4. SYMMETRIC ENCRYPTION
• ONE KEY TO BE USED BY BOTH SIDES FOR THE ENCRYPTION AND THE
DECRYPTION.
• THE KEY SHOULD BE COMMUNICATED TO BOTH SIDES BEFORE STARTING THE
COMMUNICATION.
• PACKETS CAN BE DECRYPTED BY ANY THIRD-PARTY WHO HAS THE KEY.
6. ASYMMETRIC ENCRYPTION
1. KEYS GENERATION (PRIVATE AND PUBLIC).
2. PUBLIC KEYS COMMUNICATION.
3. START THE COMMUNICATION (ENCRYPTION AND DECRYPTION)
7. ASYMMETRIC ENCRYPTION
• EACH TERMINAL GENERATES HIS OWN TWO KEYS (PRIVATE AND PUBLIC)
• EACH TERMINAL SHARES HIS PUBLIC KEY WITH THE OTHER TERMINAL.
• PRIVATE KEYS ARE USED TO DECRYPT THE MESSAGES SENT TO ME.
• USE THE RECEIVER’S PUBLIC KEY TO ENCRYPT/SEND HIM A PACKAGE.
• NO WAY TO GET THE PRIVATE KEY FROM THE PUBLIC KEY
9. ASYMMETRIC ENCRYPTION
Private A Private B
Public B Public A
Terminal A Terminal B
EncryptionEncryption
Decryption
TEXT A
TEXT A
Decryption
TEXT B
TEXT B
11. ENCODING VS ENCRYPTION VS HASHING
• ENCODING: REVERSIBLE AND MAINLY FOR ERROR CORRECTION.
• ENCRYPTION: REVERSIBLE AND MAINLY USED FOR DATA PROTECTION.
• HASHING: IRREVERSIBLE AND MAINLY USED FOR DATA VERIFICATION.
12. PLEASE HIT A LIKE, SUBSCRIBE AND
SHARE!
THANK YOU
MEDHAT HUSSAIN