When we hear the word Cryptography, we think of an invincible out of world concept which is NOT TRUE. This article will destroy all the fear from your soul and make you feel like King Leonidas.

Every information which is private to us and to our partner should not be exposed to the world. This idea has got nothing to do with Information Security but it dates from the reign of Gods and Kings when they ruled the world. In short, the information between the sender and receiver should be confidential and cannot be read by any middle man.

In this modern era, information is generally send between two or more parties using devices like computer, mobile etc. while keeping the data confidential.

So enough with the chit-chat done above and let’s get to the basics. Cryptography are of two types:

• Symmetric Cryptography

• Asymmetric Cryptography

**Symmetric Cryptography**

In Symmetric Cryptographic, sender and receiver uses the same key to encrypt and decrypt the data. Let’s see an example.

__CONCEPTS__

Here we can see that Bob and Alice already having the same key. So Bob encrypts the data using the secret key and Alice decrypts the data using the same secret key.

Now you might ask how this encryption is happening. Well there are many algorithms which are specifically designed for Symmetric Cryptography. AES is one such algorithm. AES is mostly used and recognized algorithm by NIST. It is considered highly safe and unbreakable.

Still not clear. Well let’s dive more deep into it.

When Bob is sending the message “Hello Alice” to Alice, he puts the message first into an algorithm like AES.

In modern cryptography, key is a secret known only to (or supposed to be) the concerned parties, the sender and the receiver. It is usually a string of 0s and 1s of length dependent on the cipher being used. Algorithm is the process used to make use of this secret and apply a series of mathematical/logical operations encrypt/decrypt the data. In modern cryptography, this algorithm is public and heavily scrutinized by eminent cryptographers to identify potential weaknesses that can reveal information to an attacker.

## Why We Need To Use Asymmetric Cryptography And What’s Wrong With Symmetric Cryptography?

Well there is nothing wrong with Symmetric Cryptography. Only problem is both sender and receiver should share the key and there is lot of chances that it might get tapped or read by any person who is listening to this conversation. *So Asymmetric Cryptography is used to transfer this key between the two parties.*

* *

## What is Asymmetric Cryptography?

In Symmetric Key cryptography , there was only one key between sender and receiver . However, in Asymmetric cryptography, sender will have 2 keys and receiver will also have 2 keys. The name of the two keys :

- Public key
- Private key

Public Key = “This key is known to the world”

Private Key = “As the name suggest, this key is known either to sender and receiver”

Like Symmetric Encryption Algorithm called AES, Asymmetric Cryptography also used algorithms like DH(diffie hellman). Chick this link if you want to know more about DH

Let’s see our first example:

Bob wants to send a message to Alice using Asymmetric Cryptography. **READ CAREFULLY WHAT I AM GONNA WRITE NOW.**

Bob has his own pair of Public and Private key Pair. Alice also has his own pair of Public and Private key pair. A message encrypted with Public key can only be decrypted with the corresponding private key and vice-versa. It means message encrypted with Bob public key can only be decrypted with Bob private key and vice-versa.

So with this theory, Bob uses the public key of Alice to encrypt the message. Now Alice after receiving the encrypted message will use her private key to decrypt the message

__PICTURE SPEAKS LOUDER THAN WORDS__

## So what’s wrong with Asymmetric Cryptography?

Asymmetric cryptography is DAMM SLOW. On the other hand, Symmetric Cryptography is FAST AS HELL but both the sender and receiver has to know key prior to sending messages.

## How can we use both this Encryption scheme for our benefit ?

We know Asymmetric is slow but user and sender does not have to know the key prior to sending the message. Below are the steps which actually takes the goodness of both symmetric and asymmetric cryptography and makes the communication completely secure and fast.

- Bob will generate the symmetric key and encrypt the key using Alice public key
- Alice will receive the encrypted key and decrypt the key using her private key. Now she will get the Bob symmetric key. This way Bob and Alice now share the same symmetric key.
- From now on all the communication between them will be encrypted using the symmetric key.

In short, we use Asymmetric Cryptography to transfer the Symmetric key from sender to receiver. From now on, sender and receiver will use Symmetric cryptography to communicate because it’s faster.Now you should feel like this guy below..even if you don’t have those abs .

References:

https://simple.wikipedia.org/wiki/Cryptography

http://www.garykessler.net/library/crypto.html

https://www.tutorialspoint.com/cryptography/

**Please give your comments and spread this article**.. Coming Up Next …. **How easy is PKI and SSL working **

Nice article. Well explained but it will be good if you can post about algorithms for some symmetric and asymmetric cryptography

Nice page focused content. Concentrate more on representation

Nice. Well explained in layman language.

I am in fact grateful to the owner of this site who has shared this wonderful post at at this place.

I was suggested this website by way of my cousin. I’m no longer positive whether this publish is written through him as nobody else know such unique approximately my problem. You are wonderful! Thanks!

It’s written by me…

I am regular reader, how are you everybody? This paragraph posted at this site is genuinely nice.

