June 2020
Intermediate to advanced
382 pages
11h 39m
English
When two users or processes plan to use symmetric encryption to communicate, they need to exchange keys using a secure channel. This gives rise to the following two problems:
Key protection: How to protect the symmetric encryption key.
Key distribution: How to share the symmetric encryption key from the source to the destination.
Now, let's look at asymmetric encryption.