INITIAL
INTELLIGIBLE MESSAGE OR DATA THAT IS FED INTO
THE ALGORITHM AS INPUT.
What is Secret Key Cryptography ? ( cntd.)
The main is an algorithm value
independent from the plaintext.
Depending on the particular key
used the algorithm outputs a
different result. The algorithm
relies on the key to exact
substitution and transformation.
This is the scrambled message that
has been generated as production.
It depends on the plain text and on
the secret key.
Two different keys can generate
two different ciphertexts for a given
letter.
What is Secret Key Cryptography ? ( cntd.)
The ciphertext is an almost random stream of data which as it stands.
Decryption algorithm is basically a reverse-run encryption algorithm.
It takes the ciphertext and the secret key, and it generates the original plain text. In this type of
cryptography, both the sender and the receiver must know the key, that it is in effect, the
password.
The main distribution, of course, is the greatest challenge with this method.
Example of Secret Key Cryptography
A very basic method for encrypting messages is to replace each letter of the message
with one that is several more places in the alphabet. The secret is the number of places.
For eg, the message “This is an example” can be encrypted using the key “1
position” in the encrypted message “Uijt jt bo fybnqmf”
Taking a letter that is 1 position above in the alphabet would end in the original
message again.
This device is not very stable. Just twenty-six keys are possible.
Example of Secret Key Cryptography ( cntd.)
One should only try all the keys and
see which one can result in a
readable message.
In addition, it is well known that
certain letters appear more often in
communications than others.
For example, the letter “e” is the
most used letter in the English
language.
Using this reality, simply count the
letter appears most frequently in
the encrypted message and
substitute it with the letter “e”.
Then we knows how many places
we needs to rotate to get from “e”
to the encrypted version of “e”.
Uses of Secret Key Cryptography
With secret key encryption, both
Alice and Bob communicators use
the same key to encrypt and
decode texts.
Before any encrypted data may
be transmitted across the
network, both Alice and Bob must
have the key and agree on the
cryptographic protocol to be used
for encryption and decryption.
One of the big issues with secret
key cryptography is the logistical
dilemma of how to get the key
from one party to the other
without giving access to the
attacker.
If Alice and Bob protect their data
with secret-key cryptography, and
if Charlie has access to their key,
Charlie will understand any secret
messages that Alice and Bob
intercept.
Use of Secret Key Cryptography ( cntd.)
Not only can Charlie decode
the messages of Alice and
Bob, but he can also believe
that he is Alice and send
encrypted data to Bob.
Bob is not going to realize
that the letter came from
Charlie, not Alice.
When the issue of secret key
dissemination is overcome,
secret key cryptography may
be a powerful method.
Algorithms provide excellent
protection and encrypt data
reasonably easily.
Use of Secret
Key
Cryptography (
cntd.)
• The bulk of confidential data transmitted during an SSL session is sent using
secret-key cryptography.
• Secret key cryptography is often called symmetric cryptography since the
same key is used to encrypt and decrypt data.
• Well-known hidden key cryptographic algorithms include Data Encryption
Standard (DES), triple-strong DES (3DES), Rivest Cipher 2 (RC2), and Rivest
Cipher 4 (RC4).
Difference between Private Key and Public Key
Public Key Private Key
Theirs is no possibility of loss since one
the requirement is a public key
Once Lost , the file will become unusable
One Key is publicly available The Key is kept secret by two people
It is commonly used to secure web
sessions
It is commonly used to protect disk
drives and other data storage devices.
It is a form of asymmetrical encryption. It is a form of symmetrical encryption.
It is slower since two keys are required It is faster since only one key is needed
Secret Key
Algorithms
ADVANCED ENCRYPTION
STANDARD (AES)
TRIPLE DATA ENCRYPTION
STANDARD (3DES)
RIVEST CIPHER 4 (RC4)
Advanced Encryption Standard (AES)
The AES Encryption algorithm (also known as the
Rijndael algorithm) is a symmetric block cipher
algorithm with a block/chunk size of 128 bits.
It converts these individual blocks using keys of
128, 192, and 256 bits.
Once it encrypts these blocks, it joins them
together to form the ciphertext
Triple Data Encryption Standard (3DES)
3DES Encryption, also known as
Triple Data Encryption Standard
(DES), is a type of cryptography
where block cipher algorithms
are applied three times to each
data block.
The key size is increased in
Triple-DES to ensure additional
security through encryption
capabilities.
Each block contains 64 bits of
data
Rivest Cipher
4 (RC4)
RC4 STANDS FOR RIVEST CIPHER 4. RC4 IS A STREAM CIPHER AND WAS
INVENTED BY RON RIVEST IN 1987.
SINCE RC4 IS A STREAM CIPHER, IT
ENCRYPTS THE STREAM OF DATA BYTE BY
BYTE.
OF ALL THE STREAM CIPHERS, RC4 IS THE
WIDELY USED STREAM CIPHER DUE TO ITS
SPEED OF OPERATIONS AND SIMPLICITY.
Advantages of
Secret Key
Cryptography
High rates of data throughput, with
hardware solutions up to hundreds
of megabytes per second .
Key length is relatively short.
Symmetric – Key ciphers can also
be combined to produce stronger
ciphers.
Disadvantages
of Secret Key
Cryptography
The Key must remain secret
at both ends.
Cryptographic practice leads
to frequent key change.
In large networks, many key
pairs have to be managed.

