AES(Advanced Encryption Standard)

1.0 Types of Encryption

There are two main types of encryption
    1. Asymmetric Encryption
    2. Symmetric Encryption
.

1.1 Asymmetric Encryption or Public-key cryptography - is a encryption system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner.Message is encrypted with a recipient's public key and cannot be decrypted by anyone who does not possess the matching private key, who is thus presumed to be the owner of that key and the person associated with the public key. This is used in an attempt to ensure confidentiality. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security
                   In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key. This allows, for instance, a server to generate a cryptographic key intended for symmetric-key cryptography, then use a client's openly-shared public key to encrypt that newly-generated symmetric key. Now, the server can send this encrypted symmetric key on insecure channels to the client, and only the client can decrypt it using the client's private key pair to the public key used by the server to encrypt this message. With the client and server both having the same symmetric key now, they can safely transition to symmetric key encryption to securely communicate back and forth on otherwise-insecure channels. This has the advantage of not having to manually pre-share symmetric keys, while also gaining the higher data throughput advantage of symmetric-key cryptography over asymmetric key cryptography.
                   A very good example of public key encryption is Digital signatures, here, Message is signed with the sender's private key and can be verified by anyone who has access to the sender's public key. This verification proves that the sender had access to the private key, and therefore is likely to be the person associated with the public key. This also ensures that the message has not been tampered with, as a signature is mathematically bound to the message it originally was made with, and verification will fail for practically any other message, no matter how similar to the original message.


1.2 Symmetric-key algorithms - are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. This requirement that both parties have access to the secret key is one of the main drawbacks of symmetric key encryption, in comparison to public-key encryption (also known as asymmetric key encryption).

It’s time to take a closer look at the symmetric encryption process. To understand how symmetric cryptography works, you need to know what the components are that are involved in the process:

  • • Your original message that you wish to encrypt ( plaintext data).
  • • A symmetric key encryption algorithm ( we will be implementing the block cipher algorithm).
  • • An identical secret key that only you and your intended recipient have that encrypts and decrypts the data.
  • • The encrypted message that no one can read ( cipher text).
The way that symmetric encryption works is by encrypting and decrypting data through the use of identical keys. The data, once encrypted into ciphertext, can’t be read or otherwise understood by anyone who doesn’t have the key. This means that you and the party you’re communicating with both need to have an identical copy of the key to communicate securely.


Symmetric Encryption Asymmetric Encryption
The Basics Symmetric encryption makes use of a single key for both encryption and decryption. Asymmetric encryption uses different keys for encryption and decryption. It applies a public key for encryption, while a private key is used for decryption.
Algorithms Symmetric encryption using algorithms like 3DES, DES, RC4, AES and QUAD. Whereas, Asymmetric encryption uses RSA and ECC algorithms to create the public and private keys.
Performance While Symmetric encryption is fast in its execution. Asymmetric encryption tends to be slower in execution as a result of more complex algorithms which come with a high computation burden.
Purpose Symmetric encryption is utilized for bulk data transmission. Asymmetric encryption is mostly used for securely exchanging secret keys.






John Doe
2:45:4am On 2019.03.4
And the next important thing to understand is: Asymmetric encryption algorithms take WAY longer than symmetric encryption algorithms. So people 1) use symmetric encryption to encrypt LARGE amounts of data / files, 2) encrypt the symmetric key with asymme.
John Doe
2:59:41pm On 2019.02.16
Very nice and clear presentation.
John Doe
11:5:10am On 2019.01.19
18 people lost their private keys. lol.
John Doe
1:6:50am On 2019.02.8
best explanation yet.
John Doe
4:28:18am On 2019.02.23
Finally! I understand this! Thanks for a clear, simple explanation..
John Doe
11:42:50pm On 2019.02.22
Perfect! Thanks brother..
John Doe
2:22:48pm On 2019.02.13
Explained very clearly and simple, thanks for the video!.
John Doe
07:52:08am On 2022.06.05
Uiagvc [url=https://newfasttadalafil.com/]Cialis[/url] If a large amount of fluid is taken out you may feel dizzy or lightheaded. Ogoqwq <a href=https://newfasttadalafil.com/>buy cialis generic online</a> For the symbol C read degree Celsius..
John Doe
02:22:54am On 2022.09.27
leap component desired [url=http://bag33ondu.com]bag33ondu.com[/url] <a href= http://bag33ondu.com >bag33ondu.com</a> http://bag33ondu.com abrupt conglomerate bull .
John Doe
07:54:04pm On 2022.09.30
3 gГјnde kilo kaybД±hamilelikte ilk 3 ay kilo kaybД± <a href="https://paxera-kilo-kayb.thehottrader.online/">paxera kilo kayb?</a> kilo kaybД± yorgunlukbebeklerde kilo kaybД± sebepleri tedavi park.
John Doe
07:39:18pm On 2022.10.13
<a href="https://turhaberleri.online/">Türkiye Haberleri</a>.
Jane Doe
08:05:51am On 2022.11.03
ProjectFpga.com [url=http://www.g0y423gr981bjg4gzyqrmg57635524qjs.org/]uncnthkxllv[/url] ncnthkxllv http://www.g0y423gr981bjg4gzyqrmg57635524qjs.org/ <a href="http://www.g0y423gr981bjg4gzyqrmg57635524qjs.org/">ancnthkxllv</a>
Jane Doe
04:08:42pm On 2023.04.07
ProjectFpga.com [url=http://www.gv6rrfq57h89bf17y872k176vfa50k0ks.org/]uvcbpndthdt[/url] vcbpndthdt http://www.gv6rrfq57h89bf17y872k176vfa50k0ks.org/ <a href="http://www.gv6rrfq57h89bf17y872k176vfa50k0ks.org/">avcbpndthdt</a>
John Doe
06:31:39am On 2023.04.10
Employment-primarily based immigration: By means of sure forms of employment, you might be ready to gain entry to the U.S. Also, works with professionalism, efficiency, and Excellency in handling your sophisticated Non-resident immigrant citizenship green.
John Doe
06:31:40am On 2023.04.10
Employment-primarily based immigration: By means of sure forms of employment, you might be ready to gain entry to the U.S. Also, works with professionalism, efficiency, and Excellency in handling your sophisticated Non-resident immigrant citizenship green.
John Doe
08:06:44pm On 2023.10.08
Изготовление номерных знаков на авто <a href=https://avto-dublikat.ru/>Дубликат номера</a>.