In this presentation on Asymmetric Key Cryptography, we learn the ins & outs of asymmetric encryption and decryption. From learning the importance of asymmetric encryption, to it's applications, advantages and workflow, we cover all the bases and also take a look at why it's called public key cryptography. We learn about RSA Encryption which is a vital component of network security.
The topics covered in this video on asymmetric key cryptography are:
1. What Is Asymmetric Key Cryptography?
2. Applications Asymmetric Key Cryptography?
3. Why Asymmetric Key Cryptography Is called Public-Key Cryptography?
4. RSA Encryption
5. Advantage over Symmetric Key Cryptography
Simplilearn Cyber Security Expert Master’s Program provides cyber security professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses, including CompTIA Security+, CEH, CISM, CISSP and CCSP. The program begins with introductory-level cybersecurity skills training, then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and many more. This training program will enable you to:
Implement technical strategies, tools, and techniques to secure data and information for your organization
1. Adhere to ethical security behaviour for risk analysis and mitigation
2. Understand security in cloud computing architecture in depth
3. Comprehend legal requirements, privacy issues and audit process methodologies within the cloud environment
4. Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework
At the end of this Cyber Security Master’s Program, you will be equipped with the following skillsets:
1. Install, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
2. Master advanced hacking concepts to manage information security efficiently
3. Design security architecture and framework for a secure IT operation
4. Frame cloud data storage architectures and security strategies, and utilize them to analyze risks
5. Protect data movement, perform disaster recovery, access CSP security and manage client databases
Learn more at: https://www.simplilearn.com/cyber-security-expert-master-program-training-course?utm_campaign=AsymmetricKeyCryptography&utm_medium=Description&utm_source=Slideshare
5. He can send the encrypted message to Ryan, but has doubts over
sending the decryption key in-case someone intercepts it.
Joe Ryan
Encrypted Message
6. Anyone can read the message if they intercept the decryption key.
Encrypted Message
Decryption Key
7. The decryption key along with the encrypted message will reveal all
the contents and Ryan will lose his privacy.
Encrypted Message Decryption Key Original Message
8. If anyone intercepts the decryption key, the Ciphertext can easily be
decoded.
Encrypted Message Decryption Key Original Message
The Solution is Asymmetric Key
Cryptography
9. What Are We Learning Today?
1. What Is Asymmetric Key Cryptography?
2. Applications of Asymmetric Key Cryptography
3. Why Asymmetric Cryptography Is Called Public Key
Cryptography?
4. RSA Encryption
5. Advantages Over Symmetric Cryptography
11. What Is Asymmetric Key Cryptography?
Asymmetric Key Cryptography uses two different keys for encryption and decryption. The key used for
encryption is the public key, and the key used for decryption is the private key.
ENCRYPTION DECRYPTION
PUBLIC KEY PRIVATE KEY
ENCRYPTED DATA
12. What Is Asymmetric Key Cryptography?
Random Person Random Person
Personal Mailbox
For example, anyone who has your mailbox address can send you letters
without any extra effort needed from your end.
13. What Is Asymmetric Key Cryptography?
Random Person Random Person
Owner with the private key
However, nobody other than you can access the contents of the mailbox since
only you have the key that can unlock it.
14. What Is Asymmetric Key Cryptography?
Alice Bob
“Call me today”
“dh12#djdi2+rg”
“dh12#djdi2+rg”
Call me today
Using Bob’s
Public key to
encrypt
Using Bob’s
Private key to
decrypt
16. Applications of Asymmetric Key Cryptography
Digital Signatures to maintain
authenticity of documents
Managing Crypto-currency
transactions securely
Encrypted browsing sessions
for better protection against
hackers
Sharing Keys for Symmetric Key
Cryptography
20. Encryption Key
Publicly Available
Decryption Key
Privately Stored
Since the key needed to send a message is publicly available,
Asymmetric Key Cryptography is also called Public Key Cryptography
Why Asymmetric Cryptography Is Called Public Key Cryptography?
22. RSA Encryption
• Based on Asymmetric algorithm approach
• Designed by Ron Rivest, Adi Shamir, Leonard Adleman
• Most valuable when encrypting data in transit
• Used with VPN services, email transfer, messaging
applications etc.
24. Advantages Over Symmetric Cryptography
No need of sharing
secret keys
Longer Key lengths mean
stronger encryption
Proof of owner’s
authenticity
Data can’t be modified
in transit