10.2 Symmetric Cryptography

Modern ciphers can be categorized many ways. One way to separate the ciphers is by whether they use the same key for encryption and decryption, known as symmetric or private key cryptography, or use a different key for encryption and decryption, known as asymmetric or public key cryptography, or in how they process data, whether as chunks of data at a time (block ciphers) or whether they process bits in streams (stream ciphers). Regardless of whether cryptography uses a symmetric or asymmetric key, the key space, which is the range of values available to construct a key, and the key length are important to the impregnability of the cryptography, whether used to digitally sign a document or encrypt data.

Key lengths ...

Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.