2
Most read
3
Most read
5
Most read
Confidentiality Using Symmetric
Encryption
Er.Jay Nagar(Cyber Security Researcher)
www.jaynagarblog.wordpress.com 1
Potential locations for confidentiality
attacks
• Why needed?
– Two things we have to decide
• What to encrypt and where the encryption function
should be located.
• Two major approaches to encryption
placement :
• Link
• End to End
Confidentiality Using Symmetric Encryption 2www.jaynagarblog.wordpress.com
Link Encryption
• Both sides have encrypted device.
• So all traffic over communication links is secured.
• Disadvantage:
• Each time msg. should be decrypted…
• If working with public n/w , the user has no control
over the security of the nodes..
Confidentiality Using Symmetric Encryption 3www.jaynagarblog.wordpress.com
End-to-End Encryption
• Both sides carried out encryption process
• But encryption takes place over header and user data.
• Both shares same key
• advantage:
• User data will be secure…
• It does provide a degree of authentication..
Confidentiality Using Symmetric Encryption 4www.jaynagarblog.wordpress.com
Traffic Confidentiality
• Possible way of security attack
• Knowledge of nodes.
• Useful in military conflict, commercial applications, etc.
• Information we can get:
• Identities of partners
• How they are communicating
• Msg. pattern, msg. length , or quantity of messages that
suggest important info is being exchanged.
Confidentiality Using Symmetric Encryption 5
www.jaynagarblog.wordpress.com

More Related Content

PDF
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
PPTX
Secret key cryptography
PPTX
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
PPTX
blockchain .technology.pptx
PDF
Bitcoin Addresses
PPTX
Future of Blockchain
PPTX
Blockchain in banking
PDF
Overview Of Blockchain Technology And Architecture Powerpoint Presentation Sl...
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Secret key cryptography
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
blockchain .technology.pptx
Bitcoin Addresses
Future of Blockchain
Blockchain in banking
Overview Of Blockchain Technology And Architecture Powerpoint Presentation Sl...

What's hot (20)

PPT
Encryption And Decryption
 
PPTX
Block chain technology and its applications
PPTX
Blockchain
PPTX
Blockchain in E-Commerce
PPT
Digital signature
PPTX
BCT.pptx
PDF
Blockchain PowerPoint Presentation Slides
PPTX
Cryptographic tools
 
PDF
Blockchain Security Issues and Challenges
PDF
Distributed Ledger Technology PowerPoint Presentation Slides
PPTX
RSA ALGORITHM
PPTX
BLOCKCHAIN
PPTX
Blockchain ppt
PPTX
Bitcoin
KEY
Introduction to bitcoin
PPTX
Cryptocurrency
PPTX
Bitcoin - Introduction to Virtual Currency / Cryptocurrency
PPTX
PDF
An Introduction to Blockchain Technology
Encryption And Decryption
 
Block chain technology and its applications
Blockchain
Blockchain in E-Commerce
Digital signature
BCT.pptx
Blockchain PowerPoint Presentation Slides
Cryptographic tools
 
Blockchain Security Issues and Challenges
Distributed Ledger Technology PowerPoint Presentation Slides
RSA ALGORITHM
BLOCKCHAIN
Blockchain ppt
Bitcoin
Introduction to bitcoin
Cryptocurrency
Bitcoin - Introduction to Virtual Currency / Cryptocurrency
An Introduction to Blockchain Technology
Ad

Similar to Confidentiality using Symmetric Encryption (20)

PDF
What is the Enigma cryptonetwork?
ODP
CISSP Week 16
PPTX
Confidentiality using symmetric encryption.pptx
PPTX
Networking Security in data communication.pptx
PPTX
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
PPTX
Cryptography
PPTX
Slidecast - Workshop
PPTX
lecture 7.pptx
PPTX
Encryption techniques
PPTX
Lec # 7 Symmetric and asymmetric cryptography.pptx
PPTX
PPTX
Upload a presentation to download PROBLEM SOLVING LDK.pptx
PPT
Cryptography ppt
PPTX
Cryptography and network security
PPTX
Cryptography and network security
PPT
PDF
Cryptology - The practice and study of hiding information
PDF
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
PPTX
Fundamental Concept of Cryptography in Computer Security
What is the Enigma cryptonetwork?
CISSP Week 16
Confidentiality using symmetric encryption.pptx
Networking Security in data communication.pptx
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
Cryptography
Slidecast - Workshop
lecture 7.pptx
Encryption techniques
Lec # 7 Symmetric and asymmetric cryptography.pptx
Upload a presentation to download PROBLEM SOLVING LDK.pptx
Cryptography ppt
Cryptography and network security
Cryptography and network security
Cryptology - The practice and study of hiding information
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
Fundamental Concept of Cryptography in Computer Security
Ad

