Abstract

Encryption techniques can use either public-keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).

Keywords

Block Cipher Data Encryption Data Encryption Standard International Data Encryption Algorithm Input Permutation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media Dordrecht 1999

Authors and Affiliations

  • Bill Buchanan
    • 1
  1. 1.Napier UniversityScotland

Personalised recommendations