4

Encryption and Decryption

In this chapter, we explain the concepts of encryption and decryption, describe the prerequisites needed for effective encryption and decryption, and illustrate these procedures using examples based on AES-256. On completion, you will be familiar with the cryptographic notions of encryption and decryption, and the core aspects that make modern encryption and decryption algorithms secure. Besides providing a precise definition of symmmetric cryptosystems, we will provide some more details on more advanced concepts we touched upon in the last chapter, such as the following:

  • Information-theoretical security

  • Computational security

  • True randomness versus pseudorandomness

4.1 Preliminaries

In this chapter, we are going ...

Get TLS Cryptography In-Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.