Conventional Encryption Techniques
- The secret key is also input to the encryption algorithm.
- The key is a value independent of the plaintext. The feature of symmetric encryption is what makes it feasible for widespread use.
- The fact that the algorithm need not be kept secret means that manufactures can and have developed low-cost chip implementations of data encryption algorithm.
- With end-to-end encryption, the encryption process is carried out at the two end systems.
- The source host or terminal encrypts the data.
- Link encryption obscures header details but overall traffic volumes in networks and at end-points are still visible.
- A term refers to the means of delivering a key to two parties that wish to exchange data, without allowing others to see the key is Key distribution.
Keyword:
FEP : Front-End Processor
KDC : Key Distribution Center
PRNG : Pseudorandom Number Generators
TRNG : True Random Number Generators
Comments
Post a Comment