#Symmetric #Asymmetric #Key #Cryptography
Symmetric and asymmetric key cryptography will be the topic in this session key Prague Rafi algorithms ciphers can be categorized mainly into two heads one is the symmetric key or secret key cryptography algorithms another one is the asymmetry key or public key cryptography algorithms so that means cryptography has got
Categorized in two different categories one is a symmetric key which is dealing with secret key and another one is a symmetric key which is dealing with the public key here one same key is used by the sender for encryption and also by the receiver for decryption so in case
Of symmetric key cryptography we know that we will be requiring the secret key here and so here one same key is used by the sender for encryption and also the same key will be used by the receiver for the decryption process so the key is shared you can find this one so here
This is let us suppose he is ascended and he is a receiver so the same key that is a shared secret key will be shared for both encryption and also for decryption and here through the media ciphertext will be sent and this is our symmetric key cryptography the basic
Idea in case of a symmetric key cryptography there are two keys are there in a symmetric or public key cryptography one key is a private key used by the receiver and another one is a public key which is announced to the public so two keys are there you can find here
CSE we’re having these Bob’s public key so these are Bob’s public key and this public key is available to all the public for this encryption also using the Bob’s public key it will be encrypted the plaintext will be there which has been sent by Alice and this particular plaintext is getting
Interpreted by the Bob’s public key now it is getting a transferred through the ciphered ciphertext in the form and then at the decryption Bob’s private key will be used for the decryption and then plaintext will be originated so this is known as a symmetric key cryptography I
Think you are getting me that was using the Bob’s public key which is known to the public and that pops public you will be used for the encryption purpose so Elise is a respective sender of the plaintext using Bob’s public key it will be encrypted so the ciphertext will be originated and
Then it will get degraded by the decrypted by the Bob’s private key and the plaintext will be ryojun ate it so what is happening you see so there are three types of keys I’m just going for the summary there are three types of keys one is the secret key there is a
Shear key for sender and the receiver which is being used in case of symmetric key cryptography and another two keys are there that is a private key used by the receiver and public key which is announced to the public and this is a private public key and private key so
They’ll be used in the asymmetric key cryptography I think you are getting this idea thanks for watching this tutorial point.com simply easy learning
0 Comments