More Related Content

Similar to Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 

Similar to Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx (20)

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Cryptography
CryptographyCryptography
Cryptography
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Day5
Day5Day5
Day5
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Encryption
EncryptionEncryption
Encryption
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...manju garg
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 

Recently uploaded (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 

Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx

  • 2. Contents Introduction What is Secret Key Cryptography ? Examples of Secret Key Cryptography. Uses of Secret Key Cryptography. Difference Between Private Key and Public Key. Secret Key Cryptographic Algorithms. Advanced Encryption Standard (AES) Triple Data Encryption Standard (3DES) Rivest Cipher 4 (RC4) Advantages of Secret Key Cryptography. Disadvantages of Secret Key Cryptography.
  • 3. Introduction Secret key cryptography is effective for communication over insecure channels as the piece of information or parameter used helps the information to encrypt and decrypt messages. There are two different keys used for asymmetric encryption in which one is a public key, the other is a secret key. A secret key may also be known as a private key.
  • 4. What is Secret Key Cryptography ? THE SECRET KEY CRYPTOGRAPHY IS USED TO ENCRYPT THE PLAINTEXT MESSAGE USING A SERIES OF BITS CALLED THE SECRET KEY. IT OFTEN USES THE SAME KEY TO DECIPHER THE CORRESPONDING CIPHERTEXT MESSAGE AND TO RETRIEVE THE INITIAL PLAIN TEXT BECAUSE BOTH ENCRYPTING AND DECRYPTING DATA IS ACHIEVED WITH THE SAME KEY, A SECRET KEY IS OFTEN CALLED AS A SYMMETRIC KEY. THE SECRET KEY IN CRYPTOGRAPHY IS ALSO AN INPUT FOR ENCRYPTION ALGORITHM AS THIS IS THE INITIAL INTELLIGIBLE MESSAGE OR DATA THAT IS FED INTO THE ALGORITHM AS INPUT.
  • 5. What is Secret Key Cryptography ? ( cntd.) The main is an algorithm value independent from the plaintext. Depending on the particular key used the algorithm outputs a different result. The algorithm relies on the key to exact substitution and transformation. This is the scrambled message that has been generated as production. It depends on the plain text and on the secret key. Two different keys can generate two different ciphertexts for a given letter.
  • 6. What is Secret Key Cryptography ? ( cntd.) The ciphertext is an almost random stream of data which as it stands. Decryption algorithm is basically a reverse-run encryption algorithm. It takes the ciphertext and the secret key, and it generates the original plain text. In this type of cryptography, both the sender and the receiver must know the key, that it is in effect, the password. The main distribution, of course, is the greatest challenge with this method.
  • 7. Example of Secret Key Cryptography A very basic method for encrypting messages is to replace each letter of the message with one that is several more places in the alphabet. The secret is the number of places. For eg, the message “This is an example” can be encrypted using the key “1 position” in the encrypted message “Uijt jt bo fybnqmf” Taking a letter that is 1 position above in the alphabet would end in the original message again. This device is not very stable. Just twenty-six keys are possible.
  • 8. Example of Secret Key Cryptography ( cntd.) One should only try all the keys and see which one can result in a readable message. In addition, it is well known that certain letters appear more often in communications than others. For example, the letter “e” is the most used letter in the English language. Using this reality, simply count the letter appears most frequently in the encrypted message and substitute it with the letter “e”. Then we knows how many places we needs to rotate to get from “e” to the encrypted version of “e”.
