Part Two: Symmetric Ciphers

CHAPTER 3

Classical Encryption Techniques

 

 

LEARNING OBJECTIVES

After studying this chapter, you should be able to:

  • ◆ Present an overview of the main concepts of symmetric cryptography.
  • ◆ Explain the difference between cryptanalysis and brute-force attack.
  • ◆ Understand the operation of a monoalphabetic substitution cipher.
  • ◆ Understand the operation of a polyalphabetic cipher.
  • ◆ Present an overview of the Hill cipher.

Symmetric ...

Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.