ENCRYPTION
MEDHAT HUSSAIN
AGENDA
• UNENCRYPTED COMMUNICATION
• ENCRYPTED COMMUNICATION
• SYMMETRIC ENCRYPTION
• ASYMMETRIC ENCRYPTION
• ENCODING VS ENCRYPTION VS HASHING
UNENCRYPTED COMMUNICATION
SYMMETRIC ENCRYPTION
• ONE KEY TO BE USED BY BOTH SIDES FOR THE ENCRYPTION AND THE
DECRYPTION.
• THE KEY SHOULD BE COMMUNICATED TO BOTH SIDES BEFORE STARTING THE
COMMUNICATION.
• PACKETS CAN BE DECRYPTED BY ANY THIRD-PARTY WHO HAS THE KEY.
SYMMETRIC ENCRYPTION
ASYMMETRIC ENCRYPTION
1. KEYS GENERATION (PRIVATE AND PUBLIC).
2. PUBLIC KEYS COMMUNICATION.
3. START THE COMMUNICATION (ENCRYPTION AND DECRYPTION)
ASYMMETRIC ENCRYPTION
• EACH TERMINAL GENERATES HIS OWN TWO KEYS (PRIVATE AND PUBLIC)
• EACH TERMINAL SHARES HIS PUBLIC KEY WITH THE OTHER TERMINAL.
• PRIVATE KEYS ARE USED TO DECRYPT THE MESSAGES SENT TO ME.
• USE THE RECEIVER’S PUBLIC KEY TO ENCRYPT/SEND HIM A PACKAGE.
• NO WAY TO GET THE PRIVATE KEY FROM THE PUBLIC KEY
ASYMMETRIC ENCRYPTION
Private
Public
Private
Public
Public Public
Terminal A Terminal B
ASYMMETRIC ENCRYPTION
Private A Private B
Public B Public A
Terminal A Terminal B
EncryptionEncryption
Decryption
TEXT A
TEXT A
Decryption
TEXT B
TEXT B
ASYMMETRIC ENCRYPTION
ENCODING VS ENCRYPTION VS HASHING
• ENCODING: REVERSIBLE AND MAINLY FOR ERROR CORRECTION.
• ENCRYPTION: REVERSIBLE AND MAINLY USED FOR DATA PROTECTION.
• HASHING: IRREVERSIBLE AND MAINLY USED FOR DATA VERIFICATION.
PLEASE HIT A LIKE, SUBSCRIBE AND
SHARE!
THANK YOU 
MEDHAT HUSSAIN

Encrypted Communication (symmetric and asymmetric encryption)