KEMBAR78
Project Report Cryptography | PDF | Key (Cryptography) | Cryptography
0% found this document useful (0 votes)
48 views11 pages

Project Report Cryptography

Uploaded by

bbsmdr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views11 pages

Project Report Cryptography

Uploaded by

bbsmdr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

PROJECT REPORT

ON
Symmetric and Asymmetric key Cryptography

Dr. Sudhir Chandra Sur Institute of Technology & Sports Complex


DEPARTMENT OF C.S.E.

B.Tech 4th year , 8th Semester


Subject Name: - Cryptography And Network Security
Subject Code: - PEC-CS801B (8257)

Submitted To Submitted By

Professor Sanjoy Bhattacharjee Rajshekhar Datta


Dr. Shefalika Ghosh Samaddar Roll No.: - 25500121189; Section: - B
CERTIFICATE FROM THE PROJECT GUIDE

This is to certify that the Project Report titled “Symmetric and


Asymmetric key Cryptography” is a bona fide work of
Rajshekhar Datta undertaken for the partial fulfilment of B.Tech
degree of M.A.K.A.U.T. University under my guidance. This
project work is original and has not been submitted earlier for the
award of any degree or diploma of any other University or
Institution.

Signature Of the Guide


Professor Sanjoy Bhattacharjee
(Associate Professor Department of C.S.E. DSCSITSC)
DECLARATION

I Rajshekhar Datta Son of Mr. Narayan Datta certify that the project
report entitled on “Symmetric and Asymmetric key
Cryptography”
is prepared by me and is my personal and authentic work under the
guidance of Professor Sanjoy Bhattacharjee (Associate Professor
Department of C.S.E. DSCSITSC)

Date: 27/02/2024
Place: BARASAT Signature of the Student
Name: Rajshekhar Datta
B.Tech (8th Semester) , C.S.E.
Roll Number : 25500121189
ACKNOWLEDGEMENT

The satisfaction that accompanies the successful completion of the task would
be incomplete without mentioning the people whose ceaseless cooperation made
it possible, whose constant guidance and encouragement crown all efforts with
success.

I am also grateful to Dr. Saradindu Panda, Principal of The


DSCSITSC for providing us the ocean of opportunities at DSCSITSC, so
that we could have theoretical and a new learning even during this academic.

I would like to express my thanks Professor Sanjoy Bhattacharjee

(Associate Professor Department of C.S.E. DSCSITSC) and Dr.


Shefalika Ghosh Samaddar (Assistant Professor Department of
C.S.E. DSCSITSC) for giving me their constant time and guidance during
the project work. I am grateful to them for the enlightenment and the
supervision they provided.

Name: Rajshekhar Datta


B.Tech (8th Semester) , C.S.E.
Roll Number : 25500121189
Index

1. Introduction 6

1.1 What is Cryptography? 6

1.2 Cryptography Terminology 6

1.3 Types of cryptography 6

2. Symmetric Cryptography 7

2.1 Definition 7

2.2 Advantages 7

2.3 Disadvantages 7

3. Asymmetric Cryptography 8

3.1 Definition 8

3.2 Advantages 8

3.3 Disadvantages 8

4. Difference between Symmetric and 9


Asymmetric Key Cryptography
5. Conclusion 10

6. Refferences 10
1.Introduction
1.1 What is Cryptography?

Data must be encrypted using a method that only parties with the proper authorization
may decipher. It shouldn’t be simple for third parties to read it in case of any leakage or
assault. In general, the cryptography process changes plaintext (readable data) into
ciphertext (enciphered data). The cipher is a set of two algorithms used to encrypt and
decode data afterward. Furthermore, special keys have been used together with
algorithms. Without them, we couldn’t read the data even if we possessed ciphertext and
the algorithms.

1.2 Cryptography Terminology

Below, we have explained the basic cryptography terminologies.

Encryption Decryption Key


For both encrypting and
It involves utilizing
It is the process of applying decrypting data, you need a
cryptography to secure
cryptography methods to password. Cryptography
information. This method
unlock or decode the utilizes a variety of key
of locking information
encrypted data or types. Only the sender and
encrypts the data. Learn
information. the recipient of the
the difference between
information are aware of it.
Encryption and Hashing
.

1.3 Types of cryptography

There are two types of cryptography symmetric key cryptography vs asymmetric key
cryptography.

6
2 Symmetric Cryptography
2.1 Definition
One key is used for both encryption and decryption in symmetric encryption. The algorithm
and key combine to encrypt the original sensitive information by converting plaintext into
ciphertext. This is effective for storing data that has to be decrypted at a later time. The use
of a single key for encryption and decryption raises concerns because if the key got
compromised, all the data it has encrypted would also be at risk.

