Advertisement

Symmetric Encryption

  • Stephen Haunts
Chapter

Abstract

So far, we have covered integrity by looking at hashing, and authentication by looking at hashed message authentication codes. In this chapter, we explore confidentiality by looking at symmetric encryption.

Copyright information

© Stephen Haunts 2019

Authors and Affiliations

  • Stephen Haunts
    • 1
  1. 1.BelperUK

Personalised recommendations