PROJECT REPORT
ON
Symmetric and Asymmetric key Cryptography
Dr. Sudhir Chandra Sur Institute of Technology & Sports Complex
DEPARTMENT OF C.S.E.
B.Tech 4th year , 8th Semester
Subject Name: - Cryptography And Network Security
Subject Code: - PEC-CS801B (8257)
Submitted To Submitted By
Professor Sanjoy Bhattacharjee Rajshekhar Datta
Dr. Shefalika Ghosh Samaddar Roll No.: - 25500121189; Section: - B
CERTIFICATE FROM THE PROJECT GUIDE
This is to certify that the Project Report titled “Symmetric and
Asymmetric key Cryptography” is a bona fide work of
Rajshekhar Datta undertaken for the partial fulfilment of B.Tech
degree of M.A.K.A.U.T. University under my guidance. This
project work is original and has not been submitted earlier for the
award of any degree or diploma of any other University or
Institution.
Signature Of the Guide
Professor Sanjoy Bhattacharjee
(Associate Professor Department of C.S.E. DSCSITSC)
DECLARATION
I Rajshekhar Datta Son of Mr. Narayan Datta certify that the project
report entitled on “Symmetric and Asymmetric key
Cryptography”
is prepared by me and is my personal and authentic work under the
guidance of Professor Sanjoy Bhattacharjee (Associate Professor
Department of C.S.E. DSCSITSC)
Date: 27/02/2024
Place: BARASAT Signature of the Student
Name: Rajshekhar Datta
B.Tech (8th Semester) , C.S.E.
Roll Number : 25500121189
ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of the task would
be incomplete without mentioning the people whose ceaseless cooperation made
it possible, whose constant guidance and encouragement crown all efforts with
success.
I am also grateful to Dr. Saradindu Panda, Principal of The
DSCSITSC for providing us the ocean of opportunities at DSCSITSC, so
that we could have theoretical and a new learning even during this academic.
I would like to express my thanks Professor Sanjoy Bhattacharjee
(Associate Professor Department of C.S.E. DSCSITSC) and Dr.
Shefalika Ghosh Samaddar (Assistant Professor Department of
C.S.E. DSCSITSC) for giving me their constant time and guidance during
the project work. I am grateful to them for the enlightenment and the
supervision they provided.
Name: Rajshekhar Datta
B.Tech (8th Semester) , C.S.E.
Roll Number : 25500121189
Index
1. Introduction 6
1.1 What is Cryptography? 6
1.2 Cryptography Terminology 6
1.3 Types of cryptography 6
2. Symmetric Cryptography 7
2.1 Definition 7
2.2 Advantages 7
2.3 Disadvantages 7
3. Asymmetric Cryptography 8
3.1 Definition 8
3.2 Advantages 8
3.3 Disadvantages 8
4. Difference between Symmetric and 9
Asymmetric Key Cryptography
5. Conclusion 10
6. Refferences 10
1.Introduction
1.1 What is Cryptography?
Data must be encrypted using a method that only parties with the proper authorization
may decipher. It shouldn’t be simple for third parties to read it in case of any leakage or
assault. In general, the cryptography process changes plaintext (readable data) into
ciphertext (enciphered data). The cipher is a set of two algorithms used to encrypt and
decode data afterward. Furthermore, special keys have been used together with
algorithms. Without them, we couldn’t read the data even if we possessed ciphertext and
the algorithms.
1.2 Cryptography Terminology
Below, we have explained the basic cryptography terminologies.
Encryption Decryption Key
For both encrypting and
It involves utilizing
It is the process of applying decrypting data, you need a
cryptography to secure
cryptography methods to password. Cryptography
information. This method
unlock or decode the utilizes a variety of key
of locking information
encrypted data or types. Only the sender and
encrypts the data. Learn
information. the recipient of the
the difference between
information are aware of it.
Encryption and Hashing
.
1.3 Types of cryptography
There are two types of cryptography symmetric key cryptography vs asymmetric key
cryptography.
6
2 Symmetric Cryptography
2.1 Definition
One key is used for both encryption and decryption in symmetric encryption. The algorithm
and key combine to encrypt the original sensitive information by converting plaintext into
ciphertext. This is effective for storing data that has to be decrypted at a later time. The use
of a single key for encryption and decryption raises concerns because if the key got
compromised, all the data it has encrypted would also be at risk.
As you can see in the image below, only a single key is used in symmetric key
cryptography.
