Skip to main content

Private-Key Encryption

  • Chapter
  • First Online:
  • 3334 Accesses

Abstract

In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined. Thus we shall start by looking at the first rigorous definition for this concept, namely perfect secrecy which, while providing the strongest security assurance, has important practical disadvantages that motivate the introduction of computational security concepts that are more suited for practical use. These notions are defined with the help of complexity theory and the concept of pseudorandomness, a weakening of randomness that takes into account the fact that computational resources are limited. The security notions also make use of the concepts of one-way function and pseudo-random generator, which are of crucial importance for cryptography and are also introduced here.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The term honest is used here as a synonym of legitimate and is devoid of ethical content.

  2. 2.

    Also called a cryptographically secure (or cryptographically strong) pseudo-random generator.

  3. 3.

    There are also methods to produce uncorrelated bits from correlated bit sources but they are more complicated and we shall not study them here.

  4. 4.

    Here we use Maple’s package Bits available only from version 12 onwards but, with a little further work, this can also be done with previous versions of Maple.

  5. 5.

    See, e.g., http://en.wikipedia.org/wiki/Year_2038_problem for a description of this problem.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to José Luis Gómez Pardo .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Gómez Pardo, J.L. (2013). Private-Key Encryption. In: Introduction to Cryptography with Maple. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32166-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32166-5_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32165-8

  • Online ISBN: 978-3-642-32166-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics