Professional Documents
Culture Documents
to Symmetric
Encryption
Prepared by:
Engr. Virgilio A.
Zacarias, Jr
• Cryptography is the
science of encrypting and
decrypting data to prevent
unauthorized access.
Encryption is the process
of making the plaintext
unreadable to any third
party, which generates the
ciphertext. Decryption is
the process of reversing
the encrypted text to its
original readable format,
i.e., plaintext.
What is Cryptography?
There are two types of encryption in
cryptography:
1.Symmetric Encryption
2.Asymmetric Encryption
What is Symmetric
message is decrypting the
ciphertext. The key must be
Encryption?
kept private and be known only
to the sender and the receiver.
• To sum it up, the entire process will be as shown
For example, if Paul wants to send a simple message
below:
to Jane, they need to have a single encryption key
that both of them must keep secret to prevent
Step 1: Paul and Jane decide on a common key to
snooping by malicious actors. If the message “I am
be used
ready” is converted to ciphertext using a specific
substitution cipher by Paul, Jane must be aware of the
Step 2: Paul sends the secret encryption key to
substitution shift to decrypt the ciphertext once it
Jane or vice versa
reaches her.
Step 3: Paul uses the private key to encrypt the
original message
• Symmetric encryption is
essential for many day-to-day
activities on the internet,
ranging from safe online
browsing to banking
applications. Some of these
applications are as follows-
• Payment Applications:
Many online banking and payment applications require the verification of personally identifiable
information before proceeding with their transactions. It helps in predicting the correct information to
prevent fraudulent activities and cybercrime.
When a website or organization stores personal information regarding their users or the company itself,
it is protected using Symmetric encryption. This is done to prevent all kinds of snooping from either
outside hackers or disgruntled employees inside the office, looking to steal crucial information.
• SSL/TLS Handshake:
• Provided you manage to keep the keys secret, you still have to choose what kind of ciphers you want
to use to encrypt the information. In symmetric-key cryptography, there are broadly two categories of
ciphers that you can employ.
What Are the Types of Ciphers Being
Used?
Two types of ciphers can be used in symmetric algorithms. These two types are:
• Stream Ciphers
• Block Ciphers
1. Stream Ciphers
• Better Performance: Symmetric Encryption has been found to have a higher performance metric when
compared to asymmetric encryption. Fewer calculations help in the better memory management of the
host.
• Better Optimization: Bulk amounts of data that need to be encrypted are very well suited for symmetric
algorithms. Since they are much quicker, handling large amounts of data is simple and easy to use in
servers and data farms.
• Easy Implementation: With only a single key needed for both encryption and decryption of data, setting
up symmetric infrastructure for an organization is relatively easy compared to asymmetric encryption.