## Nisha Mittal is teaching live on Unacademy Plus

Types of Encryption Nisha Mittal

There are two basic types of encryption: symmetric algorithms: (also called "secret key") use asymmetric algorithms: (also called "public key") the same key for both encryption and decryption use different keys for encryption and decryption

Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption; also called symmetric encryption. Primarily used for privacy and confidentiality Public Key Cryptography (PKC): Uses one key for encryption and another for decryption; also called asymmetric encryption. Primarily used for authentication, non-repudiation, and key exchange. Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information, providing a digital fingerprint. Primarily used for message integrity

Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption; also called symmetric encryption. Primarily used for privacy and confidentiality. Secret Key Cryptography uses a singular "key" for both its encryption and decryption. V The "sender" can then utilize the encryption Key to encrypt the message and send the cyber key (encrypted message) to the "Receiver" The "Receiver" can then utilize the same key to decrypt the message.

Pros of Secret Key Cryptography - Simple and easy to use Good for beginners Useful for low Security information

Cons Secret Key Cryptography Anyone that Has the key can Decode Hard to distribute the code to people who need it - usually the easiest code to crack (solve)

Secret Key Cryptography (SKC) Two basic types of secret-key cryptosystems substitution based cryptosystems transposition based cryptosystems

Secret Key Cryptography (SKC) (symmetric encryption) encryption plaintextc ciphertext key ciphertext plaintext decryption o o o Using a single key for encryption/decryption. The plaintext and the ciphertext having the same size. Also called symmetric key cryptography