Skip to Main Content
Express Learning: Cryptography and Network Security
book

Express Learning: Cryptography and Network Security

by ITL Education Solutions Limited
January 2012
Intermediate to advanced content levelIntermediate to advanced
196 pages
6h 43m
English
Pearson India
Content preview from Express Learning: Cryptography and Network Security

3

Symmetric-key Ciphers

1. Define a symmetric-key cipher.

Ans.: A cipher (a combination of encryption and decryption algorithms) that uses the same key for both encryption and decryption is referred to as a symmetric-key cipher.

2. Explain the symmetric cipher model.             Or             Explain the conventional encryption model.

Ans.: A symmetric cipher model (also referred to as a conventional encryption model) consists of various components (see Figure 3.1), which are described as follows:

images

Figure 3.1 Symmetric Cipher Model

(a) Plaintext: This refers to the original message that the sender wishes to send securely. It is an input to ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CCNA Cyber Ops SECOPS 210-255

CCNA Cyber Ops SECOPS 210-255

Omar Santos
Visual Cryptography and Secret Image Sharing

Visual Cryptography and Secret Image Sharing

Stelvio Cimato, Ching-Nung Yang
Red Hat Enterprise Linux 8 Administration

Red Hat Enterprise Linux 8 Administration

Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Publisher Resources

ISBN: 9788131764527