Professional Documents
Culture Documents
Key A Key B
• Algorithms in which the key for encryption and decryption are the
same are Symmetric.
Example: Caesar Cipher
• Caesar Cipher is a method in which each letter in the alphabet is
rotated by three letters as shown
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Example: Caesar Cipher
Encryption
Plain Text Cipher Text
Cipher:
Message: Caesar Cipher Message:
Attack at Dawn Algorithm Dwwdfn Dw Gdyq
Key (3)
Decrypti
on
Cipher Text
Cipher:
Plain Text
Key (3)
• Secret Key Cryptography (symmetric)
Public Key is known to all authorized users, but the private key is known to one person
its owner. Uses RSA ( Rivest, Shamir & Adelman algorithm)
Sender Receiver
Sender Receiver
Public Key Encryption
• Advantages :
1. there is no need to agree on a common key
for both the sender and the receiver.
2. public-key systems can guarantee integrity
and authentication, not only privacy.
• Disadvantage:
1. not as fast as symmetric algorithms.