More from Jay Nagar (20)

PPTX
11 best tips to grow your influence youtube
PPTX
Impact of micro vs macro influencers in 2022
PPTX
What is Signature marketing
PDF
100+ Guest blogging sites list
PPTX
Ethical Hacking and Defense Penetration
PDF
Cyber Security and Cyber Awareness Tips manual 2020
PPTX
On-Page SEO Techniques By Digitech Jay
PPTX
Artificial Intelligence
PPT
Cyber Security and Cyber Awareness
PDF
Cyber security and Privacy Awareness manual
PDF
Dynamic programming
PPTX
Bluethooth Protocol stack/layers
PPTX
GPRS(General Packet Radio Service)
PPTX
Communication and Networking
PPTX
MOBILE COMPUTING and WIRELESS COMMUNICATION
PPT
Global system for mobile communication(GSM)
PPTX
Python for beginners
DOCX
Earn Money from bug bounty
PPTX
Code smell & refactoring
PPT
The Diffie-Hellman Algorithm
11 best tips to grow your influence youtube
Impact of micro vs macro influencers in 2022
What is Signature marketing
100+ Guest blogging sites list
Ethical Hacking and Defense Penetration
Cyber Security and Cyber Awareness Tips manual 2020
On-Page SEO Techniques By Digitech Jay
Artificial Intelligence
Cyber Security and Cyber Awareness
Cyber security and Privacy Awareness manual
Dynamic programming
Bluethooth Protocol stack/layers
GPRS(General Packet Radio Service)
Communication and Networking
MOBILE COMPUTING and WIRELESS COMMUNICATION
Global system for mobile communication(GSM)
Python for beginners
Earn Money from bug bounty
Code smell & refactoring
The Diffie-Hellman Algorithm

Recently uploaded (20)

PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
PDF
The TKT Course. Modules 1, 2, 3.for self study
PPTX
Macbeth play - analysis .pptx english lit
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
M.Tech in Aerospace Engineering | BIT Mesra
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
Reproductive system-Human anatomy and physiology
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
Disorder of Endocrine system (1).pdfyyhyyyy
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
The TKT Course. Modules 1, 2, 3.for self study
Macbeth play - analysis .pptx english lit
Literature_Review_methods_ BRACU_MKT426 course material
M.Tech in Aerospace Engineering | BIT Mesra
Cambridge-Practice-Tests-for-IELTS-12.docx
0520_Scheme_of_Work_(for_examination_from_2021).pdf
faiz-khans about Radiotherapy Physics-02.pdf
semiconductor packaging in vlsi design fab
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Reproductive system-Human anatomy and physiology
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf

Confidentiality using Symmetric Encryption

  • 1. Confidentiality Using Symmetric Encryption Er.Jay Nagar(Cyber Security Researcher) www.jaynagarblog.wordpress.com 1
  • 2. Potential locations for confidentiality attacks • Why needed? – Two things we have to decide • What to encrypt and where the encryption function should be located. • Two major approaches to encryption placement : • Link • End to End Confidentiality Using Symmetric Encryption 2www.jaynagarblog.wordpress.com
  • 3. Link Encryption • Both sides have encrypted device. • So all traffic over communication links is secured. • Disadvantage: • Each time msg. should be decrypted… • If working with public n/w , the user has no control over the security of the nodes.. Confidentiality Using Symmetric Encryption 3www.jaynagarblog.wordpress.com
  • 4. End-to-End Encryption • Both sides carried out encryption process • But encryption takes place over header and user data. • Both shares same key • advantage: • User data will be secure… • It does provide a degree of authentication.. Confidentiality Using Symmetric Encryption 4www.jaynagarblog.wordpress.com
  • 5. Traffic Confidentiality • Possible way of security attack • Knowledge of nodes. • Useful in military conflict, commercial applications, etc. • Information we can get: • Identities of partners • How they are communicating • Msg. pattern, msg. length , or quantity of messages that suggest important info is being exchanged. Confidentiality Using Symmetric Encryption 5 www.jaynagarblog.wordpress.com