Conventional Encryption Techniques

                         Conventional Encryption Techniques




  • The secret key is also input to the encryption algorithm. 

  • The key is a value independent of the plaintext. The feature of symmetric encryption is what makes it feasible for widespread use. 

  • The fact that the algorithm need not be kept secret means that manufactures can and have developed low-cost chip implementations of data encryption algorithm. 

  • With end-to-end encryption, the encryption process is carried out at the two end systems. 

  • The source host or terminal encrypts the data. 

  • Link encryption obscures header details but overall traffic volumes in networks and at end-points are still visible.

  •  A term refers to the means of delivering a key to two parties that wish to exchange data, without allowing others to see the key is Key distribution.


Keyword:

FEP                                :     Front-End Processor

KDC                              :     Key   Distribution Center

PRNG                            :     Pseudorandom Number Generators

TRNG                            :     True Random Number Generators

Comments