1 / 26

Asymmetric Key Cryptography | RSA Encryption Algorithm With Example | Network Se

In this presentation on Asymmetric Key Cryptography, we learn the ins & outs of asymmetric encryption and decryption. From learning the importance of asymmetric encryption, to it's applications, advantages and workflow, we cover all the bases and also take a look at why it's called public key cryptography. We learn about RSA Encryption which is a vital component of network security.<br><br>Learn more at: https://www.simplilearn.com/cyber-security-expert-master-program-training-course?utm_campaign=AsymmetricKeyCryptography&utm_medium=Description&utm_source=Slideshare<br>

Simplilearn
Télécharger la présentation

Asymmetric Key Cryptography | RSA Encryption Algorithm With Example | Network Se

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Let us look at a story… Meet Joe

  2. Joe wants to message Ryan and decides to use encryption in order to keep the messages private and secure. Joe Ryan

  3. Click here to watch the video

  4. He can send the encrypted message to Ryan, but has doubts over sending the decryption key in-case someone intercepts it. Encrypted Message Joe Ryan

  5. Anyone can read the message if they intercept the decryption key. Decryption Key Encrypted Message

  6. The decryption key along with the encrypted message will reveal all the contents and Ryan will lose his privacy. Encrypted Message Original Message Decryption Key

  7. If anyone intercepts the decryption key, the Ciphertext can easily be decoded. The Solution is Asymmetric Key Cryptography Encrypted Message Original Message Decryption Key

  8. What Are We Learning Today? What Is Asymmetric Key Cryptography? Applications of Asymmetric Key Cryptography Why Asymmetric Cryptography Is Called Public Key Cryptography? RSA Encryption Advantages Over Symmetric Cryptography

  9. What Is Asymmetric Key Cryptography?

  10. What Is Asymmetric Key Cryptography? Asymmetric Key Cryptography uses two different keys for encryption and decryption. The key used for encryption is the public key, and the key used for decryption is the private key. PUBLIC KEY PRIVATE KEY ENCRYPTION DECRYPTION ENCRYPTED DATA

  11. What Is Asymmetric Key Cryptography? For example, anyone who has your mailbox address can send you letters without any extra effort needed from your end. Random Person Personal Mailbox Random Person

  12. What Is Asymmetric Key Cryptography? However, nobody other than you can access the contents of the mailbox since only you have the key that can unlock it. Random Person Random Person Owner with the private key

  13. What Is Asymmetric Key Cryptography? Alice Bob “Call me today” “dh12#djdi2+rg” Using Bob’s Private key to decrypt Using Bob’s Public key to encrypt Call me today “dh12#djdi2+rg”

  14. Applications of Asymmetric Key Cryptography

  15. Applications of Asymmetric Key Cryptography Encrypted browsing sessions for better protection against hackers Digital Signatures to maintain authenticity of documents Sharing Keys for Symmetric Key Cryptography Managing Crypto-currency transactions securely

  16. Why Asymmetric Cryptography Is Called Public Key Cryptography?

  17. Why Asymmetric Cryptography Is Called Public Key Cryptography?

  18. Why Asymmetric Cryptography Is Called Public Key Cryptography? Encryption Key Publicly Available

  19. Why Asymmetric Cryptography Is Called Public Key Cryptography? Since the key needed to send a message is publicly available, Asymmetric Key Cryptography is also called Public Key Cryptography Encryption Key Decryption Key Publicly Available Privately Stored

  20. RSA Encryption

  21. RSA Encryption • Based on Asymmetric algorithm approach • Designed by Ron Rivest, Adi Shamir, Leonard Adleman • Most valuable when encrypting data in transit • Used with VPN services, email transfer, messaging applications etc.

  22. Advantages Over Symmetric Cryptography

  23. Advantages Over Symmetric Cryptography No need of sharing secret keys Proof of owner’s authenticity Longer Key lengths mean stronger encryption Data can’t be modified in transit

More Related