Part Two: Symmetric Ciphers
CHAPTER 3
Classical Encryption Techniques
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Present an overview of the main concepts of symmetric cryptography.
- ◆ Explain the difference between cryptanalysis and brute-force attack.
- ◆ Understand the operation of a monoalphabetic substitution cipher.
- ◆ Understand the operation of a polyalphabetic cipher.
- ◆ Present an overview of the Hill cipher.
Symmetric ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.