0% found this document useful (0 votes)
272 views10 pages

Understanding Conventional Encryption

Conventional encryption uses the same key for both encryption and decryption, making it simple and fast, but less secure and scalable compared to public-key encryption. Public key encryption, on the other hand, employs a pair of keys (public and private) for secure communication, allowing for easier key distribution and digital signatures, but is vulnerable to certain attacks. Both systems have their advantages and disadvantages, with conventional encryption being resource-efficient and public key encryption offering better security features.

Uploaded by

lakshithask.2212
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
272 views10 pages

Understanding Conventional Encryption

Conventional encryption uses the same key for both encryption and decryption, making it simple and fast, but less secure and scalable compared to public-key encryption. Public key encryption, on the other hand, employs a pair of keys (public and private) for secure communication, allowing for easier key distribution and digital signatures, but is vulnerable to certain attacks. Both systems have their advantages and disadvantages, with conventional encryption being resource-efficient and public key encryption offering better security features.

Uploaded by

lakshithask.2212
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

CONVENTIONA

L ENCRYPTION
 Conventional encryption is a cryptographic system that uses the same key
used by the sender to encrypt the message and by the receiver to decrypt the
message. It was the only type of encryption in use prior to the development of
public-key encryption.
 It is still much preferred of the two types of encryption systems due to its
simplicity. It is a relatively fast process since it uses a single key for both
encryption and decryption In this encryption model, the sender encrypts
plaintext using the receiver’s secret key, which can be later used by the receiver
to decrypt the ciphertext. Below is a figure that illustrates this concept.

Conventional Encryption
Conventional encryption has mainly 5 ingredients :

[Link] text –
It is the original data that is given to the algorithm as an input.

[Link] algorithm –
This encryption algorithm performs various transformations on plain text to convert it into
ciphertext.

[Link] key –
The secret key is also an input to the algorithm. The encryption algorithm will produce
different outputs based on the keys used at that time.

[Link] text –
It contains encrypted information because it contains a form of original plaintext that is
unreadable by a human or computer without proper cipher to decrypt it. It is output from
the algorithm.

[Link] algorithm –
This is used to run encryption algorithms in reverse. Ciphertext and Secret key is input here
and it produces plain text as output.
Requirements for secure use of conventional encryption :
[Link] need a strong encryption algorithm.
[Link] sender and Receiver must have obtained copies of the secret key in a secure fashion
and must keep the key secure.

Advantages of Conventional Encryption :


[Link] –
This type of encryption is easy to carry out.
Uses fewer computer resources –
Conventional encryption does not require a lot of computer resources when compared to
public-key encryption.
Fast –
Conventional encryption is much faster than asymmetric key encryption.

Disadvantages of Conventional Encryption Model:


[Link] and authenticity of the message cannot be guaranteed, since both sender and
receiver use the same key, messages cannot be verified to have come from a particular
user.
[Link] isn’t much secured when compared to public-key encryption.
[Link] the receiver lost the key, he/she cant decrypt the message and thus making the whole
process useless.
[Link] scheme does not scale well to a large number of users because both the sender and
the receiver have to agree on a secret key before transmission.
PUBLIC KEY
ENCRYPTION
Public Key Encryption : Asymmetric is a form of Cryptosystem in which encryption and
decryption are performed using different keys-Public key (known to everyone) and Private key
(Secret key). This is known as Public Key Encryption.
Components of Public Key Encryption:

•Plain Text:
This is the message which is readable or understandable. This message is given to the
Encryption algorithm as an input.

•Cipher Text:
The cipher text is produced as an output of Encryption algorithm. We cannot simply understand
this message.

•Encryption Algorithm:
The encryption algorithm is used to convert plain text into cipher text.

•Decryption Algorithm:
It accepts the cipher text as input and the matching key (Private Key or Public key) and
produces the original plain text

•Public and Private Key:


One key either Private key (Secret key) or Public Key (known to everyone) is used for encryption
and other is used for decryption
Characteristics of Public Encryption key:

•Public key Encryption is important because it is infeasible to determine the decryption key
given only the knowledge of the cryptographic algorithm and encryption key.

•Either of the two keys (Public and Private key) can be used for encryption with other key
used for decryption.

•Due to Public key cryptosystem, public keys can be freely shared, allowing users an easy
and convenient method for encrypting content and verifying digital signatures, and private
keys can be kept secret, ensuring only the owners of the private keys can decrypt content
and create digital signatures.

•The most widely used public-key cryptosystem is RSA (Rivest–Shamir–Adleman). The


difficulty of finding the prime factors of a composite number is the backbone of RSA.
Weakness of the Public Key Encryption:

•Public key Encryption is vulnerable to Brute-force attack.

•This algorithm also fails when the user lost his private key, then the Public key
Encryption becomes the most vulnerable algorithm.

•Public Key Encryption also is weak towards man in the middle attack. In this attack a
third party can disrupt the public key communication and then modify the public
keys.

•If user private key used for certificate creation higher in the PKI(Public Key
Infrastructure) server hierarchy is compromised, or accidentally disclosed, then a
“man-in-the-middle attack” is also possible, making any subordinate certificate
wholly insecure. This is also the weakness of public key Encryption.
Applications of the Public Key Encryption:

•Encryption/Decryption:
Confidentiality can be achieved using Public Key Encryption. In this the Plain text is encrypted
using receiver public key. This will ensure that no one other than receiver private key can
decrypt the cipher text.
•Digital signature:

Digital signature is for senders authentication purpose. In this sender encrypt the plain text
using his own private key. This step will make sure the authentication of the sender because
receiver can decrypt the cipher text using senders public key only.
•Key exchange:

This algorithm can use in both Key-management and securely transmission of data.

You might also like