This chapter provides an overview of modern symmetric encryption and asymmetric encryption.
Key Concepts
- 1.
Symmetric cryptography uses the same key for the inverse of an operation.
- 2.
Asymmetric cryptography uses a public and private key pair.
- 3.
Encryption is often used to provide data confidentiality.
- 4.
Message Authentication Codes (MACs) are usually created by symmetric algorithms for data integrity.
- 5.
Signatures are usually created by asymmetric algorithms for data ...