  • 9. Uses of Secret Key Cryptography With secret key encryption, both Alice and Bob communicators use the same key to encrypt and decode texts. Before any encrypted data may be transmitted across the network, both Alice and Bob must have the key and agree on the cryptographic protocol to be used for encryption and decryption. One of the big issues with secret key cryptography is the logistical dilemma of how to get the key from one party to the other without giving access to the attacker. If Alice and Bob protect their data with secret-key cryptography, and if Charlie has access to their key, Charlie will understand any secret messages that Alice and Bob intercept.
  • 10. Use of Secret Key Cryptography ( cntd.) Not only can Charlie decode the messages of Alice and Bob, but he can also believe that he is Alice and send encrypted data to Bob. Bob is not going to realize that the letter came from Charlie, not Alice. When the issue of secret key dissemination is overcome, secret key cryptography may be a powerful method. Algorithms provide excellent protection and encrypt data reasonably easily.
  • 11. Use of Secret Key Cryptography ( cntd.) • The bulk of confidential data transmitted during an SSL session is sent using secret-key cryptography. • Secret key cryptography is often called symmetric cryptography since the same key is used to encrypt and decrypt data. • Well-known hidden key cryptographic algorithms include Data Encryption Standard (DES), triple-strong DES (3DES), Rivest Cipher 2 (RC2), and Rivest Cipher 4 (RC4).
  • 12. Difference between Private Key and Public Key Public Key Private Key Theirs is no possibility of loss since one the requirement is a public key Once Lost , the file will become unusable One Key is publicly available The Key is kept secret by two people It is commonly used to secure web sessions It is commonly used to protect disk drives and other data storage devices. It is a form of asymmetrical encryption. It is a form of symmetrical encryption. It is slower since two keys are required It is faster since only one key is needed
  • 13. Secret Key Algorithms ADVANCED ENCRYPTION STANDARD (AES) TRIPLE DATA ENCRYPTION STANDARD (3DES) RIVEST CIPHER 4 (RC4)
  • 14. Advanced Encryption Standard (AES) The AES Encryption algorithm (also known as the Rijndael algorithm) is a symmetric block cipher algorithm with a block/chunk size of 128 bits. It converts these individual blocks using keys of 128, 192, and 256 bits. Once it encrypts these blocks, it joins them together to form the ciphertext
  • 15. Triple Data Encryption Standard (3DES) 3DES Encryption, also known as Triple Data Encryption Standard (DES), is a type of cryptography where block cipher algorithms are applied three times to each data block. The key size is increased in Triple-DES to ensure additional security through encryption capabilities. Each block contains 64 bits of data
  • 16. Rivest Cipher 4 (RC4) RC4 STANDS FOR RIVEST CIPHER 4. RC4 IS A STREAM CIPHER AND WAS INVENTED BY RON RIVEST IN 1987. SINCE RC4 IS A STREAM CIPHER, IT ENCRYPTS THE STREAM OF DATA BYTE BY BYTE. OF ALL THE STREAM CIPHERS, RC4 IS THE WIDELY USED STREAM CIPHER DUE TO ITS SPEED OF OPERATIONS AND SIMPLICITY.
  • 17. Advantages of Secret Key Cryptography High rates of data throughput, with hardware solutions up to hundreds of megabytes per second . Key length is relatively short. Symmetric – Key ciphers can also be combined to produce stronger ciphers.
  • 18. Disadvantages of Secret Key Cryptography The Key must remain secret at both ends. Cryptographic practice leads to frequent key change. In large networks, many key pairs have to be managed.