Its like you read my mind! You seem to know a lot about this, like you wrote the book in it or something. I think that you can do with some pics to drive the message home a little bit, but other than that, this is wonderful blog. A fantastic read. I’ll certainly be back.

Thanks

You actually make it seem really easy together with your presentation but I find this topic to be actually one thing that I feel I’d never understand. It kind of feels too complicated and extremely broad for me. I’m looking forward to your next post, I’ll attempt to get the cling of it!

I am in the process of publishing tutorials for x86 assembly language , exploit development

Hello, I desire to subscribe for this blog to get newest updates, therefore where can i do it please help out.

That feature has yet to come 🙂

I really like it when individuals come together and share thoughts. Great site, stick with it!

Very great post. I simply stumbled upon your blog and wanted to mention that I have truly loved surfing around your weblog posts. In any case I will be subscribing for your feed and I hope you write once more soon!

Hello, i read your blog from time to time and i own a similar one and i was just wondering if you get a lot of spam responses? If so how do you protect against it, any plugin or anything you can suggest? I get so much lately it’s driving me insane so any support is very much appreciated.

don’t know… TRASH

Its like you read my mind! You appear to know a lot about this, like you wrote the book in it or something. I think that you could do with some pics to drive the message home a bit, but instead of that, this is fantastic blog. An excellent read. I’ll certainly be back.

very nice post, i actually love this web site, keep on it

Thanks, Florida.

whoah this weblog is magnificent i really like reading your articles. Stay up the good work! You realize, lots of people are hunting round for this information, you can aid them greatly.

My brother recommended I might like this web site. He was totally right. This post truly made my day. You can not imagine just how much time I had spent for this information! Thanks!

I have recently started a site, the info you offer on this web site has helped me greatly. Thank you for all of your time & work.

Thanks on your marvelous posting! I quite enjoyed reading

it, you might be a great author. I will remember to bookmark

your blog and may come back in the foreseeable future.

I want to encourage continue your great posts, have a nice evening!

I’m impressed, I have to admit. Seldom do I encounter a blog

that’s both equally educative and entertaining, and without a

doubt, you’ve hit the nail on the head. The problem is something too few people are speaking

intelligently about. I’m very happy I found this during my search for something relating to this.

This was a great article. Thanks for sharing your thoughts.

It has been simply incredibly generous with you to provide openly what exactly many individuals would’ve marketed for an ebook to end up making some cash for their end, primarily given that you could have tried it in the event you wanted.

Hey very nice website!! Man .. Beautiful .. Amazing .. I will bookmark your website and take the feeds alsoâ€¦I’m happy to find so many useful info here in the post, we need work out more strategies in this regard, thanks for sharing. . . . . .

Excellent blog right here! Additionally your website a lot up fast! What web host are you the usage of? Can I get your associate link for your host? I wish my web site loaded up as fast as yours lol

hi!,I like your writing very much! share we communicate more about your article on AOL? I need an expert on this area to solve my problem. Maybe that’s you! Looking forward to see you.

Wow, incredible blog format! How lengthy have you ever been running a blog for? you make running a blog glance easy. The whole look of your website is excellent, as smartly as the content!

Thanks a lot very much for the high quality and results-oriented help. I won’t think twice to endorse your blog post to anybody who wants and needs support about this area.

Good day! I simply wish to give a huge thumbs up for the good info you’ve right here on this post. I can be coming again to your blog for more soon.

Your very own commitment to getting the message throughout came to be rather powerful and have consistently enabled employees just like me to arrive at their desired goals.

Hurrah, that’s what I was exploring for, what a data! present here at this webpage, thanks admin of this website.

What’s up, after reading this amazing article i am too delighted to share my know-how here with colleagues.

Hi there, I enjoy reading through your article. I wanted to write a little comment to support you.

Good day! Would you mind if I share your blog with my facebook group? There’s a lot of people that I think would really appreciate your content. Please let me know. Thank you

You have made some good points there. I looked on the net to find out more about the issue and found most people will go along with your views on this site.

I read this piece of writing fully regarding the difference of most up-to-date and earlier technologies, it’s awesome article.

What’s Going down i’m new to this, I stumbled upon this I’ve found It positively useful and it has aided me out loads. I’m hoping to contribute & help other customers like its aided me. Good job.

I think other web site proprietors should take this web site as an model, very clean and wonderful user genial style and design, as well as the content. You’re an expert in this topic!

It’s great to come across a blog every once in a while that isn’t the same out of date rehashed material. Fantastic read.

Wow! This could be one particular of the most helpful blogs We’ve ever arrive across on this subject. Basically Great. I’m also an expert in this topic therefore I can understand your effort.

Basic understanding about cryptography is well explained…..You can combine this with Use of Certificate will give clear picture about Cryptography

I simply could not depart your website before suggesting that I extremely loved the standard info an individual supply for your guests? Is gonna be again regularly in order to check out new posts

Thanks a lot very much for the high quality and results-oriented help. I won’t think twice to endorse your blog post to anybody who wants and needs support about this area.