One such example of symmetric cryptography is bank transactions via payment
applications. To prevent identity theft and fraudulent charges, personally identifiable
information (PII) must be protected when used in payment applications.
2.2 Advantages
▪ Easier to use and implement
▪ Fast compared to asymmetric encryption
▪ Less resource utilization
▪ Suited for managing and sending larger data volumes
2.3 Disadvantages
• Sharing encryption keys safely is more difficult with symmetric encryption, and
there are fewer possibilities of doing so.
• Since it is unsuitable for different users, symmetric is not very scalable.
7
3. Asymmetric Cryptography?
3.1 Definition
Asymmetric cryptography, commonly called public key cryptography, is a more recent
technology than symmetric encryption. A plain text is encrypted using two keys in
asymmetric encryption. Over the Internet or a vast network, secret keys are exchanged. It
prevents malicious individuals from misusing the keys.
Asymmetric cryptography uses two related keys to increase security since it is crucial to
keep in mind that anybody with access to the secret key may decrypt the message.
Anybody who wants to send you a message may get a public key. The second private key
is kept secret so that only you are aware of it.
A message encrypted with a public key can only be decrypted with a private key. Since
the public key is accessible to the whole public and may be sent via the Internet, security
is not necessary. Asymmetric keys are far more effective in ensuring the confidentiality of
data sent during transmission.
3.2 Advantages
▪ There is no issue with key distribution since asymmetric encryption uses two keys,
one public and one private.
▪ Once again, communicating with several parties is simple when using a pair of
keys, which is how it is more scalable in huge networks.
3.3 Disadvantages
▪ Performance-wise, asymmetric encryption is slower than symmetric encryption.
▪ Due to its large key sizes, asymmetric encryption is not that simple to maintain and
apply.
8
4. Difference between Symmetric and Asymmetric Key Cryptography
Symmetric Key Asymmetric Key
Factors
Cryptography Cryptography
The same or smaller than the The same or larger than
Size of cipher text
original plain text the original plain text
Used for large amounts of Used for small amounts
Data size
data of data
Resource Utilization Low High
Key Lengths 128 or 256 bits 2048 or higher
More secure as two keys
Less secure as only one key
are used, one for
Security is used for both encryption
encryption and the other
and decryption
for decryption
Two keys, a public key
One key for both encryption and a private key, one for
Number of keys
and decryption encryption and the other
for decryption
Provides confidentiality,
Techniques Provides confidentiality authenticity, and non-
repudiation
Only the private key
Only the key holder can
Confidentiality holder can decrypt the
decrypt the message
message
Speed Fast Slow
Examples: Diffie-
Examples: 3DES, AES, DES
Algorithms Hellman, ECC, DSA, and
and RC4
RSA
9
5.Conclusion
To conclude, we have covered the fundamental difference between symmetric
and asymmetric key cryptography, and we also have explained symmetric and
asymmetric key cryptography in detail for better understanding
.
1. Refferences
1. Liddell, Henry George; Scott, Robert; Jones, Henry Stuart; McKenzie,
Roderick (1984). A Greek-English Lexicon. Oxford University Press.
2. ^ Rivest, Ronald L. (1990). "Cryptography". In J. Van Leeuwen
(ed.). Handbook of Theoretical Computer Science. Vol. 1. Elsevier.
3. ^ Bellare, Mihir; Rogaway, Phillip (21 September 2005).
"Introduction". Introduction to Modern Cryptography. p. 10.
4. ^ Sadkhan, Sattar B. (December 2013). "Key note lecture multidisciplinary
in cryptology and information security". 2013 International Conference on
Electrical Communication, Computer, Power, and Control Engineering
(ICECCPCE). pp. 1–2. doi:10.1109/ICECCPCE.2013.6998773. ISBN 978-
1-4799-5633-3. S2CID 22378547. Archived from the original on 27 August
2022. Retrieved 20 September 2022.
5. "What is Network Security? Poda myre". Forcepoint. 2018-08-09.
Retrieved 2020-12-05.
6. ^ A Role-Based Trusted Network Provides Pervasive Security and
Compliance - interview with Jayshree Ullal, senior VP of Cisco
7. ^ Macfarlane, Richard; Buchanan, William; Ekonomou, Elias; Uthmani,
Omair; Fan, Lu; Lo, Owen (2012). "Formal security policy
implementations in network firewalls". Computers & Security. 31 (2): 253–
270. doi:10.1016/j.cose.2011.10.003.
10
11