decrypt101
SocialOpen ProjectsSupport me My Resumes
  • Preface
    • Motivation
    • Roadmap’s
  • Introduction to Blockchain
    • A Brief History
    • Growth of Blockchain
    • Structure of Blockchain
    • Types of Blockchain
    • Key Technologies of Blockchain
    • Features of Blockchain
    • How Blockchain Works ?
    • Implementation of Blockchain
    • Summary
  • Components of Blockchain Architecture
    • Distributed Ledger
    • Blocks
    • Transaction
    • Chain
    • Peer-to-Peer Network
    • Blockchain Layers
    • Off-Chain & On-Chain
    • Wallet
    • Mining
    • Tokens
    • Assets
    • State Channels
    • Sidechains
    • Oracles on Blockchain
    • Atomic Swaps
    • Decentralized Identity (DID)
    • Blockchain Data Storage
    • Interoperability
    • Data structures for Scaling Blockchain
    • Maximal Extractable Value (MEV)
  • Consensus Mechanisms
    • Proof of Work (PoW)
      • Implemation Using Rust
    • Proof of Stake (PoS)
    • Proof of Burn (PoB)
    • Proof of Capacity (PoC)
    • Proof of Activity (PoAc)
    • Proof of Weight (PoWe)
    • Proof of Luck (PoL)
    • Proof of Ownership (PoO)
    • Proof of Existence (PoE)
    • Proof of Believability (PoBe)
    • Proof of History (PoH)
    • Proof of Authority (PoA)
    • Proof of Elapsed Time (PoET)
  • Cryptographics
    • Encryption & Decryption
      • Symmetric Encryption
      • Asymmetric Encryption
      • Key Management and Exchange
      • Implementation
    • Cryptographic Hashing
      • Secure Hash Algorithms (SHA)
      • Message Digest Algorithms
      • Ethash
      • Blake2
      • SCrypt
      • RIPEMD-160
    • Digital Signature
      • Digital Signature Algorithms
      • Digital Signature in Blockchain
    • Zero-Knowledge Proofs (ZKPs)
      • Types of Zero-Knowledge Proof and Protocols
      • A Case Study of Polygon Platform
    • Multi-Party Computation (MPC)
    • Cryptanalysis
    • Practical Implementation
  • Decentralized Application (DApp)
    • Design and UX in Web3
  • Smart Contract
    • Development Tools
    • Solidity
    • Testing Smart Contract
    • Developing Smart Contract
    • Interacting & Deploying with Smart Contract
    • Verifying Smart Contracts
    • Upgrading Smart Contracts
    • Securing Smart Contract
    • Smart Contract Composability
    • Testnet and Mainnet
    • Blockchain Platform Using Smart Contract
    • Application of Smart Contract
    • Practical Implementation
  • Blockchain Platforms
    • Ethereum
      • Ethereum Virtual Machine (EVM)
      • ETHER and GAS
      • Ethereum transaction
      • Ethereum Accounts
      • Ethereum Stacking
      • Ethereum Network
      • Ethereum Scaling Solutions
      • Ethereum Use-Cases
      • Getting Started with Ethereum
      • Ethereum Ecosystem and Support
    • Solana
      • Solana Architecture
        • Solana Account Model
        • Solana Wallet
        • Transactions and Instructions
        • Solana Programs
        • Program Derived Address (PDA)
        • Cross Program Invocation (CPI)
        • Tokens on Solana
        • Clusters and Public RPC Endpoints
        • Transaction Confirmation & Expiration
        • Retrying Transactions
        • Versioned Transactions
        • Address Lookup Tables
        • State Compression
        • Actions and Blinks
      • Solana Developments
      • Solana Client
      • Advanced Solana
      • Solana Scaling and Performance Architecture
      • Solana Solutions and cases
      • Practical Implemenation
    • Binance Smart Chain (BSC)
      • Create a BEP20 Token
    • Hyperledger Fabric
    • Cosmos
    • Polkadot
    • Quorum
    • Polygon
    • Algorand
    • Corda
    • Avalanche
    • TRON
    • Summary
  • Decentralized Finance (DeFi)
    • DeFi Components
    • DeFi Protocols
    • DeFi Platforms
    • DeFi Risk Classification
      • Infrastructure-layer Attacks
      • Smart Contract Layer-attacks
      • Application Layer-attacks
      • DeFi Risks
    • DeFi and Blockchain
    • DeFi Impact
  • Decentralized Ecosystem and Digital Innovation
    • Layer 2 Scaling Fundamental
    • Tokenomics
    • Cryptocurrency
    • Quantative Trading
    • NFTs
    • GameFi
    • Metaverse
  • Blockchain as a Service (BaaS)
    • Building Fullstack Blockchain Platform
    • Decentralized Digital Identity
    • Build a Cryptocurrencies Exchange
    • Play-to-Earn Gaming
    • Solana Token Airdrop Manager
    • Smart Contract Development on Solana with Rust
    • Quantitative Trading Platform
    • Insurances protocols
    • Flash Loans
    • Asset Management
    • Tokenized Derivatives
    • Automated Market Makers (AMMs)
    • Staking
    • Lending and Borrowing Platforms
    • Yield Farming
    • Stablecoin System
    • Security Token Offerings (STOs)
    • Initial Coin Offerings (ICOs)
    • On-Chain Voting Systems
    • Decentralized Autonomous Organizations (DAOs)
    • NFT Marketplaces
    • Provenance Verification
    • Supply Chain Tracking
    • Commodities Tokenization
    • Real Estate Tokenization
    • Digital Certificates
    • KYC (Know Your Customer)
  • Blockchain Development Across Languages
    • Blockchain using Go(Golang)
    • Blockchain using Rust
    • Blockchain using Python
    • Blockchain using Cairo
  • Distributed Systems & Infrastructure Technology
    • Classification of Distributed Systems
    • Networked systems versus Distributed systems
    • Parallel systems vs Distributed systems
    • Distributed versus Decentralized systems
    • Processes of Distributed Systems
    • Architecture of Distributed systems
    • Infrastructure Technologies
  • Distributed System Patterns
    • Distributed Agreements Algorithms
      • HoneyBadgerBFT
    • Data Replications
    • Data Partition
    • Consistency
    • Distributed Time
    • Cluster Management
    • Communication between Nodes
    • Fault Tolerance and Resilience
      • How to design better fault tolerance systems
      • Resilience Patterns
    • Coordination systems
      • Clock synchronization
    • Security
      • Trust in distributed systems
      • Design of Principal Security
      • Security threats, policies, and mechanisms
      • Authentication and Authorizations
      • Cryptography
      • Monitoring in Security
  • Distributed System Design
    • Page 1
    • Distributed Shared Memory
    • Distributed Data Management
    • Distributed Knowledge Management
    • Distributed Ledger
  • FAQs
  • Support and Community
Powered by GitBook
On this page
  • Data Encryption Standard (DES)
  • Triple Data Encryption Algorithm
  • Advanced Encryption Standard (AES)
  1. Cryptographics
  2. Encryption & Decryption