As you can see in the image below, only a single key is used in symmetric key

cryptography.

One such example of symmetric cryptography is bank transactions via payment


applications. To prevent identity theft and fraudulent charges, personally identifiable
information (PII) must be protected when used in payment applications.

2.2 Advantages

▪ Easier to use and implement


▪ Fast compared to asymmetric encryption
▪ Less resource utilization
▪ Suited for managing and sending larger data volumes

2.3 Disadvantages

• Sharing encryption keys safely is more difficult with symmetric encryption, and
there are fewer possibilities of doing so.
• Since it is unsuitable for different users, symmetric is not very scalable.

7
3. Asymmetric Cryptography?
3.1 Definition
Asymmetric cryptography, commonly called public key cryptography, is a more recent
technology than symmetric encryption. A plain text is encrypted using two keys in
asymmetric encryption. Over the Internet or a vast network, secret keys are exchanged. It
prevents malicious individuals from misusing the keys.

Asymmetric cryptography uses two related keys to increase security since it is crucial to
keep in mind that anybody with access to the secret key may decrypt the message.
Anybody who wants to send you a message may get a public key. The second private key
is kept secret so that only you are aware of it.

A message encrypted with a public key can only be decrypted with a private key. Since
the public key is accessible to the whole public and may be sent via the Internet, security
is not necessary. Asymmetric keys are far more effective in ensuring the confidentiality of
data sent during transmission.

3.2 Advantages

▪ There is no issue with key distribution since asymmetric encryption uses two keys,
one public and one private.
▪ Once again, communicating with several parties is simple when using a pair of
keys, which is how it is more scalable in huge networks.

3.3 Disadvantages

▪ Performance-wise, asymmetric encryption is slower than symmetric encryption.


▪ Due to its large key sizes, asymmetric encryption is not that simple to maintain and
apply.

8
4. Difference between Symmetric and Asymmetric Key Cryptography

Symmetric Key Asymmetric Key


Factors
Cryptography Cryptography

The same or smaller than the The same or larger than


Size of cipher text
original plain text the original plain text

Used for large amounts of Used for small amounts


Data size
data of data

Resource Utilization Low High

Key Lengths 128 or 256 bits 2048 or higher

More secure as two keys


Less secure as only one key
are used, one for
Security is used for both encryption
encryption and the other
and decryption
for decryption

Two keys, a public key


One key for both encryption and a private key, one for
Number of keys
and decryption encryption and the other
for decryption

Provides confidentiality,
Techniques Provides confidentiality authenticity, and non-
repudiation

Only the private key


Only the key holder can
Confidentiality holder can decrypt the
decrypt the message
message

Speed Fast Slow

Examples: Diffie-
Examples: 3DES, AES, DES
Algorithms Hellman, ECC, DSA, and
and RC4
RSA

9
5.Conclusion
To conclude, we have covered the fundamental difference between symmetric
and asymmetric key cryptography, and we also have explained symmetric and
asymmetric key cryptography in detail for better understanding
.
1. Refferences

1. Liddell, Henry George; Scott, Robert; Jones, Henry Stuart; McKenzie,


Roderick (1984). A Greek-English Lexicon. Oxford University Press.
2. ^ Rivest, Ronald L. (1990). "Cryptography". In J. Van Leeuwen
(ed.). Handbook of Theoretical Computer Science. Vol. 1. Elsevier.
3. ^ Bellare, Mihir; Rogaway, Phillip (21 September 2005).
"Introduction". Introduction to Modern Cryptography. p. 10.
4. ^ Sadkhan, Sattar B. (December 2013). "Key note lecture multidisciplinary
in cryptology and information security". 2013 International Conference on
Electrical Communication, Computer, Power, and Control Engineering
(ICECCPCE). pp. 1–2. doi:10.1109/ICECCPCE.2013.6998773. ISBN 978-
1-4799-5633-3. S2CID 22378547. Archived from the original on 27 August
2022. Retrieved 20 September 2022.
5. "What is Network Security? Poda myre". Forcepoint. 2018-08-09.
Retrieved 2020-12-05.
6. ^ A Role-Based Trusted Network Provides Pervasive Security and
Compliance - interview with Jayshree Ullal, senior VP of Cisco
7. ^ Macfarlane, Richard; Buchanan, William; Ekonomou, Elias; Uthmani,
Omair; Fan, Lu; Lo, Owen (2012). "Formal security policy
implementations in network firewalls". Computers & Security. 31 (2): 253–
270. doi:10.1016/j.cose.2011.10.003.

10
11

You might also like