Advertisement

Private-Key Encryption

  • William J. Buchanan
Chapter
Part of the Macmillan Master Series book series

Abstract

Encryption techniques can use either public keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities, as illustrated in Figure 18.1. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman). Public-key encryption uses two keys, one private and the other public.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© William Buchanan 1999

Authors and Affiliations

  • William J. Buchanan
    • 1
  1. 1.School of ComputingNapier UniversityEdinburghUK

Personalised recommendations