Symmetric Encryption

PreviousEncryption & DecryptionNextAsymmetric Encryption

Last updated 8 months ago

In the encryption-based system, the transmitter and recipient utilize a single com- mon key to encrypt and decrypt the message.

Figure 1.1 shows the symmetric encryption mechanism. However, the public-key cryptography approach uses two keys for encryption and decryption purposes, public and private keys. Though the symmetric encryption method is faster, the main concern is security, and the keys should transfer their information in a very secure way. This encryption method is also known as secret-key cryptography. At the same time, public-key cryptography is not facing this issue because it has not transmitted their private key and easily distributes their public key.

In this following subsection, we will discuss various symmetric encryption algorithms.

Data Encryption Standard (DES)

A famous symmetric encryption algorithm that was developed in 1975 is Data Encryption Standard (DES) approach.

The block cipher method and 56-bit key DES split the text into 64-bit blocks and encrypt that text. Generally, the DES algorithm uses the same key for the encryption and decryp- tion so that the transmitter and recipient both use the same private key. Figure 1.2 shows the vital feature of the DES algorithm such as block cipher, numerous rounds of encryption, 64-bit key, backward compatibility, and replacement and permutation. DES uses the block cipher method to mean that the key and algorithm apply to an entire data block rather than one bit at a particular time. DES encrypts the text 16 rounds in four different modes. It can encrypt the block separately and make the cipher block depending on its previous block. The ciphertext describes the sequence of permutations and replacements during the encryption process. However, this algo- rithm has benefited that it is not secure enough against brute force attacks. So, DES is replaced by a more advanced algorithm, discussed in a subsequent topic.

Triple Data Encryption Algorithm

A mode of the DES encryption approach, which is known as triple DES or 3DES, encrypts message three times. It has a key length of 192 bits and utilizes 64-bit keys. It utilizes the cartographic block method, in which the text is split into 64-bit size text blocks. Encryption is done after that. In triple DES, the first encryption key encrypts with the second encryption key. Likewise, the resultant ciphertext is encrypted using a third encryption key. That is the reason 3DES is more secure than the DES algorithm. The encryption and decryption process in 3DES are as follows:

Encryption: ct = E3(D2(E1(P)))

Decryption: P = D1(E H2(D3(ct)))

In the above-mentioned, E() represents encryption and D() shows the decryption of the DES approach. H, P, and ct denote key, plain text, and ciphertext.

Advanced Encryption Standard (AES)

United States government standard replaced the DES algorithm in 2002 with the Advanced Encryption Standard (AES) approach. Joan Daemen and Vincent Rijmen—Belgian cryptographers—evolved a symmet- ric 128-bit block message encryption approach. The AES algorithm can work simultaneously in multiple network environments. Initially, the National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce has deter- mined the Rijndael approach from all the given five methods. This approach is similar to the AES algorithm. The only difference between Rijndael and AES is that Rijan- dael can define with any key and block size that are multiples of 32 bits such as a minimum of 128 bits and a maximum of 256 bits. In contrast, AES has a fixed block size (128-bit) and 128-bit, 192-bit, and 256-bit key size. This algorithm is secure enough against the brute force attack compared to the DES and 3DES

Fig 1.1. Symmetric encryption
Fig 1.2. Key features that affect DES algorithm