O'Reilly logo

Modern Cryptography: Theory and Practice by Wenbo Mao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Encryption — Asymmetric Techniques

8.1 Introduction

Early ciphers (such as the Caesar cipher) depended on keeping the entire encryption process secret. Modern ciphers such as the DES and the AES follow Kerchoffs’ principle (see §7.1): the algorithmic details of these ciphers are made public for open scrutiny. In so doing, the designers of these ciphers wish to demonstrate that the security of their cryptosystems reside solely in the choice of the secret encryption keys.

There is further room to practice Kerchoffs’ principle of reducing the secret component in an encryption algorithm. Consider Shannon’s semantic property of encryption: a mixing-transformation which distributes meaningful messages from the plaintext region fairly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required