Data Protection and Security |
||||||
I |
Secret Key Cryptography |
|||||
I.I |
Symmetric Encryption |
|||||
There are six tools that comprise the toolbox of cryptography consumers:
We will see the first four of them in this chapter and the last two in the next. Symmetric Encryption As opposed to public-key encryption, the key used for both encryption and decryption is the same in symmetric encryption. There are basically two ways to make a symmetric cipher:
We now introduce DES and AES in short as examples of block ciphers. |
||||||
|
||||||
|
concepts » | |||||